Since every business is unique, it comes as no surprise that each has different security needs.
- By Ray Cooke, Andrew Elvish
- May 13, 2018
Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure.
- By Mark Robinton
- May 01, 2018
Most of the malicious or criminal activity targeting today’s enterprises involves the endpoint. Insecure endpoints are an expensive risk and difficult to address.
- By Richard Henderson
- May 01, 2018
When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.
- By Peter Boriskin
- Mar 01, 2018
Providing independent consulting, best-inclass
products, hosting solutions and financial
services to more than 1,000 U.S.- and
Canada-based companies, Forsythe is one
of the largest independent IT integrators in
North America.
- By Howard Carder
- Feb 01, 2018
Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.
- By Eric Polet
- Feb 01, 2018
Like it or not, every time you spend time on the keyboard, there may be someone watching your every keystroke. It wouldn’t hurt if you knew your enemy; and it certainly would be beneficial if you knew who was on your side.
- By Ralph C. Jensen
- Feb 01, 2018
Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis.
- By Jonathan Lewit
- Feb 01, 2018
Information security is defined as a reactive activity, as it involves managing risks that may have a serious effect on the organization if they occur.
- By Csaba Krasznay
- Feb 01, 2018
Organizations are changing how they look at security as users employ mobile devices for everything from opening doors to accessing information and services.
- By Darren Learmonth
- Feb 01, 2018
Cybercrime is a large and dangerous business and it impacts individuals, businesses and governments worldwide.
- By Jennifer Hackenburg
- Feb 01, 2018
The New Hampshire Liquor Commission (NHLC) experienced a record-breaking fiscal year in 2016. With the increase of business, and the addition of three more state-run stores, the state commission felt it was time to improve on security solutions. Enter Griffon Security Technologies.
- By Ralph C. Jensen
- Jan 01, 2018
Only a few years ago, the inevitable shift to all things Cloud was met with guarded optimism. But today, the shift is really happening.
- By Christian Morin
- Dec 01, 2017
No enterprise can eliminate 100% of its risk. Instead, the security objective must be to understand all risks and to effectively manage and mitigate them.
- By Simon Morgan
- Nov 22, 2017
As more of our lives move online, crime has unfortunately migrated to the internet at matching pace taking form in what’s now considered cybercrime.
- By Andrew Deen
- Nov 01, 2017
The organizations of today have a wealth of technology at their fingertips, highlighting new features and advancements that are changing the way these entities do business, how people work and the interconnectivity between the two.
- By Mitchell Kane
- Nov 01, 2017
Ransomware attacks are becoming infamous. As I write now, the Petya attack is unfolding.
- By David Wagner
- Nov 01, 2017
More than a decade ago, it was all about analog cameras. My, how times have changed. By 2010, IP-based cameras were taking over the security duties, and doing a good job, but there were challenges.
- By Ralph C. Jensen
- Nov 01, 2017
A few advantages with IP-based systems worth mentioning are remote access anytime, anyplace; digital images do not degrade over time; real time analytic capability; and content distributed electronically quickly and easily.
- By Brian Simmons
- Nov 01, 2017
A set of vulnerabilities present in "almost every" device with Bluetooth capabilities has been revealed by researchers at security firm Armis.