Networking Security


The Security of Your Security System - More often than not, passwords are left as defaults

The Security of Your Security System

In the past two years several high profile data breaches, namely the Target data breach in 2014, have put greater focus on the data security of all network connected devices.

Define New Models - Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

Define New Models

Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

Persistent Threats

A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection

High Profile Events

Realizing the need for stronger surveillance in high-profile locations such as the marathon route, the city of Boston decided to increase civilian protection. The new security measures included doubling law enforcement personnel to about 3,500, the addition of bomb-sniffing dogs, and a SWAT team provided by the FBI.

The Quest for Smarter Power - Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

The Quest for Smarter Power

Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

Getting Involved - Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Getting Involved

Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Privacy Extortion - This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

Privacy Extortion

This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

New Strategies - As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches.

New Strategies

As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?



Fluidmesh Networks Enables Willow Lane Business Park to Take Care of Business

When Willow Lane Business Park was required to upgrade their existing analogue video surveillance system, the Business Park chose the wireless solutions from Fluidmesh Networks to meet their needs.

Reducing opportunity for catastrophic compromised data

Securing Your Cloud

Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.

Many Healthcare Organizations have been Compromised by Cyberattacks

Eighty-one percent of health care executives say that their organizations have been compromised by at least one malware, botnet or other cyber-attack during the past two years

Everyone Is At Risk

Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.

Access Control in the Midst of an IP Revolution

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.

No Protection From Bad Data

No Protection From Bad Data

Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.

Breaching the Network

Breaching the Network

Cyberattacks are one of the greatest threats facing global businesses today.

Privileged Identities

Privileged Identities

Over the last year, we have witnessed a series of staggering data breaches affecting some of the world’s leading businesses— with each breach seemingly worse than the last in terms of financial and reputational damage.

New LVPRO Series

Three preloaded models include new color scheme, adjustable backlit display and capability to attach test modules.

REELEX Signs Four New Licensees in 1H 2015

Catalysts include improvements in global economy and successful anti-knockoff education effort aimed at differentiating imitators.

Clear Congested Networks with the IDEAL LanXPLORER PRO

Handheld tester identifies sources of network congestion, troubleshoots PoE and VoIP devices, locates Wi-Fi deadspots.

ICE Cable Systems Delivers Thinner 4K Ultra HD Compatible HDMIs

The tight-bend radius of these slim cables make for a significantly easier fit behind hard-to-reach TVs and AV racks.

Featured

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3