Wireless Networks


Vivint Looks to Expand Smart Home Security to Your Neighborhood

Vivint Looks to Expand Smart Home Security to Your Neighborhood

Vivint has introduced a free app called, "Streety" which allows neighbors to share live video feeds from their home security cameras.

3 Plead Guilty in Mirai Botnet-Related Charges

3 Plead Guilty in Mirai Botnet-Related Charges

Three defendants have pleaded guilty to charges involving the Mirai botnet that was used to knock out several major websites last year, according to court documents unsealed on Tuesday.

Survey Reveals Serious IoT Concerns

Survey Reveals Serious IoT Concerns

The survey was based on responses from 603 IT and line-of-business decision-makers involved in enterprise security teams across the US, UK, Germany, France, Australia and New Zealand.

Providing a Network Link

Providing a Network Link

Outdoor wireless bridges are used to provide a network link from one location to another. You may want to network surveillance cameras back to your main office building, or share Internet and network access with another building on your campus.

The Next Big Step

The Next Big Step

Individuals have found that their phones and other smart devices can be used in their own homes to operate locks, and—along with the push for more IoT-enabled devices at work in general—they have come to expect the same level of sophistication and convenience at work.

How Real Time Media Can Solidify Security and Save Money

How Real Time Media Can Solidify Security and Save Money

Protecting physical spaces and facilities is an ever-present problem. As bad actors continue to seek unlawful entry in innovative ways and unforeseeable disasters like fires continue to exist, alarm systems need to keep pace and leverage new technologies to prevent and mitigate these risks.

How Cellular Technology is Transforming Home Security and Alarm Panels

How Cellular Technology is Transforming Home Security and Alarm Panels

As traditional phone lines have declined in recent years, many of these new ecosystems are now being directly supported by cellular and IP networks that avoid publicly switched telephone network (PSTN) infrastructure.

Vulnerabilities Revealed in AT&T Modems

Vulnerabilities Revealed in AT&T Modems

Gaping security holes have been discovered in most AT&T U-verse cable modems that would allow remote cyber criminals to access a household’s internet connection as well as any devices connected to it.



Filling the Gap

Filling the Gap

When seconds count in an emergency, such as an active shooter or severe weather, gaps in communication can cost lives. Many schools, businesses and healthcare facilities face the challenge of ensuring comprehensive coverage with their existing emergency mass communication systems.

Eye on the Networks

Eye on the Networks

Fast, resilient wireless networks are ideal for public safety operations requiring real-time data, like surveillance video streams—but as with any technology used for mission-critical applications, there must be a way to ensure the network always functions.

Bandwidth Throttling

VMS Bandwidth Saving Technologies

Beyond the core functionalities of recording and displaying video, one of the most important capabilities of modern Video Management Software platforms is the ability to reduce bandwidth required for transmitting live video.

Security Today Academy Launches, Offers Online Training Courses

Security Today Academy Offers Online Training Courses on Security Technology

Provides needed training and CEUs for the security industry with over 125 courses.

Yahoo Account Key: Convenience Over Security

Yahoo Account Key: Convenience Over Security

Many companies are developing new ways to handle access control and identity authentication for their customers to combat the increasing number of security breaches and the acknowledged flaws in the PIN and password model. Yahoo is the latest company to deploy a service aimed at replacing the password.

Lockdown!

Lockdown!

Wireless locks are increasingly becoming the solution of choice in commercial facilities worldwide.

BrandDog Media Supplies B2B Marketing

After years in the industry, Guy Apple has started an outsourced marketing firm.

Taking a Practical Look at Video Storage in the Cloud

Taking a Practical Look at Video Storage in the Cloud

VSaaS solutions have been around for a while now, offering what many see as more efficient software maintenance and support for their surveillance systems.

Fluidmesh Networks Enables Willow Lane Business Park to Take Care of Business

When Willow Lane Business Park was required to upgrade their existing analogue video surveillance system, the Business Park chose the wireless solutions from Fluidmesh Networks to meet their needs.

Hardened Wireless Ethernet Radio for the Toughest Environments Introduced

ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment, expands the NetWave wireless Ethernet product line with a new, hardened unit for use in challenging applications.

The New Standard

The New Standard

As the Internet of Things becomes more prevalent in today’s world, smart locks and access control systems are at the heart of the revolution.

Hospital Campus Secure

Hospital Campus Secure

University Hospital, the teaching hospital of San Antonio’s University Health Systems is a sprawling campus in the South Texas Medical Center, and one of the health system’s 23 locations across the community that needed the latest security technology.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3