Convergence has come, and while there are still analog cameras being produced, bought and installed, the security industry has become a networked prism.
- By Ralph C. Jensen
- Oct 01, 2012
The lesson of Pandora could be, in short, that containers secure enough to lockdown all the evil in the world are probably secure enough to protect good things, too.
- By Naeem Zafar
- Oct 01, 2012
The individual cash pay-outs might be small, but for Texas Title Loans—a chain of 14 short-term loan shops stretching from Dallas to San Antonio—keeping an eye on the till was creating big problems.
- By Matt Krebs
- Oct 01, 2012
Engineering researchers at the University of Arkansas have received funding from the National Science Foundation to create distortion-tolerant communications for wireless networks that use very little power. The research will improve wireless sensors deployed in remote areas where these systems must rely on batteries or energy-harvesting devices for power.
Brivo Systems LLC, provider of cloud applications for security management, recently announced that several properties in the Barefoot Resort complex in Myrtle Beach, S.C. have deployed the Brivo ACS WebService cloud-based solution to improve safety and security. STOP Security is the dealer and installer for this large-scale project.
Schneider Electric recently announced the successful expansion of its Pelco by Schneider Electric Endura IP video management system (VMS) in the newly opened Terminal 3 at McCarran International Airport in Las Vegas.
Milestone Systems, the open platform company for IP video management software (VMS), will heighten its focus on development by starting up a new international business unit, Incubation and Ventures, with locations in Silicon Valley, California, and at the Danish headquarters. The goal is to develop new products and services with high potential for market superiority and differentiation, to achieve additional growth by cultivating new Milestone ventures.
It begins with a single system. It could be an access control system or a video system, but for a time it is enough to serve the company’s needs.
Security principles have not changed much in the past 30 years, but the application of those principles is shifting daily. Addressing integrated security disciplines to ensure a cohesive and collaborative security solutions environment in any organization requires a number of coordinated things to happen efficiently.
- By Doug Powell
- Aug 16, 2012
During the last 10-15 years, the retail industry has experienced a transformation from traditional brick and mortar store to newer technology platforms such as e-commerce, powerful search engines and social media. As a result, brick and mortar retailers have had to re-visit their strategic priorities to focus on higher levels of customer experience, channel convergence plans and new marketing and merchandizing approaches. Alongside, price pressure and lower margins continue to require retailers to drive higher efficiencies in store operations through improved workforce management, product placement and store layouts.
- By Debjit Das
- Aug 14, 2012
Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.
- By Bill Morrow
- Aug 01, 2012
IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.
- By Greg Peratt
- Aug 01, 2012
To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.
- By Vance Kozik
- Aug 01, 2012
Texas Children’s Hospital recently added a new high-rise facility, the Pavilion for Women, to its already impressive five-building campus in the heart of the Texas Medical Center in Houston.
- By Beth Welch
- Aug 01, 2012
Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.
- By Ronnie Rittenberry
- Aug 01, 2012
The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.
- By Chris Jensen
- Aug 01, 2012
Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision.
VSS Monitoring has earned the 2012 Global Competitive Strategy Leadership Award in the infrastructure packet broker market from Frost & Sullivan.
A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.
Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.
- By Jeff Whitney
- Jul 01, 2012