Networking Security


Why AI and Cloud are Topping 2022 Trends Lists

Why AI and Cloud are Topping 2022 Trends Lists

It is the time of year for reflections, resolutions, predictions and lists. News stories about trends are everywhere, with tips about getting businesses on track for success in 2022.

Delivering Actionable Insights

Delivering Actionable Insights

Artificial intelligence (AI) enables machines to learn, understand, and act accordingly – giving it enormous potential.

Taking the fear out of IoT security concerns

Taking the Fear Out of IoT Security Concerns

The IoT presents a huge opportunity market. Every second, 127 new IoT devices are connected to the web, and experts predict that by 2025, that figure will equate to more than 75 billion connected devices overall. Unfortunately, this volume of connected devices brings inevitable security risks.

Cashing in on Your VMS System

Cashing in on Your VMS System

In banking today, the FBI and Federal Deposit Insurance Corp. (FDIC), have mandated security standards that require a minimum number of cameras and camera resolution in each facility.

The Advantages of Integrating Networking and Security with SASE for Today’s Organizations

The Advantages of Integrating Networking and Security with SASE for Today’s Organizations

The security approaches we counted on to secure our networks and protect our IT resources against attackers are no longer up to the task.

Video Surveillance Takes to the Cloud

Video Surveillance Takes to the Cloud

It was not all that long ago when discussion of professional security services on the Cloud seemed all but preposterous due to bandwidth and security concerns.

Connecting Networks

Connecting Networks

The Internet of Things (IoT) is turning dumb houses into smart homes. It is also revolutionizing access control systems for all types of commercial buildings, from small offices and retail shops to enterprise campuses and sprawling factories.

Coming of Age

Coming of Age

There have been on-going discussions the past several years about how Big Data and Artificial Intelligence (AI) can be used to modernize physical security systems and operations.



Survey: 62% of Respondents Don

Survey: 62% of Respondents Don't Care, or Aren't Sure if they Care, if the AI Used in their Video Security is Biased

Pro-Vigil, a provider of remote video monitoring, management and crime deterrence solutions, recently published a research report that found organizations are more concerned about their Artificial Intelligence (AI)-powered video surveillance system's ability to deter crime than any potential bias issues.

The Changing Marketplace

The Changing Marketplace

As the Internet of Things (IoT) has continued to evolve, so, too, have the options for pairing smart home integration with both professionally monitored and self-monitored home security solutions.

SIA Opposes Reintroduction of Facial Recognition & Biometric Technology Moratorium Act

SIA Opposes Reintroduction of Facial Recognition & Biometric Technology Moratorium Act

The Security Industry Association (SIA) has announced its strong opposition to the Facial Recognition and Biometric Technology Moratorium Act

The Power to Predict

The Power to Predict

Imagine when you know what’s next. You can respond before potential situations occur and anticipate business opportunities that create new revenue streams or reduce operational costs.

Technology counts on AI to authenticate and identify people

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

Connected Doesn’t Mean Protected

Connected Doesn’t Mean Protected

When it comes to device and systems connectivity, surge protection solutions can mitigate risk

Enterprise “Lift and Shift” to the Public Cloud Requires a Newer Type of API and Cloud Security Program to Prevent Data Breaches

Enterprise “Lift and Shift” to the Public Cloud Requires a Newer Type of API and Cloud Security Program to Prevent Data Breaches

One of our best customers is a Fortune 50 financial services company for homeowners across America.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Current and future uses in the commercial security industry

On a Cloud of its Own

Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

VOCAL Technologies Creates Unique Solution to Help Alarm Companies Make a Smooth Transition from Analog to VoIP Phone Lines

It is the end of the line for analog phone systems, which can leave alarm companies hanging out to dry trying to figure out if they need to replace costly alarm panels.

SASA Secure Networking

How SASE is Defining the Future of Secure Networking

As the digital transformation trend continues to highlight business agendas, now more than ever enterprises need infrastructure solutions that enable them to connect more locations at faster speeds.

A True Calling

A True Calling

If the pandemic has taught us anything, it’s that secure remote access to systems is no longer a “nice to have” feature.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3