After all is said and done with Security Essen, the market every one wants to play in is North America. Some of the problem is, companies aren’t sure how to get into the market if they’re not already here.
- By Ralph C. Jensen
- Oct 02, 2012
UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction.
Whether for a weekend getaway or a business conference, a meeting or a round of golf, taking in the entertainment or trying your luck at the slots or card tables, the 4-star family-friendly Hard Rock Hotel & Casino Albuquerque is dedicated to offering its guests a pleasant stay with amenities including a full service spa. The security for the property and guests is no exception. One of the most secure properties in Albuquerque, the Hard Rock Hotel & Casino on the Isleta Pueblo Indian Reservation south of Albuquerque, decided earlier this year to further enhance the protection offered by upgrading its security video surveillance system. Calling for bids, the hotel and casino wanted advice and estimates to upgrade the security surveillance system.
There were dreams and promises of Minority Report-like video intelligence that could predict a crime before it happened. Fortunately, industry expectations have come back down to earth, and we’ve learned some valuable lessons along the way.
- By Robert Muehlbauer
- Oct 01, 2012
More government agencies are taking their physical access control system (PACS) to the cloud, and it’s easy to see why.
- By Kevin Kozlowski
- Oct 01, 2012
The individual cash pay-outs might be small, but for Texas Title Loans—a chain of 14 short-term loan shops stretching from Dallas to San Antonio—keeping an eye on the till was creating big problems.
- By Matt Krebs
- Oct 01, 2012
Rob Hile’s security career started somewhat quietly, in sales and business development with a leading manufacturer of HVAC controls and security platforms.
- By Ralph C. Jensen
- Oct 01, 2012
It would be hard to dispute that the banking industry has an enormous stake in security operations. In fact, other than the government, the financial services industry is considered one of the top spenders for worldwide security solutions.
- By Ralph C. Jensen
- Oct 01, 2012
The ADT Corp. returned today to the public equity markets as an independent company after completing its spinoff from Tyco International Ltd.
The city of Selma, Ala., seamlessly manages a high-definition surveillance system by implementing control center network video management software (NVMS) with HD Stream Management.
- By Rick Ramsay
- Oct 01, 2012
Convergence has come, and while there are still analog cameras being produced, bought and installed, the security industry has become a networked prism.
- By Ralph C. Jensen
- Oct 01, 2012
New developments in network cameras are enhancing their role as imaging sensors at the edge of IP video networks. The new landscape in imaging includes cameras that offer new capabilities, can see better and are smarter and more versatile.
- By Greg Peratt
- Oct 01, 2012
Despite networks’ best efforts to thwart them, motivated, sophisticated attackers are going to get into a network.
- By Neal Creighton
- Oct 01, 2012
It has been eight years since President George W. Bush signed Homeland Security Presidential Directive 12 (HSPD-12) into law and four years since its compliance deadline.
- By Geri B. Castaldo
- Oct 01, 2012
New IP-based surveillance solutions leverage advanced wireless protocols and solar power to allow property owners to extend the reach of their surveillance system without the expense.
- By John Graham
- Oct 01, 2012
Centralized management of security solutions is not a new concept for large enterprise environments.
- By Rich Mellott
- Oct 01, 2012
The lesson of Pandora could be, in short, that containers secure enough to lockdown all the evil in the world are probably secure enough to protect good things, too.
- By Naeem Zafar
- Oct 01, 2012
Industrial Ethernet is a powerful tool when planning for the deployment of remote security monitoring in any setting that has environmental challenges.
- By Jim Krachenfels, TJ Roe
- Oct 01, 2012
Traditional systems that required heavy upfront IT infrastructure investments have given way to cloudbased systems.
- By Bill Moran
- Oct 01, 2012
As virtual offices and remote workforces become the norm, so does the need for a secure mobile collaborative environment.
- By Sanjay Jain
- Oct 01, 2012