IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.
- By Greg Peratt
- Aug 01, 2012
To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.
- By Vance Kozik
- Aug 01, 2012
The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.
- By Chris Jensen
- Aug 01, 2012
Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.
- By Ronnie Rittenberry
- Aug 01, 2012
Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.
- By Bill Morrow
- Aug 01, 2012
VSS Monitoring has earned the 2012 Global Competitive Strategy Leadership Award in the infrastructure packet broker market from Frost & Sullivan.
Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision.
A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.
System designers must ensure that sufficient storage is available to archive video for the required length of time and at the required frame rate and resolution.
- By Robert Kramer
- Jul 01, 2012
Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.
- By Jeff Whitney
- Jul 01, 2012
In the realm of security and video surveillance, as in other markets, “new and improved” is in demand. The latest version of any product can do more, do it better, do it easier -- and customers are conditioned to stay current with the latest technologies.
- By Gadi Piran
- Jun 18, 2012
Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.
The business proposition of Plato’s Closet, a popular consignment store chain, differs from those of upscale department stores and big box retail outlets.
- By Mary Wilbur
- Jun 04, 2012
Several months ago, I noticed a set of tire tracks running across my front lawn. Knowing that neither my wife nor I enjoy offroading on our yard, I did some investigative work.
- By John L. Moss
- Jun 04, 2012
How does one of the largest railway companies in the world protect its passengers from terrorist attacks and sabotage?
The Nebraska Medical Center is the largest healthcare facility in the state, with 624 licensed beds. Administrators wanted to improve the safety of the facility’s at-risk patients who require 24/7 observation, while also reducing staff and overhead requirements.
- By Courtney Pedersen
- Jun 04, 2012
Even though the first product launch of a network camera happened in 1996, it was a little more than a decade ago before the device began appearing in the physical security arena.
- By Fredrik Nilsson
- Jun 04, 2012
A few years back, a number of leading IP surveillance manufacturers got together to discuss the development of an organization that would promote and develop IP standards.
- By Ian Johnston
- Jun 01, 2012
Axis Communication, a video-surveillance company, is now ranked as the number one global manufacturer of surveillance cameras in the latest IMS Research report.
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself.