Dealers and Integrators


5 Questions for Your Cloud Provider

5 Questions for Your Cloud Provider

Do you want the real bottom line in providing cloud services for video, access control and other integrated services?

Path to the Future

Path to the Future

Security professionals face many challenges in selecting video surveillance systems that address their unique needs.

Keeping the Secure in Security Cameras

The world of outdoor security cameras is changing rapidly, and with it, the need for secure, high-quality camera housing.

man on computer

Combating Third-Party Excuses to Your Information Security Requests

How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests

Safe in Sound

While video surveillance often takes center stage in security deployments, equally as important is audio.

Working Together

Although IP-based network cameras are the prevailing standard for new installations, it wasn’t that long ago that analog cameras, and the complex infrastructures required to support large numbers of them, were the only way to accomplish the job.

How Deep is Deep Learning?

At the start of every new year, I get a sampling of what new technologies are going to be introduced. Most of the time, I’m in way over my head. Sometimes I understand and relate to the solution, the technology and what it all means.

Secure Your Engines

Secure Your Engines

When this upgrade project began in early 2017, there was a mix of standard-resolution legacy video cameras scattered throughout the facilities.



The Game Changer

The Game Changer

Most access control systems are focused on improving security and protecting the business, ensuring that only the right people have the right access to the right areas. It keeps the bad guys out and the good guys in.

Meeting Modern Video Surveillance Cybersecurity Challenges

Meeting Modern Video Surveillance Cybersecurity Challenges

Today, many video surveillance systems use IP-based equipment, which sends recorded video across ethernet cabling to local, remote, and cloud-based recorders, often using the same LAN infrastructure that is used by general office workers.

4 Ways Private Sector Security Professionals Can Make Peace With IoT Platforms

4 Ways Private Sector Security Professionals Can Make Peace With IoT Platforms

And harness their power.

A Voice for Veterans

Every interview I get for the magazine is enjoyable, and even entertaining. Every conversation is a story but once in a while I have a lead that I know will stick with me for quite a long time.

Automation Can Close the Gap on Cyber Exposures

Automation Can Close the Gap on Cyber Exposures

See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.

Managed Firewall Services

Managed Firewall Services

As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.

Crime-busting Technology

Like many metropolitan cities, Hartford, CT has its share of crimes. And solving those crimes usually involves sifting through an overwhelming amount of data.

Increasing Sophistication

Increasing Sophistication

Video surveillance management is becoming increasingly sophisticated in terms of operational capabilities, including the type and scope of analytics available.

Top Mistakes Companies Make When Managing a Security Workforce

Top Mistakes Companies Make When Managing a Security Workforce

Gone are the days of paper-based note-taking and incident reporting, or hiring four guards to cover the role of one. Today’s security companies need to be more efficient and responsive, including being better at scheduling resources.

Selecting the Right Access Control System

Selecting the Right Access Control System

With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

The following predictions for ISC West 2019 dive deeper into how these innovations, among others, will help move the security industry forward.

The Uberization of Security’s Business Model

The Uberization of Security’s Business Model

Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).

Featured

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3