If you’re like most security professionals, your daily inbox is crammed with updates from industry associations, publications and online communities summarizing the hot topics of the day.
Recent data shows that crime continues to evolve. In some areas, overall crime is down, yet there has been an alarming increase in mass shootings and terrorism.
The last day of ISC West saw some unexpected and innovative products
Customers looking to invest in a network- based physical security system have many more options than the traditional analog world used to provide.
Yes, the world has changed a lot over the last five years and now we’re facing the next big challenge: the Internet of Things (IoT), and how to get it right.
Putting the cyber security world into perspective, and in tandem with the physical security side, takes a little know-how, elbow grease and brain power.
In the security industry, a completed camera installation, active access control platform, and all its moving parts are nothing short of a work of art.
As a camera views and records in 360 degrees, a circular, distorted image is produced, making it essential to process the image so that the human eye can comprehend the image easily.
You already know you’re going to put some of that expensive security equipment outside in the elements. You also know how brutal the elements can be on sophisticated electronic solutions.
As any security dealer or integrator knows, there are two revenue results of making an access control sale: the proceeds from the original sale itself and the potential recurring revenue that can be wrought from the sale down the road.
4K and Ultra High Definition (UHD) video content has approximately four times the resolution (4 times the number of actual pixels) of 1080p full HD. 1080p content has more than twice than 720p resolution. Add audio, metadata, potential multiple camera streams and you’ll soon be asking how you can deliver such high resolution over limited bandwidth connections or simply how to reduce storage costs.
You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.
There have been many discussions and articles about PSIM over the last five years, but there is also a lot of confusion around exactly what it does, how it is defined, and in what way it differs from other forms of security management.
Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more.
Today’s instant economy requires that more of a company’s business processes be open to external stakeholders.
Sales of home automation systems and connected or smart locks are growing every year.
The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.
In November 2015, New York-based system integrator Total Recall Corp. celebrated 30 years of designing and delivering technologically advanced video surveillance security solutions for a variety of industries including law enforcement, government agencies and corporations.
Thirty years ago, maybe more, the dream of the IP camera was about to make its debut. The technology, as I remember it, wasn’t all that well received, but that didn’t mean it was a bad idea. It became an exercise of marketing the future to the here and now.
We almost never think about the fact that the public flows through our banks day after day or that suppliers and partners are in and out of branch locations, some requiring access to sensitive areas, all the time.