Post Canon acquisition, Axis still committed to open security systems
People mentioned in this article
- Related companies
- Axis Communications
- Canon Europe Ltd
- Related categories
- CCTV cameras
- IP cameras
- IP Dome cameras
- Dome cameras
- View all news from
- Axis Communications
- Canon Europe Ltd
Articles by Larry Anderson
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately driv...
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating t...
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability t...
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network ex...
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerge...
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and...
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security...
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, feat...
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally spe...
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced b...
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When i...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
Transportation enables the movement of goods and people, facilitates trade and commerce, and is crucial for businesses to operate and expand. Security technology plays a major role both in protecting...
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applicati...
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solut...
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost o...
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on informa...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security sys...
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater e...
Related videos
In case you missed it
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...
Expert commentary
- Enhancing collaboration in physical security operations
- Global regulations of AI: the role and impact on the physical security industry
- Mind the gap: Addressing cybersecurity at every phase of technology management
- When choosing an access solution, make Total Cost of Ownership a key part of the calculation
Round table discussions
- What new buzzword have your heard, and what does it mean for security?
- How can the industry do a better job of promoting emerging technologies in physical security environments?
- How does security innovation impact the skillsets operators need?
- How can manufacturers and integrators mitigate the risks of port forwarding?
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
DownloadPalm vein recognition
DownloadPhysical access control
Download