As retail continues to expand the scope of its security administration to prepare for security breaches, IT managers must extend down to the rack level.
- By Steve Spatig
- Jul 07, 2014
In theory, IoT is a great concept; it all boils down to ease of use vs security. Which is more important?
- By Allan Pratt
- Jul 01, 2014
Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.
- By Scott McNulty
- Jun 17, 2014
ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
- By Kim Humborstad
- Jun 10, 2014
In a world where security measures are always changing, but to date, have failed to keep our identities safe, what is the best way to keep our personal material truly secure?
- By Hector Hoyos
- Jun 03, 2014
Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
- By Sara Gates
- May 30, 2014
Understanding the difference and likenesses between data privacy, information security and confidentiality provides a rich tool set to protect information as long as the proper protection paradigm is applied.
- By Michelle Dennedy , Jonathan Fox , Thomas Finneran
- May 23, 2014
Solution should provide remote monitoring capabilities to control access within a facility and audit trail capabilities to demonstrate compliance with HIPAA requirements.
- By Steve Spatig
- May 20, 2014
A well-designed, solidly-engineered access control system is fundamental to any security strategy, especially if it is backward compatible with an open architecture.
- By Robert Laughlin
- May 14, 2014
Banks worldwide are putting biometrics at the front end using fingerprint authentication.
- By Bill Spence
- May 05, 2014
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
IP video technology gives the fastest return on investment by taking immediate advantage of existing network IP infrastructure.
- By Stephen Joseph
- Apr 14, 2014
Actively engaging employees and implementing the proper tools to address emergency preparedness in a cost effective and efficient manner.
- By Kim Rahfaldt
- Apr 07, 2014
Stringent compliance regulations calls for selecting, deploying and maintaining the right surveillance system with the knowledge, experience and agility of the integrator.
- By Laurie Smock-Jackson
- Mar 18, 2014
Processing power and intelligence of new VMS technologies enable higher levels of systems integration.
- By Gadi Piran
- Mar 11, 2014
Greater efficiency provided by accommodating multiple cameras over a single coax or Ethernet cable.
- By Ronnie Pennington
- Mar 03, 2014
As an industry, we need to stop pigeon-holing PERS as a solution for elderly people at risk of falling and expand our thoughts to a broader health and wellness offering.
- By Duane Paulson
- Feb 18, 2014
People are concerned at what might happen if they push the wrong button, so incorporate human factors into fire alarm control panel design to help solve this issue.
- By Brian Carlson
- Feb 11, 2014
They are places of safety for newborns or elderly, and everyone in between. It’s why fire safety in healthcare facilities is so stringent and rigorously enforced.
- By Jane Embury
- Feb 06, 2014