These technologies are changing the game when it comes to keeping you safe and giving you peace of mind.
- By Sydny Shepard
- Nov 03, 2015
VSaaS solutions have been around for a while now, offering what many see as more efficient software maintenance and support for their surveillance systems.
- By Dan Cremins
- Nov 02, 2015
Retailers are deciding not to change over to credit card chip transactions until after the holiday season.
- By Sydny Shepard
- Nov 02, 2015
With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.
- By Pete Metzger
- Nov 02, 2015
The San Diego Unified School District’s previous video surveillance solution presented a number of problems. It required two management servers in which most settings had to be replicated between the two, which was awkward and cumbersome.
- By Courtney Pedersen
- Nov 01, 2015
Designed to a be a state-of-theart facility for students and faculty members at Oregon State University, Austin Hall could represent one of the most unique systems integration projects within the higher education market in the United States.
- By Mitchell Kane
- Nov 01, 2015
Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.
- By Ronnie Pennington
- Nov 01, 2015
A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection
- By Michél Bechard
- Nov 01, 2015
When it comes to security and home automation, there are a lot of questions homeowners need to ask themselves. Do I want a smart home?
- By Ralph C. Jensen
- Nov 01, 2015
This issue of Campus Security & Life Safety has an interesting take on security. I think I’ve taken it for granted, but when you talk about camera installation, you have to think about the lens for the camera.
- By Ralph C. Jensen
- Nov 01, 2015
Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.
- By Brandon Arcment
- Nov 01, 2015
In the decade that First Service Insurance (FSI) has conducted business in Roseville, Calif., it has provided contractors with specialized property and casualty insurance products focused on general liability, workers compensation, business auto and bonding/surety.
- By Scott Lindley
- Nov 01, 2015
As interest in connected home technology rises, consumers are beginning to pay attention to its many safety and security benefits.
- By Juan M. López
- Nov 01, 2015
At the peak of El Salvador’s sugar harvesting and processing season, the Ingenio Azucarero Injiboa mill in San Vicente becomes incredibly busy as hundreds of employees change shifts throughout the entire day, typically seven days a week.
- By Mohammed Murad
- Nov 01, 2015
Realizing the need for stronger surveillance in high-profile locations such as the marathon route, the city of Boston decided to increase civilian protection. The new security measures included doubling law enforcement personnel to about 3,500, the addition of bomb-sniffing dogs, and a SWAT team provided by the FBI.
- By Ron Grinfeld
- Nov 01, 2015
Vandalism and destruction of property are not the only concerns at schools. Sadly, theft, assaults and campus shootings are also important issues.
- By Ellen Kreitz
- Nov 01, 2015
In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.
- By Denny Heaberlin
- Nov 01, 2015
Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.
- By Ralph C. Jensen
- Nov 01, 2015
Most dealers know that it’s crucial to run a credit report before signing up a new account. But it’s also worth remembering that it’s not a minor detail, and even a borderline credit record may have long-term repercussions.
- By Robert Ogle
- Nov 01, 2015
One of the campus’s current projects is the renovation and expansion of the Rietz Student Union that prompted the discovery of several ‘dead zones’ in the outdoor notification program.
- By Molly Walsh
- Nov 01, 2015
Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.
- By Brandon Arcment
- Nov 01, 2015
There are many challenges associated with securing Specialized including theft protection and loss prevention, general security for employees, and protecting the company’s highly confidential trade secrets which are safeguarded at headquarters.
- By Taylor Foster
- Nov 01, 2015
This is a story of lens selection gone wrong, and right. Often it seems lens selection is not given much attention, and at worst is an afterthought.
- By Andrea Iniguez
- Nov 01, 2015
This month I ventured out just a little bit to talk about residential security, though much of what I learned also applies to commercial and industrial security. No better place to learn about software than Silicon Valley.
- By Ralph C. Jensen
- Nov 01, 2015
Employee mustering at industrial sites or large facilities has typically been difficult to efficiently manage due to the complexity of the situation and human factors.
- By Steven Pisciotta
- Nov 01, 2015
This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.
More than a decade ago, the talk was all about convergence. Well, the industry has converged, but there is now something more interesting on the horizon.
- By Ralph C. Jensen
- Nov 01, 2015
According to several studies, growth is now focused on “self-installed” products that piggyback on the popularity of smart phones and the tech-savvy millennials that use these devices for everything from banking to prepared food delivery.
- By Bart Didden
- Nov 01, 2015
Imagine getting slapped with a $1 million fine for not adequately securing your facility. Think it can’t happen? Think again.
As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?
- By Ryan Corey
- Nov 01, 2015