Long-trusted detection technologies increasingly ineffective says 75% of IT and security professionals in findings released by Spikes Security and Ponemon Institute.
City of Guayaquil leverages integrated surveillance platform to share intelligence across agencies, expedite investigations and mitigate crime.
DVR offers unparalleled image quality at an affordable cost.
The flaw could have potentially allowed hackers to open car doors.
- By Matt Holden
- Feb 02, 2015
The themes for VMS product development can be summarized as bigger, better and faster. In 2015, look for capabilities that range from those which deliver more information to architectures that optimize VMS performance on purpose built hardware offerings.
- By Brian Carle
- Feb 01, 2015
In a recent Hollywood comedy, Jason Segel’s character uttered the famous line, “Nobody understands the cloud. It’s a mystery.” And yet, all of us have been using the cloud for years: for online banking, online shopping, social media, email, sharing family photos and a host of other activities.
- By Jennifer Bruce
- Feb 01, 2015
Money Movers Inc. is a fully PCI DSS compliant Electronic Funds Transfer Gateway processor. In plain English, that means we move a lot of data over a network.
- By Patrick E. Craig
- Feb 01, 2015
Today’s integrated systems are generating more data than ever before. For some perspective on just how much data we’re talking about, consider that from the dawn of civilization to 2003, humankind created two exabytes of data.
- By Brian McIlravey
- Feb 01, 2015
Broadly speaking, 2014 was a year full of exciting technological innovations, and 2015 shouldn’t be any different. If anything, we’ll see further and accelerated improvements in all things technology.
- By Jeremy Krinitt
- Feb 01, 2015
The network-based physical security industry has matured rapidly over the past few years. As the technology and other components of security solutions have advanced, so too have the customer’s expectations.
- By Keven Marier
- Feb 01, 2015