IT Security


Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.

Denmark Outlines Security Funding after Terror Attacks

Denmark Outlines Security Funding after Terror Attacks

The government is also looking to prevent young people from becoming radicalized.

On a Clear Path

Today, there are countless manufacturers that claim to have a clear migration path toward an open architecture platform; however, there is simply no clear path that applies to all applications.

Columnist Says Those with Footage Have the Power

Columnist Says Those with Footage Have the Power

In the aftermath of the Ray Rice Scandal, it comes down to those with the camera footage.

Security Holes Found in some DLP Products

Security Holes Found in some DLP Products

Two researchers planned to reveal their findings at Black Hat USA.

Application Single Sign-on – Benefits and Considerations

Application Single Sign-on – Benefits and Considerations

Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.

Adding a Razberi to the Mix

Adding a Razberi to the Mix

Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options.

Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.



On The Fast Track

On the Fast Track

Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.

Air RAID

Redundant Array of Independent Disks (RAID) is a method for configuring multiple disks or hard drives in a single array. While there are many levels of RAID, focusing on RAID 5 for video surveillance is key.

On the Cutting Edge

Staying on top of a rapidly evolving technology, such as video surveillance, can be challenging.

Training Next-Generation Cyber Warriors with Advanced Cyber Ranges

Online Exclusive: Training Next-Generation Cyber Warriors with Advanced Cyber Ranges

Organizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sustainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures.

hosted video can be lucrative

Hosted Video Can Be Lucrative

If you’re limiting your business to selling surveillance technology as a capital expense, you’re leaving a lot of money on the table.

Cybersecurity Defensive Stance Protects Small Business Computers

Cybersecurity Defensive Stance Protects Small Business Computers

Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.

Evolving Video - Upgrades to new versions of open platform software help keep the safest campus in England on track

Evolving Video

The University of East Anglia (UEA) was an early adopter of IP video surveillance in 2005. Milestone partner, Check Your Security (CYS), brought together a number of standalone CCTV systems into one IP-based monitoring system that is proving it can grow with the university.

trapping wild hogs - state harnesses power by using cellular network

Trapping Wild Hogs

Helping the state of Tennessee with a solar-powered, IP video-based solution to catch wild hogs, ICRealtime has installed an autonomous remedy by harnessing the power of Verizon’s nationwide cellular network.

Internet Explorer Browser Security Tips

Internet Explorer Browser Security Tips

Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.

Distributed Storage Done Right

Scalable system architectures have been the source of many debates within the security industry.

Comtrol Releases RocketLinx PoE Switch for Security Applications

Comtrol Corporation, a manufacturer of industrial device communication products, has released the RocketLinx ES7106-VB industrial Power over Ethernet (PoE) switch.

Integrating Physical and Cyber Security: Strategies that Work

Security principles have not changed much in the past 30 years, but the application of those principles is shifting daily. Addressing integrated security disciplines to ensure a cohesive and collaborative security solutions environment in any organization requires a number of coordinated things to happen efficiently.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.