1. Industry
Send to a Friend via Email

Your suggestion is on its way!

An email with a link to:


was emailed to:

Thanks for sharing About.com with others!

The Latest Developments in Security Technology

These product reviews will help you keep up with the constantly changing world of Security Technology. This topic features reviews of the latest developments in hardware and software.

The OnGARD Security Door Brace
An introduction to the OnGARD Security Door Brace.

Arrow Revolution Deadbolt
An introduction to Arrow's electronic deadbolt

AVG Business Security
A Review of AVG's Suite of Business Security Software

Use DBAN to Erase a Hard Drive Completely
How to use Darick's Boot and Nuke (DBAN) to erase a hard drive so that data cannot be retrieved.

Two Security Cameras that Overcome Difficult Lighting Situations
Honeywell and Speco cameras perform well in difficult lighting situations.

Video Surveillance: State of the Art Options
A short history of video surveillance technology.

Norton Internet Security 2009
Norton Internet Security 2009 is smaller and faster, and yet still offers all of the protection of its predecessors and then some.

Introduction to Electronic Access Control
An introduction to Electronic Access Control with links to the latest products from several manufacturers.

Ad-Aware Pro AE (Anniversary Edition)
If you're like 350 million other users, then odds are good you have used some version of Ad-Aware in the past 10 years. One of the originators of anti-spyware software, Ad-Aware was virtually the only such protection available at one point. Read Tony Bradley's review of their 10th Anniversary Edition.

The Best Apps for Business Security
Whatever you sell, whatever service you provide, none of it is more valuable than your business data. Here is PCMAG.COM's list of the best products for protecting it.

Intego VirusBarrier X5: Mac Antivirus Software Review
It's pretty hard not to like Intego VirusBarrier X5 with the eye candy interface it sports. Fortunately, VirusBarrier not only looks cool, it performs well too. Tony Bradley reviews this top of the line Mac Antivirus program.

The Most Embarrassing Breaches of 2009
Our pick for the five most embarrassing security breaches of 2009

Tracking (and Being Tracked) with Twitter
Creepy is a "geolocation aggregator," which is to say that it gathers location data from social networking sites and image hosting services. Someone using this online tool can map your movements using only your Twitter username.

The SituCon Surveillance System
With the SituCon surveillance system, privacy is the norm.

How to Protect Your Home Office with a D-Link Wireless Security Camera
How to install and use a D-Link wireless security camera

Pixim Wide Dynamic Range Video Technology
An introduction to Pixim Wide Dynamic Range Technology for Security Cameras

Medeco's Nexgen XT
A look at Medeco's Nexgen XT hardware

D-Link Wireless Video Security
D-Link's new video recorder and cameras provide a plug and play surveillance solution.

An introduction to the CyberLock access control system.

Infrared Security Cameras
What is an IR camera, and how do you use it?

Security Cameras You Should Know
An introduction to four innovative security camera technologies (and one you should avoid).

©2014 About.com. All rights reserved.