IT Security


Making the Case for Cloud Security

Making the Case for Cloud Security

The cloud continues to be a major topic of discussion across the security and surveillance industry. Cloud adoption rates are continuing to increase as many customers move past earlier concerns about cloud security and reliability and begin to realize the significant benefits that come with the cloud: efficiency, scale, and cost savings.

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.

Smart City Revolution

Smart buildings are essential building blocks within the complex smart city ecosystem as they contribute significantly to the sustainability of cities. Many governments’ visions of smart cities include not only making urban environments more sustainable.

Taking the fear out of IoT security concerns

Taking the Fear Out of IoT Security Concerns

The IoT presents a huge opportunity market. Every second, 127 new IoT devices are connected to the web, and experts predict that by 2025, that figure will equate to more than 75 billion connected devices overall. Unfortunately, this volume of connected devices brings inevitable security risks.

Coming of Age

Coming of Age

There have been on-going discussions the past several years about how Big Data and Artificial Intelligence (AI) can be used to modernize physical security systems and operations.

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

It is the end of the line for analog phone systems, which can leave alarm companies hanging out to dry trying to figure out if they need to replace costly alarm panels.

Encrypted USB Drives

The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.

Cisco Announces Plan to Acquire Sentryo

Cisco Announces Plan to Acquire Sentryo

Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.



An Iron Solution

An Iron Solution

One of the primary criteria for any surveillance, access or security system is the requirement for a consistent and reliable power source, as even the most complex and expensive system solutions will be rendered useless if power is interrupted.

Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

The company said Wednesday that large, enterprise firms were most likely to focus on cybersecurity and AI. Small and midsize firms are more likely to prioritize DevOps skills, experience with end-user hardware and IT infrastructure proficiency.

How to Protect Your Business from Amazon

How to Protect Your Business from Amazon

If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.

Your Top Data-Exposure Risk: Employees

People are fallible creatures. As the saying goes, nobody’s perfect.

Choosing the Right VMS for Your Business

Choosing the Right VMS for Your Business

Since every business is unique, it comes as no surprise that each has different security needs.

The Next Evolution

The Next Evolution

It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.

Four Video Storage Trends to Watch

Four Video Storage Trends to Watch

Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.

What the FCC

What the FCC's Recall on Net Neutrality Means for Cybersecurity

The FCC has voted to roll back an Obama-era Net Neutrality Rules.

Moving the Discussion Forward

Moving the Discussion Forward

Only a few years ago, the inevitable shift to all things Cloud was met with guarded optimism. But today, the shift is really happening.

Survey Reveals Serious IoT Concerns

Survey Reveals Serious IoT Concerns

The survey was based on responses from 603 IT and line-of-business decision-makers involved in enterprise security teams across the US, UK, Germany, France, Australia and New Zealand.

Hacked Off

Hacked Off

While our industry is fairly good at anticipating and reacting to new physical security threats, we’ve been very slow to react to the clear and present danger from cybersecurity attacks.

Featured

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3