Networking Security


Providing Security

IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.

Safer More Secure Campuses

To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.

Cost-Effective Compliance

The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.

Curbside Security

Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.

Todays Threat Landscape

Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.

VSS Monitoring Recognized as Industry's Leading NPB Provider

VSS Monitoring has earned the 2012 Global Competitive Strategy Leadership Award in the infrastructure packet broker market from Frost & Sullivan.

Lookingglass Integrates iSIGHT's Cyber Threat Analysis

Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision.

Study: Many IT Professionals Believe Cyber Security Has Increased

A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.



From The Edge To The Cloud

System designers must ensure that sufficient storage is available to archive video for the required length of time and at the required frame rate and resolution.

Video Security

Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.

Now is the Time to Upgrade Your VMS Software

In the realm of security and video surveillance, as in other markets, “new and improved” is in demand. The latest version of any product can do more, do it better, do it easier -- and customers are conditioned to stay current with the latest technologies.

Fastmetrics Implements Corero DDoS Defense Technology

Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.

The Perfect Fit

The business proposition of Plato’s Closet, a popular consignment store chain, differs from those of upscale department stores and big box retail outlets.

To The Rescue

Several months ago, I noticed a set of tire tracks running across my front lawn. Knowing that neither my wife nor I enjoy offroading on our yard, I did some investigative work.

Safety On The Railway

How does one of the largest railway companies in the world protect its passengers from terrorist attacks and sabotage?

IP Video Is The Answer

The Nebraska Medical Center is the largest healthcare facility in the state, with 624 licensed beds. Administrators wanted to improve the safety of the facility’s at-risk patients who require 24/7 observation, while also reducing staff and overhead requirements.

What's New At The Edge

Even though the first product launch of a network camera happened in 1996, it was a little more than a decade ago before the device began appearing in the physical security arena.

Into The Air

A few years back, a number of leading IP surveillance manufacturers got together to discuss the development of an organization that would promote and develop IP standards.

Research: Axis Communications Now Top Global Surveillance Camera Provider, Even When Including Analog

Axis Communication, a video-surveillance company, is now ranked as the number one global manufacturer of surveillance cameras in the latest IMS Research report.

Researchers Building Computer System That Can Protect Itself From Online Attacks

In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3