In the security world, when a company is making the leap from installing traditional, analog, CCTV cameras to IP surveillance, this “thinkahead” strategy is all the more wise.
- By Vance Kozik
- Dec 01, 2013
Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
- By Charles P. Williams
- Dec 01, 2013
Last spring, in late March, regional grocer Schnucks Markets reported that the credit card data of more than 2 million customers was stolen by cybercriminals.
- By Jason Mical
- Dec 01, 2013
Biometrics has a central role to play in today’s authentication solutions, so it is important to revisit and review the many myths and misperceptions associated with this technology.
- By Phil Scarfo
- Nov 01, 2013
Staying on top of a rapidly evolving technology, such as video surveillance, can be challenging.
- By Ali Mahmoud
- Sep 01, 2013
Joe from ABC Company has had the same security management system for 15 years in all of his buildings. He likes it; he knows it inside and out, and he can give training classes to his security guards on how to use it.
- By Kim Rahfaldt
- Aug 01, 2013
A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.
- By Steven Olen
- Aug 01, 2013
In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.
- By Vince Ricco
- Aug 01, 2013
Multiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card.
- By Dave Adams
- May 01, 2013
Located in the heart of Hollywood, Calif., The Ricardo Montalbán Foundation Theatre, named after the late actor and performing arts patron, is a venue for diverse cultural events.
- By Ralph C. Jensen
- May 01, 2013
As network security professionals are acutely aware, they must be continuously vigilant to meet the ever-evolving threats driven by the bring your own device (BYOD) trend that is extending the network outside the office.
- By Michael Harris
- May 01, 2013
When the first network camera was introduced in 1996, its functionality was pretty bare bones: digitize images and send them across the network to a centralized video management system.
- By Robert Muehlbauer
- May 01, 2013
The transition of existing physical security systems, such as fire and burglar alarm or video surveillance systems, to the next generation of technology has never been easier or more affordable than it is today.
- By Jim McLaughlin
- May 01, 2013
According to IBM, 2.5 quintillion new bytes of information are created each day—that’s 1 with 18 trailing zeros. The explosion of “Big Data” has touched every industry. Video surveillance is no exception.
- By Paul Leury
- May 01, 2013
What you don’t know about PoE technology could actually be costing you business. Once you understand its broad usefulness and the numerous applications it supports, the more you realize it’s a perfect fit for an incredible number of customers and vertical markets.
- By Steven Olen
- May 01, 2013
Although video analytics have been around for years in various forms, they haven’t always been easy to use, or economical, at least not for a small business owner.
- By David Klein
- Apr 01, 2013
FMC Corp. is a diversified, chemical company with leading positions in agricultural, industrial and consumer markets. Since the company’s inception in 1883, FMC has been providing solutions to companies worldwide and to their customers.
- By Pramod Akkarachittor
- Apr 01, 2013
The increasing demands put on networks by mobile devices and bring-your-own-device programs, virtualization and private clouds, and the transition to IPv6 have created greater complexity and risk for IT teams to manage.
PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.
- By Ronnie Pennington
- Mar 01, 2013
When developing IP surveillance installations, many security system integrators and IP-Surveillance network designers have turned to PoE technology, and for good reason. Using PoE cameras and switches eliminates the need for separate power and data cables, thus simplifying installation, increasing flexibility for camera locations and saving money.
- By Steven Olen
- Feb 07, 2013