It is a conundrum that enterprises and organizations that need to protect their customers’ secure information often must access that secure information to authenticate the identity of a customer. In other words, to prevent a breach, they must risk a breach.
- By Steven Titch
- May 09, 2008
Genetec announced recently that the City of Manchester, United Kingdom, selected Omnicast 4.1 for a major system upgrade project. With approximately 700 analog cameras spread throughout the city, the City of Manchester is gradually migrating to IP, and all cameras will eventually be managed by the IP platform.
In the summer of 2006, Phoenix was in the grip of two serial killing sprees. In both cases, victims were being targeted in outdoor areas. The first case, the Baseline Killer, involved eight rapes and murders near a stretch of Baseline Road at the southern edge of the city. The second case, known as the Serial Shooter, involved 36 random shootings -- six of which were fatal -- of pedestrians and bicyclists throughout the metropolitan area.
- By Steven Titch
- May 06, 2008
Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?
- By Steve Laubenstein
- May 05, 2008
The Boston Marathon is the world's oldest, most prestigious and widely viewed sporting event in the U.S. The magnitude of the event requires a dramatic increase in safety measures to provide event and crowd management, as well as to limit the potential for threats during such large events.
One of New Zealand’s leading financial institutions, the Bank of Zealand is a member of the National Australia Bank group, has assets of NZ $56.4 billion and operates 180 branches across the country. BNZ had been using the same tape-based analog recording system for 16 to 18 years, and officials wanted to upgrade to modern technology.
Imagine if 100 people knocked on your front door each day, but fewer than 10 of them were trustworthy. The rest were crooks, con artists and aspiring criminals. That’s the situation facing today’s Internet users. Some skeptics believe there is no stopping bot networks, phishing schemes and digital scams.
- By Daniel Ryan
- May 01, 2008
ioimage recently announced that Trusal S.A., a leader in the Chilean aquaculture industry, has implemented ioimage video analytics to protect its salmon pools in Puerto Montt from threats approaching from sea and land.
Intransa, producer of shared, scalable and simple external IP storage solutions, recently today that Enjoy Group, a holding company for nine of the largest casinos in Chile, has chosen an IP storage solution by Intransa to serve as the storage backbone of its digital CCTV surveillance system.
NICE Systems Ltd. recently announced that Transnet Freight Rail, the leading provider of logistics and the largest rail operator in South Africa, has decided to standardize on NICE, undertaking a multi million-dollar project to implement NiceVision Net, NICE's end-to-end solution for IP video security.
The IP User Group’s IP-in-Action Live conference moves to the Washington, D.C. area Tuesday, May 13, with a full-day program a speakers and panels that will address the latest in IP-based networked security technology and applications.
Security organizations must adapt to new threats to enterprise assets that can come from groups and individuals who don’t need to set foot on the property, warns a leading security consultant.
- By Steven Titch
- Apr 24, 2008
Verint Systems, a provider of analytic software-based solutions for workforce-enterprise optimization and security, recently announced that the city of Rio de Janeiro has expanded its deployment of the company’s Nextiva Critical Infrastructure solution to improve its city-wide surveillance system.
How’s this for a nightmare scenario? Stealthy bad hats sneak up on an IP video camera attached to a remote fence and unplug it from its Ethernet cable. In its place, they jack in a laptop computer and -- voila! -- they’re now inside that surveillance network where they can manipulate other cameras, reprogram door locks, fiddle with access credentials and perhaps wreak havoc all over the target organization’s intranet.
- By John W. Verity
- Apr 23, 2008
Based on its recent analysis of the video surveillance market, Frost & Sullivan recently recognized Pixim with the 2008 Global Growth Excellence of the Year Award for quadrupling its revenues in the past two years.
An integrated IP Video system is providing high-security CCTV surveillance for the Madhya Pradesh State Mansion in India’s capital New Delhi, India.
The new Charlestown, Rhode Island, police station was built more than a year ago, providing the opportunity to upgrade surveillance tools with the latest technology, including scalable IP video software from Milestone Systems.
HID Global recently announced the launch of the HID Global IT Channel Program, established to facilitate identity and access management with leading third-party IT vendors focused on providing secure data access software and integrated strong authentication solutions.
A full complement of network and fiber transmission solutions that address industry demands for more efficient video transmission were featured by American Fibertek Inc. (AFI) at ISC West.
Avigilon recently released at ISC West four new HD IP surveillance cameras that deliver performance for the same cost as analog cameras. And with the Avigilon Analog Video Encoder it is now possible to migrate to HD surveillance while leveraging existing analog camera investments.