To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
IP video technology gives the fastest return on investment by taking immediate advantage of existing network IP infrastructure.
- By Stephen Joseph
- Apr 14, 2014
Actively engaging employees and implementing the proper tools to address emergency preparedness in a cost effective and efficient manner.
- By Kim Rahfaldt
- Apr 07, 2014
Stringent compliance regulations calls for selecting, deploying and maintaining the right surveillance system with the knowledge, experience and agility of the integrator.
- By Laurie Smock-Jackson
- Mar 18, 2014
Processing power and intelligence of new VMS technologies enable higher levels of systems integration.
- By Gadi Piran
- Mar 11, 2014
Greater efficiency provided by accommodating multiple cameras over a single coax or Ethernet cable.
- By Ronnie Pennington
- Mar 03, 2014
As an industry, we need to stop pigeon-holing PERS as a solution for elderly people at risk of falling and expand our thoughts to a broader health and wellness offering.
- By Duane Paulson
- Feb 18, 2014
People are concerned at what might happen if they push the wrong button, so incorporate human factors into fire alarm control panel design to help solve this issue.
- By Brian Carlson
- Feb 11, 2014
They are places of safety for newborns or elderly, and everyone in between. It’s why fire safety in healthcare facilities is so stringent and rigorously enforced.
- By Jane Embury
- Feb 06, 2014
While blue lights were previously designed to make people feel safer, the reality is that smartphones are taking safety to the next level by providing better and quicker access to emergency support.
- By Christopher Britton
- Jan 28, 2014
Communities that measure, watch and continue to learn are more aware during times of crisis, so reasonable security efforts should include anti-virus and email security that is used effectively.
- By Kim Singletary
- Jan 21, 2014
How video analytics can play a big role in airport security and operations.
- By Anthony Incorvati
- Jan 07, 2014
Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.
- By Nick Pearson
- Dec 17, 2013
Consolidating systems to improve efficiency and meet compliance.
- By Kim Rahfaldt
- Dec 10, 2013
Perhaps the biggest threat to small businesses is uncertainty, but don't forget credit card processing and PCI-DSS compliance.
- By Kim Singletary
- Dec 02, 2013
Investing in proper infrastructure and taking the time to understand how to use analytics empowers retailers.
- By Shahar Ze’evi
- Nov 18, 2013
Internal theft is a top contributor to retail shrinkage.
- By Steve Spatig
- Nov 12, 2013
The capabilities of IP video surveillance make them a popular and effective security tool.
- By Gadi Piran
- Nov 04, 2013
Mobility and efficiency makes remote monitoring an attractive option to maximize productivity.
- By Dave Poulin
- Oct 28, 2013
As recent events in Kenya have shown, both fire and terrorist attacks are potent threats to be assessed and comprehensively guarded against. With regular rehearsals, it can be ensured that response teams can adequately deal with any emergency.
- By Jane Embury
- Oct 18, 2013