These days, it’s a standard requirement of security devices to perform smarter in the way they think as the importance of data capture and the opportunities provided by connected infrastructures and the IoT become more prevalent.
As many of you will have experienced, the planning, configuration, installation and reporting of a video security project involves multiple tools and extensive man hours to complete and document the process. Managing several projects efficiently through each phase can be a difficult task for system integrators.
As cloud computing and software as a service (SaaS) have evolved, video surveillance as a service (VSaaS) or cloud surveillance, has emerged as the most popular option for businesses seeking to simplify their physical security installations.
- By Andre Fontana
- Oct 01, 2018
Every businessperson wants to bring something different, or unique, to the table when they talk about their business solutions. In the security industry, or more particularly, the security consultant, the same applies. You’ve got to have a secret sauce.
- By Ralph C. Jensen
- Oct 01, 2018
The industry is changing so rapidly that the following statement might seem bold but it’s true. No one wants to buy a camera.
- By Alex Walthers
- Oct 01, 2018
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All of these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country.
In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.
- By Vince Ricco
- Sep 01, 2018
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.
There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.
- By Ralph C. Jensen
- Sep 01, 2018
Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.
- By Andrew Jimenez
- Sep 01, 2018
The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.
- By Suzi Abell
- Sep 01, 2018
With the rapid adoption of the Internet of Things (IoT), we are moving towards an entirely interconnected world, from smart organizations to smart cities.
Whether your title is Security Director or you just have the responsibilities of one, there’s a lot riding on your shoulders.
Conversations about what can be done to keep violent weapons and dangerous materials from falling into the wrong hands continue to dominate the political discussion, leaving communities wondering about what they can do to prevent the next school or church attack.
- By Stephanie Douglas
- Jul 11, 2018
As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.
- By Cesare Paciello
- Jul 11, 2018
I’m old enough to remember fire alarm drills and hiding under my desk as a youth. The fire alarm drills were great because we were able to leave the classroom and go outside. I never understood hiding under the desk, but went along with it anyway. That’s the world I grew up in.
- By Ralph C. Jensen
- Jul 11, 2018
Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.
- By Andrew Jimenez
- Jul 11, 2018
As Foxwoods grew and expanded, so did the need for a state-of-theart, integrated video surveillance system to provide necessary coverage and security for the gaming facilities.
- By Michael Lohr
- Jul 11, 2018
The new and growing interest in the technology sector has given rise to a new phenomenon known as “Tech tourism,” whereby tech companies have seen ever increasing numbers of visitors being attracted to their sites as tech enthusiasts undertake a kind of digital pilgrimage.
It has become crystal clear to me that integrators and distributors are experts in product development in this industry.
- By Ralph C. Jensen
- Jul 11, 2018