 
                    
                                        
		            
                    For every organization, one of the first steps in providing safety and security is knowing at all times who is in the building. This is true for protecting people, property, or assets, and whether the building is a business, school, hospital or any other location.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Higher education leaders are asking the state for more money to help protect universities from IT security threats.
                    
			            - By Matt  Holden
- Mar 03, 2015
 
            
                
	                 
                    
                                        
		            
                    The government is also looking to prevent young people from becoming radicalized.
                    
			            - By Matt  Holden
- Feb 19, 2015
 
            
                
	                
                    
                                        
		            
                    Today, there are countless manufacturers that claim to have a clear migration path toward an open architecture platform; however, there is simply no clear path that applies to all applications. 
                    
			            - By Tom  Larson
- Nov 01, 2014
 
            
                
	                 
                    
                                        
		            
                    In the aftermath of the Ray Rice Scandal, it comes down to those with the camera footage.
                    
			            - By Matt  Holden
- Sep 09, 2014
 
            
                
	                 
                    
                                        
		            
                    Two researchers planned to reveal their findings at Black Hat USA.
                    
			            - By Matt  Holden
- Aug 08, 2014
 
            
                
	                 
                    
                                        
		            
                    Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.
                    
			            - By Jason  Dover
- Aug 05, 2014
 
            
                
	                 
                    
                                        
		            
                    Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options. 
                    
			            - By Mig   Paredes
- Jun 30, 2014
 
            
    
                
	                 
                    
                                        
		            
                    When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.
                    
			            - By Sumeet  Sabharwal
- Apr 01, 2014
 
            
                
	                 
                    
                                        
		            
                    Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
                    
			            - By Charles P.  Williams
- Dec 01, 2013
 
            
                
	                
                    
                                        
		            
                    Redundant Array of Independent Disks (RAID) is a method for configuring multiple disks or hard drives in a single array. While there are many levels of RAID, focusing on RAID 5 for video surveillance is key. 
                    
			            - By Tri  Nguyen
- Nov 01, 2013
 
            
                
	                
                    
                                        
		            
                    Staying on top of a rapidly evolving technology, such as video surveillance, can be challenging.
                    
			            - By Ali  Mahmoud
- Sep 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Organizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sustainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    If you’re limiting your business to selling surveillance technology as a capital expense, you’re leaving a lot of money on the table.
                    
			            - By Matt  Krebs
- Jun 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.
                    
			            - By Ginger  Hill
- May 23, 2013
 
            
                
	                 
                    
                                        
		            
                    The University of East Anglia (UEA) was an early adopter of IP video surveillance in 2005. Milestone partner, Check Your Security (CYS), brought together a number of standalone CCTV systems into one IP-based monitoring system that is proving it can grow with the university. 
                    
			            - By Courtney Dillon Pedersen
- Apr 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Helping the state of Tennessee with a solar-powered, IP video-based solution to catch wild hogs, ICRealtime has installed an autonomous remedy by harnessing the power of Verizon’s nationwide cellular network. 
                    
			            - By Adam  Cohen
- Apr 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.
                    
			            - By Ginger  Hill
- Mar 20, 2013
 
            
                
	                 
                    
                                        
		            
                    Scalable system architectures have been the source of many debates within the security industry.
                    
			            - By Mahesh  Saptharishi, Ph.D.
- Dec 01, 2012
 
            
                
	                
                    
                                        
		            
                    Comtrol Corporation, a manufacturer of industrial device communication products, has released the RocketLinx ES7106-VB industrial Power over Ethernet (PoE) switch.