Posts Tagged ‘single’

RFID technology allows retailers to harness social media like never before

Thursday, March 8th, 2012

New social networking solution uses RFID technology to connect businesses at physical locations with social media – to be exclusively previewed at next week’s Retail Business Technology Expo. Businesses can now gain control over the level of engagement they have with customers with the use of branded RFID cards which customers can swipe at their… Read more >>

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Upgrading existing physical access control to comply with PIV mandates

Wednesday, February 8th, 2012

Beginning in fiscal year 2012, U.S. government agencies must upgrade their physical and logical access control systems to provide federal employees and contractors with more secure and reliable forms of identification using Personal Identity Verification (PIV) credentials. These credentials must leverage smart card and biometric technology in accordance with National Institute of Standards and Technology… Read more >>

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Global physical security market to continue to grow by nearly 4 percent

Monday, October 17th, 2011

Memoori Research’s new report on the global physical security market – “The Physical Security Business in 2011” – contains critical intelligence for all those managing, operating and investing in physical security companies around the world. The total value of physical security world production at factory gate prices is $19.17 billion. Of this video surveillance products… Read more >>

Tags: , , , , , , , , , , , , , , , , , , , , , ,

A more common sense approach to security is required

Friday, October 14th, 2011

We’ve seen headline after headline of victims who’ve suffered a security breach. While the severity may vary, each is an example of the concerned organisation’s security measures being found wanting. And the battle has only just begun as, in recent months, security professionals have amplified the cry following attacks from DigiNotar, Anonymous and WikiLeaks –… Read more >>

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,