Release enhancements include third-party video management system integration, audio support and advanced Internet widgets

S2 Security Delivers Unified User Experience with S2 Magic Monitor

S2 Magic Monitor Version 4, provides a unified security management user experience for access control, video surveillance, forensics, digital signage and live Internet feeds. Version 4 introduces new features that benefit security...
Mark Maisano, vice president of channel sales at Pivot3

Pivot3 Earns 5-Star Rating in CRN’s 2017 Partner Program Guide

CRN®, a brand of The Channel Company, has awarded Pivot3 with a 5-Star rating in its 2017 Partner Program Guide – the third consecutive year Pivot3 has received this rating. This annual...
Marty Beard, Chief Operating Officer, BlackBerry

BlackBerry Expands its CyberSecurity Services Reach via Allied World

BlackBerry Limited is expanding its channels of distribution through a new initiative with Allied World, providing its cyber policyholders with direct access to BlackBerry's cybersecurity expertise through an online self-assessment tool...

Attivo ThreatMatrix in AST Homeland Security Awards (Multi-Video)

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response. Stop attackers in their tracks with the real-time detection of threats that have...
Commend Develops and Manufacture Security and Integrated Communication Systems for Protection of People, Buildings and Assets, with a Passion for Audio, Because Every Word Counts, Everything Speaks for Solutions from Commend.

Commend USA to Exhibit in American Security Expo 2017 (Multi-Video)

Speech. Images. Data. For security with enhanced communication. This includes the ­networking of visual and audible ­informa­tion. Commend has developed a digital system platform that meets the ­highest security and communication requirements –...
Allen Badeau, CTO of NCI, Inc.

How to Land the Best Cyber Solutions, On Time & On Budget (Video)

Guest editorial by Allen Badeau, CTO of NCI, Inc. With the financial impact of cybersecurity breaches expected to exceed $5 billion by 2020, the old adage ‘slow and steady’ will not win the...
Karen S. Evans

(ISC)² Announces 2017 US GISLA Award Finalists (Learn More)

(ISC)2® has officially announced the finalists for its 14th annual U.S. Government Information Security Leadership Awards (GISLA®) program. Sponsored by the (ISC)2 U.S. Government Advisory Council (USGAC), the GISLA program was established...
Two Moroccan nationals linked to the Islamic state were arrested at Leopold Sédar Senghor airport. They were targeted by an international search report issued by Interpol. (Image Credit: dakaractu)

Securiport Aids Capture of Two High-Level ISIS Terrorists (Learn More)

According to a number of media reports, Securiport, two time Winner of 2016 ‘ASTORS’ Homeland Security Awards for Best Identification Management Solution & Best Threat Intelligence Solution, helped Senegalese authorities apprehend two high-ranking Daesh, commonly...
Napatech

Adaptive Security is Not Optional (Learn More, Video)

By Dan Joe Barry, VP Positioning and Chief Evangelist at Napatech Many factors have converged to create greater complexity and threat opportunity in the network, undermining the effectiveness of security prevention solutions. BYOD...
Bosch Drivelog

Argus Working to Promote Public Safety & Mitigate Car Hacking

Argus Cyber Security researchers found vulnerabilities in the Bosch Drivelog Connector dongle and in its authentication process with the Drivelog Connect smartphone application which enabled the researchers to take control of a car...
Facebook Auto Publish Powered By : XYZScripts.com