Networking Security


An Apple A Day

An Apple A Day

Apple’s refusal to unlock the San Bernardino terrorists’ smartphones has generated a heated debate in security, technology and legal circles nationwide.

Thinking Outside The Cloud

A series of Microsoft commercials beginning in 2010 brought the concept of “the cloud” into our cultural lexicon. The ensuing five-plus years have grown awareness and adoption of the concept behind that term, especially in the consumer arena.

University of Memphis Strengthens Building Security

University of Memphis Strengthens Building Security

A university in Tennessee is replacing old exterior doors and replacing them with door units centrally controlled by a locking system.

Protecting the Network - Improving physical security with operations’ team help

Protecting the Network

For many years, physical and network security existed as separate disciplines, each managed by an independent operations team on its own side of the house with little or no crossover between the two.

Boosting Security - Saratoga Springs’ businesses, residents and tourists are safer with secure VMS

Boosting Security

Every summer, the Saratoga Race Course brings thousands of visitors to the City of Saratoga Springs, NY. The revenue generated during the racing season boosts the city’s economy for the rest of the year.

The Security of Your Security System - More often than not, passwords are left as defaults

The Security of Your Security System

In the past two years several high profile data breaches, namely the Target data breach in 2014, have put greater focus on the data security of all network connected devices.

The New Standard

Have you ever stopped to notice that as video surveillance goes, so goes the security industry? Nowhere is that more evident than in the major shift from analog to IP technology.

Persistent Threats

A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection



Define New Models - Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

Define New Models

Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

High Profile Events

Realizing the need for stronger surveillance in high-profile locations such as the marathon route, the city of Boston decided to increase civilian protection. The new security measures included doubling law enforcement personnel to about 3,500, the addition of bomb-sniffing dogs, and a SWAT team provided by the FBI.

The Quest for Smarter Power - Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

The Quest for Smarter Power

Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

Getting Involved - Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Getting Involved

Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Privacy Extortion - This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

Privacy Extortion

This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

New Strategies - As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches.

New Strategies

As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?

Fluidmesh Networks Enables Willow Lane Business Park to Take Care of Business

When Willow Lane Business Park was required to upgrade their existing analogue video surveillance system, the Business Park chose the wireless solutions from Fluidmesh Networks to meet their needs.

Reducing opportunity for catastrophic compromised data

Securing Your Cloud

Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.

Many Healthcare Organizations have been Compromised by Cyberattacks

Eighty-one percent of health care executives say that their organizations have been compromised by at least one malware, botnet or other cyber-attack during the past two years

Everyone Is At Risk

Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.

Access Control in the Midst of an IP Revolution

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.

No Protection From Bad Data

No Protection From Bad Data

Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Study: 90 Percent of Organizations Experienced an Identity-Related Incident in Last Year

    Identity-related incidents continue to dominate today's headlines. Clorox, MGM and Caesars fell prey to social engineering, while 23andMe suffered a breach as a result of a hacking method called credential stuffing and UnitedHealth lacked multi-factor authentication (MFA). Although these companies made headlines due to the extent of the breach, today's study revealed that only 10% of respondents didn't have an identity-related incident in the last 12 months, consistent with last year's report. Read Now

  • Report Highlights How People Trick AI Chatbots Into Exposing Company Secrets

    Immersive Labs recently published its “Dark Side of GenAI” report about a Generative Artificial Intelligence (GenAI)-related security risk known as a prompt injection attack, in which individuals input specific instructions to trick chatbots into revealing sensitive information, potentially exposing organizations to data leaks. Based on analysis of Immersive Labs’ prompt injection challenge*, GenAI bots are especially susceptible to manipulation by people of all skill levels, not just cyber experts. Read Now

  • Report Continues to Show Physical Security Moving to Cloud-Based Solutions

    Verkada today shared the results of its 2024 State of Cloud Physical Security report. Based on insights from IT and physical security leaders across various sectors, the findings look at current trends, insights, and challenges within the industry as it transitions from on-premises setups to cloud-based ones. Read Now

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3