Customers looking to invest in a network- based physical security system have many more options than the traditional analog world used to provide.
- By Keven Marier
- Apr 01, 2016
Yes, the world has changed a lot over the last five years and now we’re facing the next big challenge: the Internet of Things (IoT), and how to get it right.
- By Thorsten Held
- Apr 01, 2016
In the security industry, a completed camera installation, active access control platform, and all its moving parts are nothing short of a work of art.
- By Ralph C. Jensen
- Apr 01, 2016
You already know you’re going to put some of that expensive security equipment outside in the elements. You also know how brutal the elements can be on sophisticated electronic solutions.
- By Ralph C. Jensen
- Apr 01, 2016
4K and Ultra High Definition (UHD) video content has approximately four times the resolution (4 times the number of actual pixels) of 1080p full HD. 1080p content has more than twice than 720p resolution. Add audio, metadata, potential multiple camera streams and you’ll soon be asking how you can deliver such high resolution over limited bandwidth connections or simply how to reduce storage costs.
- By Steve Surfaro
- Mar 02, 2016
There have been many discussions and articles about PSIM over the last five years, but there is also a lot of confusion around exactly what it does, how it is defined, and in what way it differs from other forms of security management.
- By Adlan Hussain
- Mar 01, 2016
Sales of home automation systems and connected or smart locks are growing every year.
- By Larry Goldman
- Mar 01, 2016
In November 2015, New York-based system integrator Total Recall Corp. celebrated 30 years of designing and delivering technologically advanced video surveillance security solutions for a variety of industries including law enforcement, government agencies and corporations.
- By Ralph C. Jensen
- Mar 01, 2016
You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.
- By Ralph C. Jensen
- Mar 01, 2016
Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more.
- By Kim Rahfaldt
- Mar 01, 2016
Today’s instant economy requires that more of a company’s business processes be open to external stakeholders.
The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.
- By Robert Ogle
- Mar 01, 2016
Thirty years ago, maybe more, the dream of the IP camera was about to make its debut. The technology, as I remember it, wasn’t all that well received, but that didn’t mean it was a bad idea. It became an exercise of marketing the future to the here and now.
- By Ralph C. Jensen
- Feb 01, 2016
We almost never think about the fact that the public flows through our banks day after day or that suppliers and partners are in and out of branch locations, some requiring access to sensitive areas, all the time.
- By Scott Thomas
- Feb 01, 2016
As we do more with our phones and increasingly demand anywhere/anytime on-line access, there is the opportunity to better protect these activities while creating a more satisfying, mobile-centric security experience at home, in the office, on the road and on-line.
- By HID Global Innovation Team
- Jan 25, 2016
Dealers from South Carolina and Texas win top prizes in annual competition.
Anixter is pleased to announce that it is the recipient of the 2015 Customer Satisfaction Award from Johnson Controls.
By now, we’ve all heard some variation of this question and wondered what it really means for our work, our organizations and the security market in general.
- By Don Campbell
- Jan 04, 2016
To keep the technology at the forefront of managed services, SDC has teamed up with CheckVideo, and deployed its Cloud VMS remote monitoring software platform.
- By Ralph C. Jensen
- Jan 04, 2016
For years, the alarm industry has framed alarm verification around a simple and actionable response. When an alarm is triggered by an external factor, an agency is then responsible for responding to the incident.
- By Julie Beach
- Jan 04, 2016