Whitepaper

IT-Security

Whitepaper: Guidelines to Minimise Exposure to Digital Sabotage

24.01.2019 -

The BSIA has published a summary of current guidelines to minimise the exposure to digital sabotage of network connected equipment, software and systems used in...

Security

Wireless Access Control Report 2018

17.12.2018 -

In the early 1980s McKinsey projected that 900,000 mobile phones would be in use around the world by the turn of the century. The management consultancy undershot...

Security

Official Intersec App: Be a Sponsor of the Successful App!

19.11.2018 -

Welcome to Intersec 2018 in Dubai: GIT SECURITY and Messe Frankfurt Middle East, the organizer of Intersec, present all exhibition visitors the official Intersec app...

Management

What the GDPR means for Video Surveillance

09.10.2018 -

Committed to maintaining the highest levels of privacy protection, Genetec continues to inform IT and security professionals on both cybersecurity and privacy practices....

Management

Effective Asset Management in Retail

11.09.2018 -

Millions of people pass through supermarket doors every year, with retailers generating billions of pounds in sales. An escalating price war between the big five chains...

IT-Security

Cyber Protection Guide: How To Harden Your Mobotix Video System

17.08.2018 -

Cyber-attacks against internet connected software and hardware is a growing problem. In recent years, attackers are increasingly focused on exploiting the weakest links...

IT-Security

Taking IT security to the next level

23.05.2018 -

To authorities, data protection and IT security are a must. The district administration of Tuttlingen realized this early on and introduced Browser in the Box of Rohde...

Security

Debate on Body Worn Camera Technology

29.03.2018 -

Traka has launched a new downloadable white paper to open a discussion on the opportunities and challenges of introducing body worn technology into our communities.
The...