Networking Security


Sandia Cyber Project Looks to Help IT Professionals with DNS Vulnerabilities

Sandia National Laboratories computer scientist Casey Deccio has developed a visualization tool known as DNSViz to help network administrators within the federal government and global IT community better understand Domain Name System Security (DNSSEC) and to help them troubleshoot problems.

IBM Attacks the Complexity of Security with Identity Intelligence

IBM recently announced a new identity intelligence breakthrough designed in IBM labs to provide corporations with a far more sophisticated approach to managing the information employees can access.

Lenzburg Prison Has State-of-the-art IP Video Surveillance

Milestone Systems’ open platform IP video management software is the flexible basis for a customized solution in a new central prison in Switzerland, which has twice as many cameras as guards observing the life of those inside and outside the cells. Approaching the 6-meter high wall of the new prison in Lenzburg, Switzerland, it is already clear at the revolving steel door entrance that those inside are not the only ones under surveillance.

Fifth Third Bank Standardizes on March Networks for Security and Fraud Defense

March Networks, provider of intelligent IP video solutions, recently announced that Fifth Third Bancorp has initiated an upgrade program of its existing March Networks’ video surveillance systems across more than 1,300 full-service retail banking branches, data centers, corporate offices, and operations and cash handling facilities

Fiber Healthy

Fiber Healthy

Miami Dade County schools depend upon superior surveillance.

Doppelganger Danger

Doppelganger Danger

In the world of literature, folklore and myth, the appearance of a doppelganger is generally bad news.

Report: Despite Economic Uncertainty, Outlook for Video Surveillance Market Remains Strong

While the worst of the first global recession has subsided, another, potentially larger and deeper downturn looms on the horizon. Despite this fairly terrifying specter, IMS Research remains confident that demand for CCTV and video surveillance equipment will remain strong through 2012 -- growth for network video surveillance equipment sales is forecast to exceed 25 percent.

Real World Opportunities

Real World Opportunities

With smart functions incorporated into today’s network video cameras, images can be analyzed before they leave the camera, which can then trigger an alarm or relay other data to enable a system-wide response.



12 Days of Christmas

12 Days of Christmas Surveillance Style

From Black Friday all the way through the returns season, the sheer uptick in shoppers during the holiday season is daunting for retailers of any size.

The Complexity of Mass Notification

The Complexity of Mass Notification

To better understand what is needed and the current state of mass notifications, Siemens undertook a detailed analysis of U.S. colleges and universities, taking a hard look at information provided to the government as part of the Clery Act. The company released the results in October in a white paper.

The Logistics of Security

The Logistics of Security

Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.

Aggressively Priced Clouds

Aggressively Priced Clouds

A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins.

Critical Fire Protection for a Critcal Facility

Telecom office building and data center employed advanced fire protection with expandable, cost-conscious networking capabilities.

Software Helps FBI Crack International Cybercrime Case

University of Alabama at Birmingham researchers helped the Federal Bureau of Investigation and NASA Office of Inspector General identify seven foreign nationals arrested for a massive, sophisticated Internet fraud that infected more than 400 million computers in 100-plus countries and scammed $14 million.

New York in November

New York in November

Next week, I’ll be traveling to New York City to attend ISC Solutions, the northeast security event for dealers, integrators, installers and end users.

Businesses Increasingly Under Attack From Cyber-Security Threats

SonicWALL, Inc., provider of intelligent network security and data protection solutions, recently issued its mid-year cyber-threat intelligence bulletin.

Come, Celebrate the Anniversary

When you attend a tradeshow, you expect certain educational events. I believe we have added a new angle of education to this year’s ASIS event in Orlando. Several months in the planning, Security Products magazine is hosting a roundtable discussion and 15th anniversary party that will focus on IP cameras and networks. It also just happens to be the 15th anniversary of the IP camera, and the same anniversary of Security Products magazine.

Setting Sail With Network Video

Setting Sail With Network Video

When your course curriculum includes 276 days at sea, it’s obvious that your college experience will be a little different from the average undergrad. Living off campus takes on a whole new meaning, and sleeping through just one class might lead to a false step into the open ocean. Training to become a merchant marine officer is serious work, and the Great Lakes Maritime Academy has been effectively preparing its cadets on the shores of Lake Michigan for more than 40 years.

Strategies to Safeguard Data

Strategies To Safeguard Data

Industrial security has always been a challenge, with often vast areas needing coverage that is effective—and efficient. As with many other technologies, advances in electronic security and surveillance, both physical and cyber, have created new challenges as they have addressed and conquered earlier problems.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3