Top Stories


Watch for New Trends

Watch for New Trends

What technology and industry trends should you keep an eye out for to stay ahead of the pack? In short, complex analytics are growing hotter which is made possible by the trend towards GPU co-processing.

Smarter Infrastructure

Smarter Infrastructure

Smart city initiatives are growing across the globe, as leaders look to increase security and intelligence across metropolitan environments.

The Next Generation

Hardware Security Modules, or HSMs, protect against insider and external threats by delivering confidentiality for encryption keys in a physically hardened appliance.



Bringing Hope to SMB Networks

Hopemate is a small IT service provider located in the Greater Vancouver, Canada, area that brings IT support to small businesses in its community.

Challenges and Solutions

Challenges and Solutions

Technological advancements are resulting in trends and movements that improve the quality of life and business.

Securing High-End Retail Stores

Securing High-End Retail Stores

It’s no secret Americans like to shop online. A marketing survey showed 40 percent of U.S. internet users made purchases several times a month in 2017.

What Lies Ahead for 2019

What Lies Ahead for 2019

After spending close to 20 years in the security industry, it is always a good exercise to see what projections came through the last year and which ones we foresee in the coming years.

A Market Focus

A Market Focus

Since North American Video (NAV) was founded in 1995, the systems integrator has continued to build an outstanding reputation in the physical security market.

Enabling Your Own Surveillance as a Service Offering

In the dealer/integrator business, recurring monthly revenue (RMR) is like finding a gold mine with several profitable veins that can be mined. RMR is an attractive means for a secondary revenue stream.

Networking Technology is Changing

No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.

From Risk to Reward

In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented addons to generate recurring monthly revenues (RMR).

Blurring the Lines

Blurring the Lines

Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.

Shifting Towards the Cloud

Shifting Towards the Cloud

Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.

The Tide of Security

The Tide of Security

Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.

Rethinking Access Control

When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.

Keeping the Perimeter Protection

Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change.

Times are Changing

My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.

A Successful Data Security Plan

We live in a world where computer hacking, data breaches, identity theft, and stolen records of all sizes have become worldwide events that can happen at any time.

Dunkin

Dunkin' Donuts Reward Program Users' Data Made Vulnerable

The coffee chain says hackers might have accessed customer info through a data breach.

The Evolution of Endpoint Security Demands Detection and Response

The Evolution of Endpoint Security Demands Detection and Response

Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats

Featured

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3