Network-Centric Security


The Connected World

The Connected World

The abundance of networked solutions and devices—both security and nonsecurity— has exploded in recent years, providing unparalleled convenience and efficiency.

The Cloud Keeps Evolving in 2017

The Cloud Keeps Evolving in 2017

Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Several routers, including those in the popular “Nighthawk” series, are affected.

FLIR Launches Second Generation FLIR Meridian Network Video Recorder

Latest all-in-one NVR offers advanced embedded enterprise video management features for small and medium business users.

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Now, the understanding of cloud technology and its value are clear, but safety often comes into question for security professionals.

Sophisticated Attacks

Sophisticated Attacks

With cyber-attacks on the ascent, the need to strengthen the security posture and be responsive is top of mind for CIOs, CEOs and CISOs. Security is closely interlinked to all aspects of the business and has a direct bearing on business reputation, privacy and intellectual property

Securing The Network

Securing The Network

It is an understatement to say that IP networks have been a game changer for specifying, installing or managing video security and surveillance systems.

Software Defined

As physical security technology continues to advance in both complexity and capability, it is increasingly bumping into and being influenced by other technology segments.



Securing Confidences

Manufacturing companies are placing increasing emphasis on data security throughout their operations to protect confidential data and to validate their systems are protected against unauthorized and unwanted changes.

Widen The Approach

Widen The Approach

Remember the Jurassic Age of organizational security? You built the stronghold, hardened the perimeter, established a set of rules and walked away. Security? Done.

Wake Up!

Megapixel technology has been a tremendously disruptive force in the security industry, as the superior image quality made possible by high-resolution imaging has led to increased capabilities and effectiveness of video surveillance.

The Top 3 Trends

The Top 3 Trends

Cloud environments give companies a cost-effective, easy-to-use data store solution. In fact, analysts predict that cloud spending will cross a $200 billion tipping point in 2016.

Your Best Project: Ten Security Design Tools You Must Try

Your Best Project: Ten Security Design Tools You Must Try

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios.

The Top 3 Trends

The Top 3 Trends

Cloud environments give companies a cost-effective, easy-to-use data store solution. In fact, analysts predict that cloud spending will cross a $200 billion tipping point in 2016.

The Risk Profile

The Risk Profile

It’s become clear that the likelihood of cyber attacks isn’t a question of “if,” but rather a question of “when.”

Who is the Next Gen Worker?

Who is the Next Gen Worker?

Today’s workplace is far different from 15, five, even two years ago. Employees are expected to get more done, in a shorter amount of time, with more distractions than ever before.

Hello Internet

Hello Internet

Phishing is a problem for everyone from consumers to businesses to governments.

A Practical Defense

A resilient electric power grid is critical to a wide range of essential services and is a highly complex mosaic of technologies.

Securing the Backstreets of South L.A.

Securing the Backstreets of South L.A.

How Fluidmesh technology is making a high-risk neighborhood safer.

Dave Larson, COO of Corero Network Security, discusses DDoS attacks.

Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods

DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.

  • Remembering 9/11 Remembering 9/11

    In this episode, Security Today Editor-in-Chief Ralph C. Jensen Talks with Steve Karoly about security and transportation issues, specifically airport, airline and passenger security. It is the 20th anniversary of the 9/11 terror attacks in New York, the Pentagon and Shanksville, PA. Much has changed concerning security efforts about airport transportation security. The conversation talks about the role that technology plays in protecting the flying public and steps taken to ensure there hasn’t been a successful terrorist attack on a U.S. airliner since 9/11. Checkpoint and screening are evolving at a rapid pace, and the conversation centers on new measures and technologies that are being integrated into checkpoints.

Digital Edition

  • Security Today Magazine - July August 2021

    July August 2021

    Featuring:

    • Tee Up the Security
    • Listen Clearly
    • Turning to the Cloud
    • COVID-19 The Final Push
    • Redefining Security

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety