Over the last year, we have witnessed a series of staggering data breaches affecting some of the world’s leading businesses— with each breach seemingly worse than the last in terms of financial and reputational damage.
- By Philip Lieberman
- Aug 01, 2015
Cyberattacks are one of the greatest threats facing global businesses today.
- By Lee Pernice
- Aug 01, 2015
Three preloaded models include new color scheme, adjustable backlit display and capability to attach test modules.
Catalysts include improvements in global economy and successful anti-knockoff education effort aimed at differentiating imitators.
Handheld tester identifies sources of network congestion, troubleshoots PoE and VoIP devices, locates Wi-Fi deadspots.
The tight-bend radius of these slim cables make for a significantly easier fit behind hard-to-reach TVs and AV racks.
Umberto Malesci explains what IoT is, what it does and gives real-world examples of IoT in action.
- By Ginger Hill
- May 29, 2015
Free software allows datacom professionals to download, manage, edit and print pdf reports in three easy steps.
Seemingly limitless system applications allows manufacturers to significantly increase capabilities of cameras and other devices.
- By Ronnie Pennington
- May 12, 2015
Low cost, feature rich with large backlit displays.
Security managers are more aware than ever that information security requires a layered approach with components addressing every point of intrusion on the corporate network.
- By Julie Olenski
- May 01, 2015
Now more than ever, major network vulnerabilities are making national and international news headlines.
- By Madeline Domma
- May 01, 2015
Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.
- By Randy Smith
- May 01, 2015
Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.
- By Michael Gallant
- May 01, 2015
The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.
Are your physical security devices attached to the same network as your sensitive business data?
- By Vince Ricco
- May 01, 2015
Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.
- By Ralph C. Jensen
- May 01, 2015
Customers, channel partners, reps and industry friends and supporters recognize leader in wireless systems.
For exacting audio installation checks, designed to IEC651 and ANSI S1.4 standards.
Americans want to be safe and the FCC is helping. The FCC reserves valuable radio frequencies for public safety authorities that can be used for Ultra-Reliable wireless video surveillance.
- By Michael Derby
- Apr 01, 2015