Today’s security leaders must present solutions to enterprise organizations that meet the needs of these diverse organizations.
- By Simon Morgan
- May 01, 2016
CEZ recently faced several challenges, including a large increase of IT devices to be monitored, pressure to increase work efficiency and reduce the number of employees at the same time.
- By Gábor Marosvári
- May 01, 2016
Cybersecurity isn’t the sexiest topic for presidential candidates right now, but controversial legislation, massive security breaches and increasing tension with China are keeping media attention on the issue.
- By Dwayne Melancon
- May 01, 2016
Apple’s refusal to unlock the San Bernardino terrorists’ smartphones has generated a heated debate in security, technology and legal circles nationwide.
- By Joseph Mazzarella
- May 01, 2016
A series of Microsoft commercials beginning in 2010 brought the concept of “the cloud” into our cultural lexicon. The ensuing five-plus years have grown awareness and adoption of the concept behind that term, especially in the consumer arena.
Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.
A university in Tennessee is replacing old exterior doors and replacing them with door units centrally controlled by a locking system.
- By Sydny Shepard
- Feb 16, 2016
For many years, physical and network security existed as separate disciplines, each managed by an independent operations team on its own side of the house with little or no crossover between the two.
Every summer, the Saratoga Race Course brings thousands of visitors to the City of Saratoga Springs, NY. The revenue generated during the racing season boosts the city’s economy for the rest of the year.
- By Courtney Dillon Pedersen
- Feb 01, 2016
In the past two years several high profile data breaches, namely the Target data breach in 2014, have put greater focus on the data security of all network connected devices.
- By Brian Carle
- Feb 01, 2016
Have you ever stopped to notice that as video surveillance goes, so goes the security industry? Nowhere is that more evident than in the major shift from analog to IP technology.
Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.
- By Ronnie Pennington
- Nov 01, 2015
A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection
- By Michél Bechard
- Nov 01, 2015
Realizing the need for stronger surveillance in high-profile locations such as the marathon route, the city of Boston decided to increase civilian protection. The new security measures included doubling law enforcement personnel to about 3,500, the addition of bomb-sniffing dogs, and a SWAT team provided by the FBI.
- By Ron Grinfeld
- Nov 01, 2015
Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.
- By Ralph C. Jensen
- Nov 01, 2015
Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.
- By Brandon Arcment
- Nov 01, 2015
This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.
As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?
- By Ryan Corey
- Nov 01, 2015
When Willow Lane Business Park was required to upgrade their existing analogue video surveillance system, the Business Park chose the wireless solutions from Fluidmesh Networks to meet their needs.
Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.
- By Amit Cohen
- Sep 01, 2015