Dealers and Integrators


Times are Changing

My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.

From Risk to Reward: How Service Assurance Presents New Opportunities for Integrators

From Risk to Reward: How Service Assurance Presents New Opportunities for Integrators

Integrators need to find new ways to innovate to differentiate themselves from their competition and improve relationships with their customers both before and after installation.

Hanwha Techwin Helps Cannabis Dispensary Meet Stringent Regulatory Requirements

Hanwha Techwin Helps Cannabis Dispensary Meet Stringent Regulatory Requirements

After much research, they decided to contract Skyline Technology Solutions for their surveillance system because of their transparency, robust IT background and previous experience with medical marijuana facilities.

Video Data Security. The view from the experts.

Video Data Security. The view from the experts.

Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone.

Insight Pro Gets Top Rating for Network Management Solutions

Many businesses today are structured to have regional offices, which oversee activities at numerous locations. These businesses include Managed Services Providers (MSPs), satellite and branch offices, retail, gas stations and fast food chains, healthcare and regional and local -government or education.

Bringing Hope to SMB Networks

A detailed look at image quality from Bosch

A Detailed Look At Image Quality From Bosch

These days, it’s a standard requirement of security devices to perform smarter in the way they think as the importance of data capture and the opportunities provided by connected infrastructures and the IoT become more prevalent.

Bosch Project Assistant

Bosch Project Assistant

As many of you will have experienced, the planning, configuration, installation and reporting of a video security project involves multiple tools and extensive man hours to complete and document the process. Managing several projects efficiently through each phase can be a difficult task for system integrators.



Total Cost of Ownership

As cloud computing and software as a service (SaaS) have evolved, video surveillance as a service (VSaaS) or cloud surveillance, has emerged as the most popular option for businesses seeking to simplify their physical security installations.

Making Your Expertise Unique

Making Your Expertise Unique

Every businessperson wants to bring something different, or unique, to the table when they talk about their business solutions. In the security industry, or more particularly, the security consultant, the same applies. You’ve got to have a secret sauce.

Solving Problems

Solving Problems

The industry is changing so rapidly that the following statement might seem bold but it’s true. No one wants to buy a camera.

Integrate to Improve Loss Prevention

Integrate to Improve Loss Prevention

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All of these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country.

Transitioning from Video to Vision

In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.

Does your office security system have the power of foresight?

Does Your Office Security System Have the Power of Foresight?

If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.

Crossing the Border at Your Peril

There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Processing Security

Processing Security

The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.

Tackling Cybersecurity Challenges in the Age of IoT

Tackling Cybersecurity Challenges in the Age of IoT

With the rapid adoption of the Internet of Things (IoT), we are moving towards an entirely interconnected world, from smart organizations to smart cities.

Three Ways To Ruin A Security Director

Three Ways To Ruin A Security Director's Day

Whether your title is Security Director or you just have the responsibilities of one, there’s a lot riding on your shoulders.

Keeping Your House Secure

Keeping Your House Secure

Conversations about what can be done to keep violent weapons and dangerous materials from falling into the wrong hands continue to dominate the political discussion, leaving communities wondering about what they can do to prevent the next school or church attack.

Featured

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.