• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH

Physical Security

In order to keep your organization safe, from the people to the property, you’ll want physical security technology. Learn about surveillance, access control, campus safety, emergency management, and more.

Popular Tags within: Physical Security

Cybersecurity Microsoft Collaboration Artificial Intelligence Microsoft Teams Unified Communications and Collaboration AI AWS Generative AI phishing
Mobile Malware

Mobile Malware That Can Spy On Users, Steal Credentials and Intercept Calls Is Up 500%

March 10, 2022 Zachary Comeau Leave a Comment

Enterprises that deploy smartphones and other mobile devices to its employees should be on the lookout for malware sent via text-based phishing, which has risen 500% since early February, cybersecurity firm Proofpoint says in a new report. This comes after a 2021 where malware attacks on mobile devices fell sharply. However, new strains of malware […]

Read More

Vivotek FT9361-R

Vivotek Unveils FT9361-R Facial Recognition Tablet

March 7, 2022 TD Staff Leave a Comment

Vivotek announces the launch of its new facial recognition tablet. The FT9361-R is a facial recognition tablet for access control and employee management. “By simply presenting your face to the facial recognition tablet, true contactless and hands-free access control is achieved. The FT9361-R’s deep learning AI technology can precisely detect a real, living/breathing person from that of […]

Read More

AtlasIED IPX Sponsored Content

Why IT Is Now Tasked With Managing Mass Communications

February 22, 2022 Zachary Comeau Leave a Comment

With more and more devices being deployed on the network, IT professionals can now expect to manage everything from endpoints, collaboration tools and firewalls and now to mass communication systems. Gone are the days of hard-wired mass communications systems that require infrastructure separate from existing IT infrastructures, and that is bringing even more technology under […]

Read More

Young man with vr headset

Security Vulnerabilities Found in VR Headsets

February 14, 2022 TD Staff Leave a Comment

Voice command features on virtual reality (VR) headsets pose vulnerabilities and could lead to major privacy eavesdropping attacks, according to researchers at Rutgers University-New Brunswick. The research shows hackers could use popular AR/VR headsets with built in motion sensors to record subtle, speech-associated facial dynamics to steal sensitive information communicated via voice-command, including credit card […]

Read More

10 Memes That Speak To The Struggles of Working in IT In 2022

January 12, 2022 Zachary Comeau Leave a Comment

Most of the time, we at My TechDecisions are hard at work bringing you tech professionals news and insights that can help you do your job managing the technology at your organization. However, we also recognize that working in IT can be stressful—especially over the last two years with the migration to remote work and […]

Read More

Microsoft Pluton

PCs Powered By Microsoft Pluton Will Become Available Later This Year

January 5, 2022 Zachary Comeau Leave a Comment

The first Microsoft Pluton-powered PCs will become available later this year with Windows 11 as Lenovo and AMD announced during CES 2022 a new ThinkPad Z series laptops powered by AMD’s Ryzen-6000 Series processors which will integrate the Microsoft Pluton security processor. The Microsoft Pluton is a security processor first pioneered in Xbox and Azure […]

Read More

Russia Cyberattack

Here’s What The SolarWinds Hackers Have Been Up To

December 7, 2021 Zachary Comeau Leave a Comment

It has been nearly a year since a coalition of IT and cybersecurity providers discovered a highly sophisticated Russian-aligned hacking campaign that most notably leveraged IT management software from SolarWinds to conduct espionage on U.S. agencies, tech companies and other high-value organizations. The IT industry has learned a lot since then, including the increasing skill […]

Read More

Featured Video Play Icon Sponsored Content

Q&A:iSTAR Ultra G2 Cyber-Hardened Controller from Tyco Software House

December 1, 2021 Zachary Comeau Leave a Comment

My TechDecisions Associate Editor Zachary Comeau speaks with Rick Focke, director of product management for access control at Tyco Software House, a brand of Johnson Controls, about its new iSTAR Ultra G2 Cyber-Hardened Controller. In the video above, Rick Focke dives into what makes the product secure, why security is important in access control systems, and more. […]

Read More

Data Center Automation

Gartner: Data Center Automation Will Advance Significantly by 2025

November 1, 2021 Zachary Comeau Leave a Comment

Within the next five years. half of all data centers will deploy advanced artificial intelligence and machine learning technologies, resulting in a significant efficiency boost, according to IT research firm Gartner. By 2025, half of cloud data centers will use advanced robots with AI and machine learning capabilities, which will increase operating efficiency by 30%, […]

Read More

iSTAR Ultra G2’s Cyber-Hardened Core Helps Combat The Most Sophisticated Hackers

October 28, 2021 Zachary Comeau Leave a Comment

The new Tyco Software House iSTAR Ultra G2 is a powerful, cyber-hardened network door controller that supports up to 32 readers. Built using a Trusted Execution Environment (TEE), iSTAR Ultra G2’s rock-solid, hardware-based cyber protection guarantees confidentiality of code and data, and includes advanced enterprise features such as OSDP encrypted, two-way reader communications and peer-to-peer clustering. […]

Read More

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Interim pages omitted …
  • Go to page 58
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.