The Boring Lab News
Identiv, Inc., a global pioneer in digital security and identification in the Internet of Things (IoT), introduces its expanded Velocity Vision Ecosystem, the industry’s most robust, enterprise-level solution delivered by a single solutions provider. The new ecosystem merges the powerful features of Identiv’s Velocity access control and video platforms with best-in-class cloud storage, hyper-converged infrastructure, and analytics into a single point of contact, facilitating integra...
By awarding the newly created title of ‘Developer Champion’, Milestone Systems recognises and celebrates the most outstanding members of its Developer Community. To kick start the initiative, which launches in June 2021, Milestone has selected five international technology professionals from the Milestone Developer Community, who will be the first to carry the prestigious title of Developer Champion. Milestone Integration Platform SDK Software developers are a vital part of Milest...
The Boring Labs has announced that it has achieved the designation of Gold Technology Partner by Milestone Systems. The Boring Toolbox is a series of functional tools that help enterprises and integrators more efficiently manage medium-to-large distributed video surveillance/security networks using Milestone Systems XProtect Express+, Pro+, Expert and Corporate. Managing large, complex systems In March of this year, The Boring Toolbox received accolades from Milestone as the Solution Partner o...
The Boring Lab announced that The Boring Toolbox, a set of performance and maintenance tools to help customers more efficiently manage Milestone Systems’ XProtect video surveillance networks, has added key features for enterprise and large-scale sites with 5,000+ cameras and 100,000+ devices. The Boring Toolbox V3 offers a smoother user experience and optimised performance features, both of which were necessary to support larger installations. The Boring Toolbox allows customers to mainta...
Arxys announces that they are now a verified Milestone System Builder. The Arxys Shield | Key NVRs with built-in GPUs deliver impressive performance improvements at lower cost for organisations looking to implement AI-enhanced video surveillance, video motion detection and video analytics. With Arxys Shield | Key NVRs in the System Builder program, Milestone channel partners and customers will benefit from verified and certified hardware configurations with Milestone XProtect Inside. The Arxys...
The Boring Labs announces that it was named Solution Partner of the Year-Americas by Milestone Systems. The Boring Toolbox is a series of functional tools that help enterprises and integrators more efficiently manage medium-to-large distributed video surveillance/security networks using Milestone Systems XProtect Express+, Pro+, Expert and Corporate. Managing installations The Milestone Integration Platform Symposium (MIPS) held its annual Americas event last month to explore the intelligent w...
The Boring Labs announces its Boring Toolbox, a series of functional tools that help enterprises and integrators more efficiently manage medium-to-large distributed video surveillance/security networks using Milestone XProtect Express+, XProtect Professional+, XProtect Expert and XProtect Corporate. Initial tools include hardware/device name, password and device-group management that reduce the time spent on these manual functions by up to 97%. “While working as a leading Milestone integr...
Browse security news
- By event
- The Health & Safety Event 2025
- The Security Event 2025
- 11th National Conference On CFIUS
- RSA Conference 2025
- RSAC USA 2025
- 19th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- G2E Asia + Asian IR Expo 2025
- Airport Show 2025
- Secutech 2025
- 6th European Forum on Global FDI Reviews
- Infosecurity Europe 2025
- View more
Anviz W2 Face Hybrid Biometric Time Attendance & Access Control Terminal
Morse Watchmans SmartKey Locker® Touch
Dahua AI-powered 8MP TiOC Pro WizColor Eyeball Camera
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download