System designers must ensure that sufficient storage is available to archive video for the required length of time and at the required frame rate and resolution.
- By Robert Kramer
- Jul 01, 2012
In the realm of security and video surveillance, as in other markets, “new and improved” is in demand. The latest version of any product can do more, do it better, do it easier -- and customers are conditioned to stay current with the latest technologies.
- By Gadi Piran
- Jun 18, 2012
Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.
The business proposition of Plato’s Closet, a popular consignment store chain, differs from those of upscale department stores and big box retail outlets.
- By Mary Wilbur
- Jun 04, 2012
Even though the first product launch of a network camera happened in 1996, it was a little more than a decade ago before the device began appearing in the physical security arena.
- By Fredrik Nilsson
- Jun 04, 2012
Several months ago, I noticed a set of tire tracks running across my front lawn. Knowing that neither my wife nor I enjoy offroading on our yard, I did some investigative work.
- By John L. Moss
- Jun 04, 2012
The Nebraska Medical Center is the largest healthcare facility in the state, with 624 licensed beds. Administrators wanted to improve the safety of the facility’s at-risk patients who require 24/7 observation, while also reducing staff and overhead requirements.
- By Courtney Pedersen
- Jun 04, 2012
How does one of the largest railway companies in the world protect its passengers from terrorist attacks and sabotage?
A few years back, a number of leading IP surveillance manufacturers got together to discuss the development of an organization that would promote and develop IP standards.
- By Ian Johnston
- Jun 01, 2012
Axis Communication, a video-surveillance company, is now ranked as the number one global manufacturer of surveillance cameras in the latest IMS Research report.
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself.
GFI Software, a provider of web-monitoring software and security, has released a report citing the 10 most prevalent cyber-threats detected in April. The report says cybercriminals exploited people who use social networking sites Facebook, Twitter, Tumblr and Pinterest to spread malware and spam surveys.
Merck Pharmaceuticals has installed an Arecont Vision megapixel technology solution at their new facility in Mexico to help ensure that all activity and incidents are captured in high-resolution video.
Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.
AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.
Video surveillance and remote monitoring company mobiDEOS Inc. announces that Arnold Clark Photography, one of the oldest and largest photography studios in Omaha, Nebraska, uses MobileCamViewer to monitor activity and protect retail interests at its downtown business location.
Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.
With new security technology operating in its 68 stores, Myer, Australia’s largest department store group, has shown shoplifters that their game is up.
This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favored by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report.
Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according to the Data Loss Straw Poll, a national survey published today by CDW LLC.