Despite networks’ best efforts to thwart them, motivated, sophisticated attackers are going to get into a network.
- By Neal Creighton
- Oct 01, 2012
It has been eight years since President George W. Bush signed Homeland Security Presidential Directive 12 (HSPD-12) into law and four years since its compliance deadline.
- By Geri B. Castaldo
- Oct 01, 2012
New IP-based surveillance solutions leverage advanced wireless protocols and solar power to allow property owners to extend the reach of their surveillance system without the expense.
- By John Graham
- Oct 01, 2012
Centralized management of security solutions is not a new concept for large enterprise environments.
- By Rich Mellott
- Oct 01, 2012
The lesson of Pandora could be, in short, that containers secure enough to lockdown all the evil in the world are probably secure enough to protect good things, too.
- By Naeem Zafar
- Oct 01, 2012
Industrial Ethernet is a powerful tool when planning for the deployment of remote security monitoring in any setting that has environmental challenges.
- By Jim Krachenfels, TJ Roe
- Oct 01, 2012
Traditional systems that required heavy upfront IT infrastructure investments have given way to cloudbased systems.
- By Bill Moran
- Oct 01, 2012
As virtual offices and remote workforces become the norm, so does the need for a secure mobile collaborative environment.
- By Sanjay Jain
- Oct 01, 2012
Tyco completed its separation transaction today, forming the world’s largest dedicated fire protection and security company as measured by market share.
Privacy was an immediate concern when the Council on Aging in Marshfield, Mass., sought to install a video surveillance system.
- By Del V. Salvi
- Oct 01, 2012