Smart Cities Call For Mobile Solutions

New physical security intelligence and access control technology has been launched, that helps to build secure and smart cities, campuses, and perimeters.

ReconaSense has recently announced their ReconMobile command and control center. The app allows its users to lock down facilities, report and respond to emergencies via mobile phone, tap into video surveillance systems, and more.

There are several difficulties with managing the security of a large facility, many of them are data related. Security managers need to understand the points of entry and the inflow and outflow of people in and out of the facility. 

The app allows security personnel to take action and see multiple facilities from anywhere, granting them shorter response times, better decision making, better situational awareness, and ultimately, better security. The app works on most smartphones, tablets, and even smart watches and includes an option that allows civilians to report to security if they need help in an emergency situation.

“Situational awareness is a critical success factor in any large, complex security operation,” said executive vice president of ReconaSense, Clayton Brown. “That success depends on systems that speak a common language, and people to feed those systems with data that sensors can’t capture.”

Some of the features ReconMobile includes are:

  • EmergenSEE: Ability to share surveillance data with first responders to increase situational awareness and improve response times.
  • WatchCommander: Being able to initiate a facility lockdown and quickly responding to threats via smart watch.
  • MobileSOS: Enables civilians to report an emergency to security teams with a push of a button.
  • MobileMuster: Sends security response requests to civilians so they can provide data regarding their wellbeing as well as real time GPS locations in the case of an incident or emergency situation.
  • See Something, Say Something: Gives security personnel the capability to manage incoming reports sent from civilians. Helps to increase and manage situational awareness. 

I-HLS

You Might Also Read:

A Virtual Geospatial Fence On Network Access:

 

« EU Crackdown On Cyber Crime
Using Blockchain Helps Secure Data Against Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Arcitura Education

Arcitura Education

Arcitura is a leading global provider of progressive, vendor-neutral IT training and certification programs.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

Aikido Technology Services

Aikido Technology Services

Aikido Technology Services is a leading-edge technology solutions provider, servicing the Pacific North West USA. We offer affordable IT solutions designed to streamline and secure your business.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.