The New Video Insight V6 is a Video Management Software (VMS) that provides immediate access to live and recorded video from any server.
A security breach in June might have led to customer data theft.
- By Matt Holden
- Aug 04, 2014
Rigorous, award-winning security officer training program pays off this summer.
Patent #8,736,443 further expands portfolio of AtHoc intellectual property.
Aiphone Corporation's IS-IP Series Networked Video Security Communication System integrates with Lenel’s OnGuard access control security system.
XTec Incorporated awarded long-term work to continue the implementation of the HSPD-12 Program.
Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.
- By Ginger Hill
- Aug 04, 2014
Jane and Jake work for the same company. This week they’re on one of those dreaded road trips—three cities in four days—and are, as we all are, completely dependent on their tools of choice while on the move.
- By Scott Goldman, Robert Foster
- Aug 01, 2014
Dealing with an obsolete, legacy fire alarm system and a separate, standalone ECS, the building owner’s property management company, Childress Klein Properties, Inc., turned to local Gamewell-FCI distributor Critical Systems LLC, to help them find a new, comprehensive solution.
- By Brian Carlson
- Aug 01, 2014
Choice, cost savings, speed of deployment and convenience. This is what the use of existing legacy cable can afford the end-user as they migrate existing, analog-based surveillance, access control or intercom systems to IP.
Compliance with increasingly stringent regulations for organizations providing outsourced IT services, particularly in regards to data protection, is becoming more difficult.
- By Gábor Marosvári
- Aug 01, 2014
While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.
- By Phil Scarfo
- Aug 01, 2014
Distributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world.
- By Mark Byers
- Aug 01, 2014
IT professionals are becoming increasingly involved in video surveillance initiatives across all industries. It’s time to build strong relationships with the IT side of the house and include them in discussions about any new system that will piggyback on their backbone.
- By John Bartolac
- Aug 01, 2014
The days of security systems guarding primarily against theft, vandalism and violence are long gone; instead, camera systems are mostly to protect companies against liabilities such as accidents and negligence.
- By Gary Bibeau
- Aug 01, 2014
While businesses will spend thousands of dollars on cameras and recording systems, alarms, intrusion detection, emergency communication and theft prevention, many overlook the need for systems’ power protection.
- By Samantha Wade
- Aug 01, 2014
As the only 24/7 neighborhood in Chicago, River North and Friedman Properties have a shared vision for the area to ensure that success will continue to present itself: aligning the right tenants with the right buildings, demanding the best in security and investing purposefully.
- By Mary Wilbur
- Aug 01, 2014
When officials at the United Illuminating Co., a regional energy distribution company in New Haven, Conn., planned the recent completion of their 56-acre corporate headquarters, their “must-have” list included a campus-wide Emergency Communications System (ECS).
- By David George
- Aug 01, 2014
Some of the most discouraging statistics in the security industry are the record numbers reported in shoplifting from dishonest employees. Recent numbers reported by Jack L. Hayes International shows that those numbers have increased yet again.
- By Ralph C. Jensen
- Aug 01, 2014
From pedestrian-filled farmers markets and universities to new and used car lots, a wide variety of agencies find peace of mind through the use of barriers, bollards, barricades and crash gates for vehicle-based physical access control at the perimeter.