"Forever Data 2013" details the vision of Spectra Logic's future and the data storage industry.
- By Ginger Hill
- Oct 07, 2013
Methodical approach and identifying the right tools to meet individual needs is key to security against cyber threats.
- By Vann Abernethy
- Oct 07, 2013
As if tradeshows aren't fun enough on their own, add a movable vehicle to the mix and you have sheer excitement!
- By Ginger Hill
- Oct 04, 2013
Dedicated solely to IP video, over 80 pages of products from 50 industry IP manufactures are highlighted.
President of L-3 Security & Detection Systems pleased to be listed on GSA website.
Provides security systems with customized applications designed to fit specific client requirements.
Authoritative communication during emergency situations is key to saving lives, reducing injury and ensuring security.
xView Viewing Stations scale from single site, single display to multi-site, video wall configurations.
Learn all about going hybrid and how to install an HD IP system in less than an hour!
- By Ginger Hill
- Oct 02, 2013
With sensitive documents spread across tablets, laptops, smartphones and other devices, how do businesses keep this data safe?
With my second security industry tradeshow under my belt, I re-packed my suitcase and bags now full of jump drives containing press releases highlighting the new products seen at ASIS 2013 in Chicago
- By Ginger Hill
- Oct 02, 2013
aptiQmobile is now commercially available to all.
I’ve been to many tradeshows over the years. Probably just about as many as our loyal readers, and I have to say this year’s ASIS was probably about the best ever.
- By Ralph C. Jensen
- Oct 01, 2013
A business that is successful in a competitive market over a long period of time, with repeat customers, must be providing a product or service that meets or exceeds customer needs. This means the company is providing quality using best business practices.
- By Richard Hahn
- Oct 01, 2013
Whether it was “Goldilocks and the Three Bears,” “Hansel and Gretel” or “Red Riding Hood,” we all had our favorite fairy tales as children. As adults, it seems these stories fade into the background of our memories, only remembered if we have children of our own.
- By Ginger Hill
- Oct 01, 2013
Remote monitoring of critical infrastructure used to be very difficult, but thanks to available technologies, this task can be achieved with a fraction of the resources required in the past.
- By Matt S. Nelson
- Oct 01, 2013
Like many small town police departments seeking to maintain neighborhood safety, the Village of Glenwood, Ill., needed to squeeze every ounce of value from its law enforcement tools.
- By John Bartolac
- Oct 01, 2013
Wireless devices are everywhere. They are in our homes and offices in the form of mobile smart phones, tablets and personal computers, among other things.
In a bold move to improve security, specifically in student housing, Miami University (MU) in Oxford, Ohio replaced mechanical locks on more than 4,000 residence rooms and installed electronic locks and smart card credentials on others during a 90-day summer break.
- By April Noblitt
- Oct 01, 2013
High-definition, megapixel cameras can cover larger areas with fewer cameras while delivering superior detail and improving overall security operations.
- By Scott Schafer
- Oct 01, 2013
The reality is that the security industry is undergoing technology-driven changes, and nothing can be done to arrest them. It’s not hard to find signs of the upheavals.
- By Shawn Welsh
- Oct 01, 2013
Frank DeAngelis has given his all to the students and community of Columbine High School. Now, 14 years after the tragic shooting, DeAngelis is retiring as school principal.
- By Ralph C. Jensen
- Oct 01, 2013
Because of the advantages in the transmission of both audio and video data, as well as control signals, IP-based surveillance has caught on in recent years. The data provided can be synthesized into new, custom build-outs that allow the support of HD images, analytics for operational purposes, local or remote video storage, remote control and monitoring.
- By Todd Flowers
- Oct 01, 2013
Businesses set goals, and employees are involved in meeting those benchmarks, year in and year out. The same is true in the security monitoring business, which translates to complete security for homeowners.
- By Ralph C. Jensen
- Oct 01, 2013
Tyco’s Global Accounts Program meets the needs of some of the largest, highprofile, enterprise customers in the world. At the heart of the global account program, Tyco’s Global Center of Excellence (GCoE) provides global program management and programming services for unified security throughout an enterprise.
- By Renae Leary
- Oct 01, 2013
When the owner of a 7,000 sq. ft. RadioShack warehouse in Fort Worth, Texas worried about his space’s security, he decided to install a video-verified alarm system.
- By Jamie Friedlander
- Oct 01, 2013
Five or six years ago, when PDAs began taking on the characteristics of today’s Blackberries, iPhones and Androids, video surveillance manufacturers rushed to develop mobile capabilities.
- By Dan Cremins
- Oct 01, 2013
Ultra low profile IP megapixel cameras are easy to install.
Offering integrator training sessions in multiple locations throughout the United States.
An interesting panel at ASIS 2013 on Wednesday discussed the massive undertaking of providing a layered security approach at O'Hare International Airport.
- By Brent Dirks
- Sep 27, 2013