Networking Security


Why AI and Cloud are Topping 2022 Trends Lists

Why AI and Cloud are Topping 2022 Trends Lists

It is the time of year for reflections, resolutions, predictions and lists. News stories about trends are everywhere, with tips about getting businesses on track for success in 2022.

Delivering Actionable Insights

Delivering Actionable Insights

Artificial intelligence (AI) enables machines to learn, understand, and act accordingly – giving it enormous potential.

Taking the fear out of IoT security concerns

Taking the Fear Out of IoT Security Concerns

The IoT presents a huge opportunity market. Every second, 127 new IoT devices are connected to the web, and experts predict that by 2025, that figure will equate to more than 75 billion connected devices overall. Unfortunately, this volume of connected devices brings inevitable security risks.

Cashing in on Your VMS System

Cashing in on Your VMS System

In banking today, the FBI and Federal Deposit Insurance Corp. (FDIC), have mandated security standards that require a minimum number of cameras and camera resolution in each facility.

The Advantages of Integrating Networking and Security with SASE for Today’s Organizations

The Advantages of Integrating Networking and Security with SASE for Today’s Organizations

The security approaches we counted on to secure our networks and protect our IT resources against attackers are no longer up to the task.

Video Surveillance Takes to the Cloud

Video Surveillance Takes to the Cloud

It was not all that long ago when discussion of professional security services on the Cloud seemed all but preposterous due to bandwidth and security concerns.

Connecting Networks

Connecting Networks

The Internet of Things (IoT) is turning dumb houses into smart homes. It is also revolutionizing access control systems for all types of commercial buildings, from small offices and retail shops to enterprise campuses and sprawling factories.

Coming of Age

Coming of Age

There have been on-going discussions the past several years about how Big Data and Artificial Intelligence (AI) can be used to modernize physical security systems and operations.



Survey: 62% of Respondents Don

Survey: 62% of Respondents Don't Care, or Aren't Sure if they Care, if the AI Used in their Video Security is Biased

Pro-Vigil, a provider of remote video monitoring, management and crime deterrence solutions, recently published a research report that found organizations are more concerned about their Artificial Intelligence (AI)-powered video surveillance system's ability to deter crime than any potential bias issues.

The Changing Marketplace

The Changing Marketplace

As the Internet of Things (IoT) has continued to evolve, so, too, have the options for pairing smart home integration with both professionally monitored and self-monitored home security solutions.

SIA Opposes Reintroduction of Facial Recognition & Biometric Technology Moratorium Act

SIA Opposes Reintroduction of Facial Recognition & Biometric Technology Moratorium Act

The Security Industry Association (SIA) has announced its strong opposition to the Facial Recognition and Biometric Technology Moratorium Act

The Power to Predict

The Power to Predict

Imagine when you know what’s next. You can respond before potential situations occur and anticipate business opportunities that create new revenue streams or reduce operational costs.

Technology counts on AI to authenticate and identify people

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

Connected Doesn’t Mean Protected

Connected Doesn’t Mean Protected

When it comes to device and systems connectivity, surge protection solutions can mitigate risk

Enterprise “Lift and Shift” to the Public Cloud Requires a Newer Type of API and Cloud Security Program to Prevent Data Breaches

Enterprise “Lift and Shift” to the Public Cloud Requires a Newer Type of API and Cloud Security Program to Prevent Data Breaches

One of our best customers is a Fortune 50 financial services company for homeowners across America.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Current and future uses in the commercial security industry

On a Cloud of its Own

Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

It is the end of the line for analog phone systems, which can leave alarm companies hanging out to dry trying to figure out if they need to replace costly alarm panels.

SASA Secure Networking

How SASE is Defining the Future of Secure Networking

As the digital transformation trend continues to highlight business agendas, now more than ever enterprises need infrastructure solutions that enable them to connect more locations at faster speeds.

A True Calling

A True Calling

If the pandemic has taught us anything, it’s that secure remote access to systems is no longer a “nice to have” feature.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3