It is no exaggeration to say that network video technology has revolutionized the video surveillance market, and the access control industry is on the verge of a similar revolution.
- By Ola Jönsson
- Feb 06, 2014
They are places of safety for newborns or elderly, and everyone in between. It’s why fire safety in healthcare facilities is so stringent and rigorously enforced.
- By Jane Embury
- Feb 06, 2014
Quantum Secure announces that the San Francisco International Airport (SFO) has selected the company's SAFE for Aviation solution, further expanding Quantum Secure's footprint in upgrading, managing and automating key critical security areas within the Airport.
The Virtual Desktop Infrastructure (VDI) market is growing fast so much that industry analysts predict it will be worth over $5 billion within the next three years. Why did this take so long to arrive? After all, virtual desktops have been around since the 1990s.
- By Charles P. Williams
- Feb 05, 2014
Milestone Systems, the open platform company in IP video management software (VMS), has elevated Bosch Security Systems to the status of Elite Partner in the Milestone Alliance Partner program (MAP).
Axis Communications, the world leader in network video, announces its U.S. Expansion Plan designed to bring Axis even closer to its partner network and end-customers while intensifying local resources to meet demand in the fast growing physical security market.
People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
- By Andrew Braunberg
- Feb 05, 2014
An Advanced Persistent Threat (APT) is a piece of malware that is distinguished by the sophistication of its code, the vectors cybercriminals are choosing for attack and the perseverance with which they’re going after their targets.
- By David Finger
- Feb 04, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
Putting security into the eye of the beholder creates a stronger layered security plan.
- By Ginger Hill
- Feb 04, 2014