Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.
- By Amit Cohen
- Sep 01, 2015
Eighty-one percent of health care executives say that their organizations have been compromised by at least one malware, botnet or other cyber-attack during the past two years
Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.
- By Mitchell Kane
- Aug 01, 2015
Over the last year, we have witnessed a series of staggering data breaches affecting some of the world’s leading businesses— with each breach seemingly worse than the last in terms of financial and reputational damage.
- By Philip Lieberman
- Aug 01, 2015
Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.
- By Jonathan Sander
- Aug 01, 2015
Cyberattacks are one of the greatest threats facing global businesses today.
- By Lee Pernice
- Aug 01, 2015
Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.
- By Ralph C. Jensen
- Aug 01, 2015
Three preloaded models include new color scheme, adjustable backlit display and capability to attach test modules.
Catalysts include improvements in global economy and successful anti-knockoff education effort aimed at differentiating imitators.
Handheld tester identifies sources of network congestion, troubleshoots PoE and VoIP devices, locates Wi-Fi deadspots.
The tight-bend radius of these slim cables make for a significantly easier fit behind hard-to-reach TVs and AV racks.
Umberto Malesci explains what IoT is, what it does and gives real-world examples of IoT in action.
- By Ginger Hill
- May 29, 2015
Free software allows datacom professionals to download, manage, edit and print pdf reports in three easy steps.
Seemingly limitless system applications allows manufacturers to significantly increase capabilities of cameras and other devices.
- By Ronnie Pennington
- May 12, 2015
Low cost, feature rich with large backlit displays.
The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.
Are your physical security devices attached to the same network as your sensitive business data?
- By Vince Ricco
- May 01, 2015
Security managers are more aware than ever that information security requires a layered approach with components addressing every point of intrusion on the corporate network.
- By Julie Olenski
- May 01, 2015
Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.
- By Ralph C. Jensen
- May 01, 2015
Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.
- By Randy Smith
- May 01, 2015