Networking Security


Understanding the Internet of Things with Fluidmesh Networks

Understanding the Internet of Things with Fluidmesh Networks

Umberto Malesci explains what IoT is, what it does and gives real-world examples of IoT in action.

IDEAL Networks Releases Latest Generation of DataCENTER Software

Free software allows datacom professionals to download, manage, edit and print pdf reports in three easy steps.

Four Important Things You Need to Know about Hi-PoE

Online Exclusive: Four Important Things You Need to Know about Hi-PoE

Seemingly limitless system applications allows manufacturers to significantly increase capabilities of cameras and other devices.

Triplett Announces New Digital MultiMeters

Low cost, feature rich with large backlit displays.

An Elephant in the Living Room

Security managers are more aware than ever that information security requires a layered approach with components addressing every point of intrusion on the corporate network.

Building a Foundation

Building a Foundation

Now more than ever, major network vulnerabilities are making national and international news headlines.

More Comfortable Operations

Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.

Collaboration is Key in the Video Vortex

Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.



A Strategic Approach

A Strategic Approach

The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.

How Cyber Secure Are Your Physical Security Devices

How Cyber Secure Are Your Physical Security Devices?

Are your physical security devices attached to the same network as your sensitive business data?

How Secure are Your Devices?

Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.

Industry Event Celebrated 10 Years of Innovation

Customers, channel partners, reps and industry friends and supporters recognize leader in wireless systems.

Triplett Announces the Sonichek Pro

For exacting audio installation checks, designed to IEC651 and ANSI S1.4 standards.

Time to Take Advantage

Time to Take Advantage

For every organization, one of the first steps in providing safety and security is knowing at all times who is in the building. This is true for protecting people, property, or assets, and whether the building is a business, school, hospital or any other location.

Live Longer

Live Longer

Americans want to be safe and the FCC is helping. The FCC reserves valuable radio frequencies for public safety authorities that can be used for Ultra-Reliable wireless video surveillance.

Exacq Technologies Introduces VideoPush for Exacq Mobile in version 6.8

Faster camera discovery, new camera integrations and more.

REELEX Packaging Solutions Implements Anti-counterfeit Campaign

Company educating installers on the perils of using knock-off REELEX bulk wire cartons while vowing to continue to pursue measures against patent and trademark offenders.

Search for Standardized Testing Leaks Raises Security Concerns

Search for Standardized Testing Leaks Raises Security Concerns

New Jersey recently switched to digital testing, bringing a host of new security concerns with it.

IDEAL Networks Showcases Video Surveillance Troubleshooting Equipment at ISC West 2015

Cable certifier, verifier and tester allow network administrators to confirm correct installation of copper and fiber network cabling and troubleshoot existing analog and IP video surveillance system installations.

Bring on the Power - Understanding that PoE impacts network design

Bring on the Power

When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3