Dealers & Integrators


INDUSTRY PROFESSIONAL

Keeping the Secure in Security Cameras

The world of outdoor security cameras is changing rapidly, and with it, the need for secure, high-quality camera housing.

man on computer

Combating Third-Party Excuses to Your Information Security Requests

How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests

Safe in Sound

While video surveillance often takes center stage in security deployments, equally as important is audio.

INDUSTRY PROFESSIONAL

Working Together

Although IP-based network cameras are the prevailing standard for new installations, it wasn’t that long ago that analog cameras, and the complex infrastructures required to support large numbers of them, were the only way to accomplish the job.

INDUSTRY FOCUS

How Deep is Deep Learning?

At the start of every new year, I get a sampling of what new technologies are going to be introduced. Most of the time, I’m in way over my head. Sometimes I understand and relate to the solution, the technology and what it all means.

Secure Your Engines

Secure Your Engines

When this upgrade project began in early 2017, there was a mix of standard-resolution legacy video cameras scattered throughout the facilities.

The Game Changer

The Game Changer

Most access control systems are focused on improving security and protecting the business, ensuring that only the right people have the right access to the right areas. It keeps the bad guys out and the good guys in.

Meeting Modern Video Surveillance Cybersecurity Challenges

SPONSORED

Meeting Modern Video Surveillance Cybersecurity Challenges

Today, many video surveillance systems use IP-based equipment, which sends recorded video across ethernet cabling to local, remote, and cloud-based recorders, often using the same LAN infrastructure that is used by general office workers.



4 Ways Private Sector Security Professionals Can Make Peace With IoT Platforms

4 Ways Private Sector Security Professionals Can Make Peace With IoT Platforms

And harness their power.

INDUSTRY FOCUS

A Voice for Veterans

Every interview I get for the magazine is enjoyable, and even entertaining. Every conversation is a story but once in a while I have a lead that I know will stick with me for quite a long time.

Crime-busting Technology

Like many metropolitan cities, Hartford, CT has its share of crimes. And solving those crimes usually involves sifting through an overwhelming amount of data.

Increasing Sophistication

Increasing Sophistication

Video surveillance management is becoming increasingly sophisticated in terms of operational capabilities, including the type and scope of analytics available.

Managed Firewall Services

Managed Firewall Services

As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.

Automation Can Close the Gap on Cyber Exposures

Automation Can Close the Gap on Cyber Exposures

See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.

Top Mistakes Companies Make When Managing a Security Workforce

Top Mistakes Companies Make When Managing a Security Workforce

Gone are the days of paper-based note-taking and incident reporting, or hiring four guards to cover the role of one. Today’s security companies need to be more efficient and responsive, including being better at scheduling resources.

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

The following predictions for ISC West 2019 dive deeper into how these innovations, among others, will help move the security industry forward.

Selecting the Right Access Control System

Selecting the Right Access Control System

With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.

The Uberization of Security’s Business Model

The Uberization of Security’s Business Model

Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).

Protecting Mining and Quarry Operations

Protecting Mining and Quarry Operations

Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes.

Making it Work

Making it Work

The first step in any security plan is assessing the risk that could impact a company, venue and/or business sector.

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety