When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.
- By Mauricio Chacon
- May 01, 2014
While an alarm system can’t protect your customers from everything, it is a proven measure of deterrence. Homes with alarm systems are three times less likely to get burglarized than homes without them.
- By Rob Phillips
- May 01, 2014
Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.
- By Charles P. Williams
- May 01, 2014
There is no telling what an appetite for success and a passion for technology will produce. One thing for certain, the desire to give the customer the best security solution possible will likely bear a long-term, winning combination.
- By Ralph C. Jensen
- May 01, 2014
ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.
- By Ralph C. Jensen
- May 01, 2014
Paris has the Eiffel Tower; New York has the Empire State building; Sydney has its Opera House; Rome has the Coliseum; and London has the London Eye, a well-known symbol for an extraordinary city.
- By Chris Maras
- May 01, 2014
While most organizations have developed highly sophisticated, comprehensive emergency plans, they are often lacking the communication vehicle to meaningfully convey them and make them accessible to a wide audience before, during and after an event. Mobile devices provide a simple, efficient and secure channel to proactively get the most up-to-date plans and best practices into the right hands and mitigate overall risk.
- By Christopher Britton
- Apr 30, 2014
Developer and manufacturer of long-range industrial wireless Ethernet radios embraces 10 years of business success.
Shocking results of a two-year security study of a healthcare network revealed via weak passwords, lack of authentication and embedded web servers.
- By Ginger Hill
- Apr 29, 2014
Identity management company innovates with a REST API for directories - now available for download.
Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
196 page catalog is easily accessible via smart phone, computer or tablet and includes all five NACE brand product lines.
Security cameras yanked from exterior of businesses with rope; are the suspects setting these businesses up for something worse? (Video included)
- By Ginger Hill
- Apr 24, 2014
Offers three light-condition operating modes in one unit for greater operational flexibility and image clarity.
Collaboration aims to help more students connect with campus safety officials.
Secretary of Homeland Security Jeh Johnson highlights importance of permanently fixing America's broken immigration system.
- By Ginger Hill
- Apr 23, 2014
Award established in 1979 and recognizes innovative products, services and solutions in electronic physical security.
Student security enhanced by installing electronic locks in new residence halls and upgrading access control in existing buildings.
5 approaches officials are taking to ensure a safe and secure race for runners and spectators.
- By Ginger Hill
- Apr 21, 2014