Home Blog Page 518

BGW Technologies: A Fighting 10

0
In October security distributor BGW Technologies turned 10 – in this month’s interview, John Adams speaks with the company’s general manager, Robert Meachem, to...

Meet Your SAGE ASIS ACT Seminar Speakers!

0
Security & Government Expo, to be held at the Realm Hotel Canberra next Thursday, November 12 (pre-register here), includes the ASIS ACT Seminars, which...

Portable Mechanical Lock Picking Device

0
Is it true there’s an electronic device that can unpick pin tumbler locks or is this an urban myth? How vulnerable does this now...

Gallagher Bringing Soon-To-Be-Released Command Centre v8.40 To SAGE

0
Gallagher will be showcasing the soon-to-be-released Command Centre v8.40 – the team invites SAGE attendees to drop by the Gallagher stand to discover the...

Argent Joins SAGE 2020 Expo

0
Argent is a leading bespoke Australian manufacturer of server racks, cabinets, enclosures and server room solutions to the Australian data and communications industries. At SAGE...

Honeywell Bringing Latest Command & Control Suite To SAGE

0
At SAGE, the Honeywell team will be showcasing Honeywell’s powerful integrated security management platform – the Honeywell Command and Control Suite (CCS). This physical security...

Support For 2N intercoms Now Integrated Into AXIS Camera Station

0
2N’s wide range of intercoms are now available in the AXIS Camera Station video management software, allowing customers to integrate a 2N intercom into...

ASIAL Goes To War Against Sham Subcontracts

0
ASIAL is working on a subcontracting code of practise to fight sham subcontracts in the security industry. The code of practice will provide guidance for...

Armor Security Seeks K9 Dog Handlers For Sydney Projects

0
Armor Security is seeking K9 dog handlers to assist for a number of upcoming projects in the Sydney metropolitan area. Armor Security is one of...

IDS Required For Transport NSW ITS, CCTV Systems

0
Transport NSW operations team is looking at increasing its cyber security capability and maturing these proficiencies by procuring and operating an intelligent network threat...