Networking Security


Sandia Cyber Project Looks to Help IT Professionals with DNS Vulnerabilities

Sandia National Laboratories computer scientist Casey Deccio has developed a visualization tool known as DNSViz to help network administrators within the federal government and global IT community better understand Domain Name System Security (DNSSEC) and to help them troubleshoot problems.

IBM Attacks the Complexity of Security with Identity Intelligence

IBM recently announced a new identity intelligence breakthrough designed in IBM labs to provide corporations with a far more sophisticated approach to managing the information employees can access.

Lenzburg Prison Has State-of-the-art IP Video Surveillance

Milestone Systems’ open platform IP video management software is the flexible basis for a customized solution in a new central prison in Switzerland, which has twice as many cameras as guards observing the life of those inside and outside the cells. Approaching the 6-meter high wall of the new prison in Lenzburg, Switzerland, it is already clear at the revolving steel door entrance that those inside are not the only ones under surveillance.

Fifth Third Bank Standardizes on March Networks for Security and Fraud Defense

March Networks, provider of intelligent IP video solutions, recently announced that Fifth Third Bancorp has initiated an upgrade program of its existing March Networks’ video surveillance systems across more than 1,300 full-service retail banking branches, data centers, corporate offices, and operations and cash handling facilities

Fiber Healthy

Fiber Healthy

Miami Dade County schools depend upon superior surveillance.

Doppelganger Danger

Doppelganger Danger

In the world of literature, folklore and myth, the appearance of a doppelganger is generally bad news.

Report: Despite Economic Uncertainty, Outlook for Video Surveillance Market Remains Strong

While the worst of the first global recession has subsided, another, potentially larger and deeper downturn looms on the horizon. Despite this fairly terrifying specter, IMS Research remains confident that demand for CCTV and video surveillance equipment will remain strong through 2012 -- growth for network video surveillance equipment sales is forecast to exceed 25 percent.

Real World Opportunities

Real World Opportunities

With smart functions incorporated into today’s network video cameras, images can be analyzed before they leave the camera, which can then trigger an alarm or relay other data to enable a system-wide response.



12 Days of Christmas

12 Days of Christmas Surveillance Style

From Black Friday all the way through the returns season, the sheer uptick in shoppers during the holiday season is daunting for retailers of any size.

The Complexity of Mass Notification

The Complexity of Mass Notification

To better understand what is needed and the current state of mass notifications, Siemens undertook a detailed analysis of U.S. colleges and universities, taking a hard look at information provided to the government as part of the Clery Act. The company released the results in October in a white paper.

The Logistics of Security

The Logistics of Security

Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.

Aggressively Priced Clouds

Aggressively Priced Clouds

A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins.

Critical Fire Protection for a Critcal Facility

Telecom office building and data center employed advanced fire protection with expandable, cost-conscious networking capabilities.

Software Helps FBI Crack International Cybercrime Case

University of Alabama at Birmingham researchers helped the Federal Bureau of Investigation and NASA Office of Inspector General identify seven foreign nationals arrested for a massive, sophisticated Internet fraud that infected more than 400 million computers in 100-plus countries and scammed $14 million.

New York in November

New York in November

Next week, I’ll be traveling to New York City to attend ISC Solutions, the northeast security event for dealers, integrators, installers and end users.

Businesses Increasingly Under Attack From Cyber-Security Threats

SonicWALL, Inc., provider of intelligent network security and data protection solutions, recently issued its mid-year cyber-threat intelligence bulletin.

Come, Celebrate the Anniversary

When you attend a tradeshow, you expect certain educational events. I believe we have added a new angle of education to this year’s ASIS event in Orlando. Several months in the planning, Security Products magazine is hosting a roundtable discussion and 15th anniversary party that will focus on IP cameras and networks. It also just happens to be the 15th anniversary of the IP camera, and the same anniversary of Security Products magazine.

Setting Sail With Network Video

Setting Sail With Network Video

When your course curriculum includes 276 days at sea, it’s obvious that your college experience will be a little different from the average undergrad. Living off campus takes on a whole new meaning, and sleeping through just one class might lead to a false step into the open ocean. Training to become a merchant marine officer is serious work, and the Great Lakes Maritime Academy has been effectively preparing its cadets on the shores of Lake Michigan for more than 40 years.

Strategies to Safeguard Data

Strategies To Safeguard Data

Industrial security has always been a challenge, with often vast areas needing coverage that is effective—and efficient. As with many other technologies, advances in electronic security and surveillance, both physical and cyber, have created new challenges as they have addressed and conquered earlier problems.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3