Networking Security


What’s in Your BYOD World?

What’s in Your BYOD World?

As network security professionals are acutely aware, they must be continuously vigilant to meet the ever-evolving threats driven by the bring your own device (BYOD) trend that is extending the network outside the office.

Biometrics on the Move

Biometrics on the Move

Multiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card.

Boosting Legacy Infrastructure

Boosting Legacy Infrastructure

The transition of existing physical security systems, such as fire and burglar alarm or video surveillance systems, to the next generation of technology has never been easier or more affordable than it is today.

The Edge of Intelligence

The Edge of Intelligence

When the first network camera was introduced in 1996, its functionality was pretty bare bones: digitize images and send them across the network to a centralized video management system.

Mesh Meets Mining - Video surveillance bolsters safety, security at Wyoming operation

Mesh Meets Mining

FMC Corp. is a diversified, chemical company with leading positions in agricultural, industrial and consumer markets. Since the company’s inception in 1883, FMC has been providing solutions to companies worldwide and to their customers.

more than analytics - small business owners took for tools to improve productivity

More Than Analytics

Although video analytics have been around for years in various forms, they haven’t always been easy to use, or economical, at least not for a small business owner.

Wipro and Infoblox Partnership Extends Network Control to Global Organizations

Wipro and Infoblox Partnership Extends Network Control to Global Organizations

The increasing demands put on networks by mobile devices and bring-your-own-device programs, virtualization and private clouds, and the transition to IPv6 have created greater complexity and risk for IT teams to manage.

Fully Powered

Fully Powered

PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.



Six Steps To Choosing Your Next Gen Intrusion Prevention System

Six Steps To Choosing Your Next Gen Intrusion Prevention System

IT professionals are adopting the latest technologies to meet increasing bandwidth demands, create higher and faster performing networks and increase availability.

get smart with poe

Get Smart With POE

When developing IP surveillance installations, many security system integrators and IP-Surveillance network designers have turned to PoE technology, and for good reason. Using PoE cameras and switches eliminates the need for separate power and data cables, thus simplifying installation, increasing flexibility for camera locations and saving money.

Cellular Challenges

Cellular Challenges

Connection of industrial network devices with a cellular modem can be challenging. In most cases, industrial network devices are operating backwards from how typical consumers utilize an Internet connection over a cellular modem.

Researchers Work to Counter Spear Phishing Attacks

The email resembled the organization’s own employee e-newsletter and asked recipients to visit a website to confirm that they wanted to continue receiving the newsletter. Another email carried an attachment it said contained the marketing plan the recipient had requested at a recent conference. A third email bearing a colleague’s name suggested a useful website to visit.

Straight to the Heart of Cyber Security, Warfare

We often talk about security in terms of commercial and industrial ventures, but the military also speaks of security, and their message varies little from what we hear at tradeshows. In fact, the military is quite interested in private industry partnering where there is value and productivity is placed on many communities in our nation.

Worlds Colliding

There’s no question that the 21st century has brought significant change to security solutions. An abundance of connectivity options and the application of technologies—such as IP, virtualization, hosted solutions and mobile—are enhancing the way we secure the enterprise and helping to improve security.

Brisbane Markets Ltd. Upgrades to Megapixel Imaging

Arecont Vision cameras provide an expanded coverage area at a 150-acre produce facility for Brisbane Markets Ltd.

IQinVision and Prism Skylabs Sell More Orange Juice for SF Café

Prism’s sophisticated video analytics software uses IQeye HD megapixel images to create valuable intelligence.

Arecont Vision Megapixel Cameras Secure Gistex Textile Plants in Indonesia

SurroundVideo Panoramic and MegaView IR Bullet-style cameras secure the facility and production operations in Indonesia textile plants.

If You Thought Megapixel Cameras Were More Expensive, Think Again

There is a misconception in the security industry that megapixel cameras are more expensive than conventional cameras. Don’t believe it.

Securing The Coming M2M Communications Boom

It is beyond dispute that Machine to Machine (M2M) technology and communications will influence our daily personal and business lives in the coming years.

Distributed Storage Done Right

Scalable system architectures have been the source of many debates within the security industry.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.