IT Security


Schalge, idOnDemand Form Technology Partnership

Ingersoll Rand Security Technologies, provider of security and safety solutions and manufacturer of Schlage contactless smart credentials and readers, and idOnDemand are partnering to offer a joint solution that consolidates a user’s identity across the enterprise.

Need For Network Security Boosts Growth In Managed Security Service Provider Market, According To Research

New analysis from Frost & Sullivan, North American Managed Security Service Providers (MSSP) Market, finds that the market earned revenues of $1.20 billion in 2009 and estimates this to reach $3.90 billion in 2016.

NIST To Help Accelerate Federal Government’s Adoption Of Secure Cloud Computing

The National Institute of Standards and Technology (NIST) has been designated by Federal Chief Information Officer Vivek Kundra to accelerate the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines in close consultation and collaboration with standards bodies, the private sector and other stakeholders

Research Indicates IT Security Needs Of Mid-Sized Organizations Becoming More Sophisticated

RSA, The Security Division of EMC, recently released the results of two new research initiatives that explore log management priorities for mid-sized organizations.

Poll: Data Loss Is Top Corporate Security Threat

CDW LLC recently announced the results of its IT Threat Prevention Straw Poll, based on a survey of 200 IT security managers and decision makers at medium and large businesses across the United States.

Less Than Half Of Cloud Services Vetted For Security, According To Study

CA Inc. and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently announced a study analyzing significant cloud security concerns that persist among IT professionals when it comes to cloud services used within their organization.

Survey: Employees More Focused On Individual Concerns Than Overall Company IT Security

From prowling social networking sites at work, to overriding their company's installed security so they can access restricted websites, most employees were found to be generally imprudent and ambivalent when it comes to their company's overall security health, according to the 2010 Trend Micro survey on corporate and small business end users.

Survey Looks At Security Management Practices, Compliance Weaknesses

SenSage recently announced the results of an industry survey on security management practices taken during the RSA Conference in March.



Survey: Majority Of Americans Unaware Of Cloud Computing

A majority of U.S. citizens are unaware of how their online data is stored and who secures it, according to a Business Software Alliance (BSA) survey released recently. Approximately one in five U.S. citizens said they were unaware of whether their personal or corporate data is being held “in the cloud,” and 60 percent said they did not know what “in the cloud” means.

Market Trends

Trends in the Market

The use of video surveillance in business began with the introduction of CCTV in the early 1960s. Throughout the years, we have witnessed the rapid uptake of some technologies, while others showed promise but never experienced widespread adoption. Today, there are four trends that are shaping the video industry.

Consumers Confident In Security Of Mobile Devices, According To Research

According to recent research conducted by Unisys Corp., the majority of mobile device users worldwide feel safe using their mobile devices for applications, including airline boarding passes; as payments in stores for low-cost items; or to access online banking.

Survey: Data Security In The Cloud Top Concern For Government Officials

Lockheed Martin and its Cyber Security Alliance partners recently announced the results of a collaborative cloud computing and cyber security survey in a new white paper titled "Awareness, Trust, and Security to Shape Cloud Adoption."

Survey: Most SMBs Lacking Knowledge To Protect Against Online Fraud

Despite highly publicized cybercriminal attacks against businesses and the ongoing rise of malware perpetrated through schemes such as the Mariposa botnet recently dismantled by Panda Security and others, the majority of small and medium-sized businesses are not familiar with the banking Trojans used to attain access to and steal from their online accounts.

Survey: Almost Half Of IT Professionals Say Cloud Computing Risks Outweigh Benefits

Nearly half of U.S. IT professionals say that the risks of cloud computing outweigh the benefits, according to the 2010 ISACA IT Risk/Reward Barometer survey.

Survey: Companies Lack Adequate Policies To Protect Information In The Cloud

Symantec Corp. and the Ponemon Institute, a privacy and information management research firm, recently announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and tools to ensure that sensitive information they put in the cloud remains secure.

Verizon Framework Looks To Standardize Security Incident Reporting

Verizon Business is giving away information that officials believe will help the IT security industry address a critical issue -- the lack of a common standard for the collection of security-incident data and analysis -- with the hopes that it will help the industry fight cybercrime.

Wireless mesh

Challenge or Opportunity?

Wireless has been in the physical security space for years, especially with point-to-point bridges. But the newcomers—especially in the field of wireless mesh—are changing the game. Will wireless be as ubiquitous for outdoor deployments as cable or fiber?

Seattle Tops Report As U.S. City Most Vulnerable To Cyber Crime

Norton from Symantec teamed up with independent research firm Sperling’s BestPlaces to find and expose the nation’s top 10 cities most vulnerable to cybercrime.

Poll: One In 10 Employees Knowingly Violate Company IT Policy

A new Fiberlink Poll published recently showed that more than one in 10 U.S. workers admit to knowingly violating the policies put in place by their companies' IT departments in order to get their work done.

Report: Total Loss Linked To Online Fraud More Than Doubles In 2009

The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), today released the 2009 annual report about fraudulent activity on the Internet.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3