There have been many discussions and articles about PSIM over the last five years, but there is also a lot of confusion around exactly what it does, how it is defined, and in what way it differs from other forms of security management.
- By Adlan Hussain
- Mar 01, 2016
Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.
- By Stephen Joseph
- Mar 01, 2016
Sales of home automation systems and connected or smart locks are growing every year.
- By Larry Goldman
- Mar 01, 2016
Over the past decade, high-tech devices, megapixels, Power over Ethernet, and many other new offerings and improvements have revolutionized the physical security landscape.
- By Fernando Pires
- Mar 01, 2016
Cyberattacks are on the rise. Whether via IT infrastructure or internally, the Security Industry faces the challenge of guaranteeing that the data in their systems remains private, properly protected and encrypted.
- By Andrew Elvish
- Mar 01, 2016
You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.
- By Ralph C. Jensen
- Mar 01, 2016
Our world is connected through travel now more than ever before. Globalization has made way for a constant coming and going, making border security more necessary.
- By Peter Smallridge
- Mar 01, 2016
The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.
- By Robert Ogle
- Mar 01, 2016
Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.
United Technologies rejected a $90.7 billion offer from rival supplier, Honeywell Inc.
- By Sydny Shepard
- Feb 29, 2016