There were dreams and promises of Minority Report-like video intelligence that could predict a crime before it happened. Fortunately, industry expectations have come back down to earth, and we’ve learned some valuable lessons along the way.
- By Robert Muehlbauer
- Oct 01, 2012
More government agencies are taking their physical access control system (PACS) to the cloud, and it’s easy to see why.
- By Kevin Kozlowski
- Oct 01, 2012
The individual cash pay-outs might be small, but for Texas Title Loans—a chain of 14 short-term loan shops stretching from Dallas to San Antonio—keeping an eye on the till was creating big problems.
- By Matt Krebs
- Oct 01, 2012
Rob Hile’s security career started somewhat quietly, in sales and business development with a leading manufacturer of HVAC controls and security platforms.
- By Ralph C. Jensen
- Oct 01, 2012
It would be hard to dispute that the banking industry has an enormous stake in security operations. In fact, other than the government, the financial services industry is considered one of the top spenders for worldwide security solutions.
- By Ralph C. Jensen
- Oct 01, 2012
The ADT Corp. returned today to the public equity markets as an independent company after completing its spinoff from Tyco International Ltd.
The city of Selma, Ala., seamlessly manages a high-definition surveillance system by implementing control center network video management software (NVMS) with HD Stream Management.
- By Rick Ramsay
- Oct 01, 2012
Convergence has come, and while there are still analog cameras being produced, bought and installed, the security industry has become a networked prism.
- By Ralph C. Jensen
- Oct 01, 2012
New developments in network cameras are enhancing their role as imaging sensors at the edge of IP video networks. The new landscape in imaging includes cameras that offer new capabilities, can see better and are smarter and more versatile.
- By Greg Peratt
- Oct 01, 2012
Despite networks’ best efforts to thwart them, motivated, sophisticated attackers are going to get into a network.
- By Neal Creighton
- Oct 01, 2012
It has been eight years since President George W. Bush signed Homeland Security Presidential Directive 12 (HSPD-12) into law and four years since its compliance deadline.
- By Geri B. Castaldo
- Oct 01, 2012
New IP-based surveillance solutions leverage advanced wireless protocols and solar power to allow property owners to extend the reach of their surveillance system without the expense.
- By John Graham
- Oct 01, 2012
Centralized management of security solutions is not a new concept for large enterprise environments.
- By Rich Mellott
- Oct 01, 2012
The lesson of Pandora could be, in short, that containers secure enough to lockdown all the evil in the world are probably secure enough to protect good things, too.
- By Naeem Zafar
- Oct 01, 2012
Industrial Ethernet is a powerful tool when planning for the deployment of remote security monitoring in any setting that has environmental challenges.
- By Jim Krachenfels, TJ Roe
- Oct 01, 2012
Traditional systems that required heavy upfront IT infrastructure investments have given way to cloudbased systems.
- By Bill Moran
- Oct 01, 2012
As virtual offices and remote workforces become the norm, so does the need for a secure mobile collaborative environment.
- By Sanjay Jain
- Oct 01, 2012
Tyco completed its separation transaction today, forming the world’s largest dedicated fire protection and security company as measured by market share.
Privacy was an immediate concern when the Council on Aging in Marshfield, Mass., sought to install a video surveillance system.
- By Del V. Salvi
- Oct 01, 2012
In wireless technology, change is the only constant. Today’s world contains many technologies that are considered to be “high-tech,” and wireless technology definitely qualifies.
- By Matt S. Nelson
- Oct 01, 2012