Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
It is no exaggeration to say that network video technology has revolutionized the video surveillance market, and the access control industry is on the verge of a similar revolution.
- By Ola Jönsson
- Feb 06, 2014
The Virtual Desktop Infrastructure (VDI) market is growing fast so much that industry analysts predict it will be worth over $5 billion within the next three years. Why did this take so long to arrive? After all, virtual desktops have been around since the 1990s.
- By Charles P. Williams
- Feb 05, 2014
People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
- By Andrew Braunberg
- Feb 05, 2014
An Advanced Persistent Threat (APT) is a piece of malware that is distinguished by the sophistication of its code, the vectors cybercriminals are choosing for attack and the perseverance with which they’re going after their targets.
- By David Finger
- Feb 04, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
The one thing consistent about malware attacks is that they continue to change quite a bit as time goes by. Initially, many attacks were unstructured and untargeted, indiscriminately honing in on large numbers of hosts in an attempt to find their vulnerabilities. The outcome of these initial attacks was often simple defacement or destruction of data with very few of the overall volume of these attacks covered in the news.
- By Brian Laing
- Feb 04, 2014
The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.
Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks.
- By Márton Illés
- Dec 01, 2013
In the security world, when a company is making the leap from installing traditional, analog, CCTV cameras to IP surveillance, this “thinkahead” strategy is all the more wise.
- By Vance Kozik
- Dec 01, 2013
Last spring, in late March, regional grocer Schnucks Markets reported that the credit card data of more than 2 million customers was stolen by cybercriminals.
- By Jason Mical
- Dec 01, 2013
Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
- By Charles P. Williams
- Dec 01, 2013
Biometrics has a central role to play in today’s authentication solutions, so it is important to revisit and review the many myths and misperceptions associated with this technology.
- By Phil Scarfo
- Nov 01, 2013
Staying on top of a rapidly evolving technology, such as video surveillance, can be challenging.
- By Ali Mahmoud
- Sep 01, 2013
Joe from ABC Company has had the same security management system for 15 years in all of his buildings. He likes it; he knows it inside and out, and he can give training classes to his security guards on how to use it.
- By Kim Rahfaldt
- Aug 01, 2013
In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.
- By Vince Ricco
- Aug 01, 2013
A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.
- By Steven Olen
- Aug 01, 2013
What you don’t know about PoE technology could actually be costing you business. Once you understand its broad usefulness and the numerous applications it supports, the more you realize it’s a perfect fit for an incredible number of customers and vertical markets.
- By Steven Olen
- May 01, 2013
According to IBM, 2.5 quintillion new bytes of information are created each day—that’s 1 with 18 trailing zeros. The explosion of “Big Data” has touched every industry. Video surveillance is no exception.
- By Paul Leury
- May 01, 2013
Located in the heart of Hollywood, Calif., The Ricardo Montalbán Foundation Theatre, named after the late actor and performing arts patron, is a venue for diverse cultural events.
- By Ralph C. Jensen
- May 01, 2013