Network-Centric Security


Sandia Cyber Project Looks to Help IT Professionals with DNS Vulnerabilities

Sandia National Laboratories computer scientist Casey Deccio has developed a visualization tool known as DNSViz to help network administrators within the federal government and global IT community better understand Domain Name System Security (DNSSEC) and to help them troubleshoot problems.

IBM Attacks the Complexity of Security with Identity Intelligence

IBM recently announced a new identity intelligence breakthrough designed in IBM labs to provide corporations with a far more sophisticated approach to managing the information employees can access.

Lenzburg Prison Has State-of-the-art IP Video Surveillance

Milestone Systems’ open platform IP video management software is the flexible basis for a customized solution in a new central prison in Switzerland, which has twice as many cameras as guards observing the life of those inside and outside the cells. Approaching the 6-meter high wall of the new prison in Lenzburg, Switzerland, it is already clear at the revolving steel door entrance that those inside are not the only ones under surveillance.

Fifth Third Bank Standardizes on March Networks for Security and Fraud Defense

March Networks, provider of intelligent IP video solutions, recently announced that Fifth Third Bancorp has initiated an upgrade program of its existing March Networks’ video surveillance systems across more than 1,300 full-service retail banking branches, data centers, corporate offices, and operations and cash handling facilities

Fiber Healthy

Fiber Healthy

Miami Dade County schools depend upon superior surveillance.

Doppelganger Danger

Doppelganger Danger

In the world of literature, folklore and myth, the appearance of a doppelganger is generally bad news.

Report: Despite Economic Uncertainty, Outlook for Video Surveillance Market Remains Strong

While the worst of the first global recession has subsided, another, potentially larger and deeper downturn looms on the horizon. Despite this fairly terrifying specter, IMS Research remains confident that demand for CCTV and video surveillance equipment will remain strong through 2012 -- growth for network video surveillance equipment sales is forecast to exceed 25 percent.

Real World Opportunities

Real World Opportunities

With smart functions incorporated into today’s network video cameras, images can be analyzed before they leave the camera, which can then trigger an alarm or relay other data to enable a system-wide response.



12 Days of Christmas

12 Days of Christmas Surveillance Style

From Black Friday all the way through the returns season, the sheer uptick in shoppers during the holiday season is daunting for retailers of any size.

The Complexity of Mass Notification

The Complexity of Mass Notification

To better understand what is needed and the current state of mass notifications, Siemens undertook a detailed analysis of U.S. colleges and universities, taking a hard look at information provided to the government as part of the Clery Act. The company released the results in October in a white paper.

The Logistics of Security

The Logistics of Security

Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.

Aggressively Priced Clouds

Aggressively Priced Clouds

A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins.

Critical Fire Protection for a Critcal Facility

Telecom office building and data center employed advanced fire protection with expandable, cost-conscious networking capabilities.

Software Helps FBI Crack International Cybercrime Case

University of Alabama at Birmingham researchers helped the Federal Bureau of Investigation and NASA Office of Inspector General identify seven foreign nationals arrested for a massive, sophisticated Internet fraud that infected more than 400 million computers in 100-plus countries and scammed $14 million.

New York in November

New York in November

Next week, I’ll be traveling to New York City to attend ISC Solutions, the northeast security event for dealers, integrators, installers and end users.

Businesses Increasingly Under Attack From Cyber-Security Threats

SonicWALL, Inc., provider of intelligent network security and data protection solutions, recently issued its mid-year cyber-threat intelligence bulletin.

Come, Celebrate the Anniversary

When you attend a tradeshow, you expect certain educational events. I believe we have added a new angle of education to this year’s ASIS event in Orlando. Several months in the planning, Security Products magazine is hosting a roundtable discussion and 15th anniversary party that will focus on IP cameras and networks. It also just happens to be the 15th anniversary of the IP camera, and the same anniversary of Security Products magazine.

Setting Sail With Network Video

Setting Sail With Network Video

When your course curriculum includes 276 days at sea, it’s obvious that your college experience will be a little different from the average undergrad. Living off campus takes on a whole new meaning, and sleeping through just one class might lead to a false step into the open ocean. Training to become a merchant marine officer is serious work, and the Great Lakes Maritime Academy has been effectively preparing its cadets on the shores of Lake Michigan for more than 40 years.

Strategies to Safeguard Data

Strategies To Safeguard Data

Industrial security has always been a challenge, with often vast areas needing coverage that is effective—and efficient. As with many other technologies, advances in electronic security and surveillance, both physical and cyber, have created new challenges as they have addressed and conquered earlier problems.

Featured

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3