Networking Security


Holiday Security Tips for Malls or Outdoor Shopping Areas

Holiday Security Tips for Malls or Outdoor Shopping Areas

The holiday shopping season is here, let’s not forget that we are in COVID-19 pandemic and health officials continue to repeat their messages about the importance of masks, adequate social distancing, and frequent handwashing.

Uniting the Physical and the Digital

Uniting the Physical and the Digital

As the Internet of Things (IoT) becomes mainstream, companies are delving into the ramifications of adoption, including its benefits, challenges, and opportunities--not least, the implications to security and cybersecurity.

Deployment During the Pandemic

Deployment During the Pandemic

Prior to the COVID-19 pandemic, the rate of cloud adoption was growing steadily. Since March, however, when “shelter-in-place” orders began sweeping the nation, we’ve seen cloud computing usage skyrocket.

BriefCam Announces Video Analytics Innovation

BriefCam has announced a significant new capability to its product portfolio with v5.6.1 of its innovative and extensible video content analytics platform.

Remote Working and VPN

Remote Working and VPN

In this pandemic of coronavirus, all organizations have shifted from office work to remote work. By saying that, you must have heard about VPNs, and how they improve security and privacy.

Forming Real Bonds

Forming Real Bonds

Artificial intelligence has been in the headlines a lot recently. It will help save mankind or usher in the robot apocalypse, depending on which article you read.

Secure Your Containers

Development and deployment of container-based software has become a popular movement in technology.

Spotting Signs Your IT is Out of Date

This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.



Taking on Security Automation

Taking on Security Automation

Not only does modern software architecture create a broader attack surface area, the accelerated DevOps methodology makes it harder to detect and remediate vulnerabilities.

Data Privacy Requires a Security Response

Recent hacks into databases of some of the world’s biggest corporations and government organizations put the personal information of billions of people at risk.

Why Are SMBs so Worried?

Why Are SMBs so Worried?

Cloud storage is most used by small-and-medium businesses (SMBs). The reason is that it comes with many benefits for organizations in terms of flexibility and more importantly productivity.

Smart City Technologies

Smart City Technologies

Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.

Ushering in a New Era

Ushering in a New Era

Privacy issues continue to dominate headlines as the world’s biggest companies are being challenged on the ways they collect and use people’s data. Consumers are growing more concerned about how their activities are being tracked across the web as companies sell information to advertisers for a profit.

Quality Control is Everything

Quality Control is Everything

In today’s world, there are a myriad of different manufacturers that produce similar products and there are so many options available to customers.

Overcoming the Challenges of SecOps Implementation

Overcoming the Challenges of SecOps Implementation

Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.

Changing the SIEM Game

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.

Advanced VMS and Analytics

The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.

Plan Might Have a Weakness

Plan Might Have a Weakness

Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.

A Word of Caution

A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.

Five Biggest Security Myths Busted

Five Biggest Security Myths Busted

There are a number of common misconceptions about endpoint security.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3