Video security systems have been effective deterrents to crime because of its ability to capture and present evidence of events that have happened. Such systems can be invaluable in protecting people and assets.
- By Adam Lowenstein
- Dec 01, 2022
According to a 2022 study conducted by Ponemon Institute, the average U.S. enterprise manages approximately 135,000 endpoint devices. Given that most, if not all of these devices require dependable power to maintain functionality, the need to deliver reliable power efficiently to devices, which is critical to building safety, security and comfort have never been higher.
- By JR Andrews
- Dec 01, 2022
There is an understanding that doing a job right requires the right tools. However, recent years have seen rising awareness that furniture does not merely provide a post from which to do a job. Instead, contributing to successful outcomes requires the right furniture.
- By Randy Smith
- Dec 01, 2022
Talking to an industry associate in early November, we laughed a little bit about the fact that it is (almost) 2023. Well, we were planning for print material for next year. The conversation led us into a quick discussion about Y2K.
- By Ralph C. Jensen
- Dec 01, 2022
Modern surveillance systems generate an overwhelming (and mostly unused) amount of data. This is especially true when recording video in 24/7 operations, which is essential to capturing evidence, incidents and events
- By Joe Danielson
- Dec 01, 2022
Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.
- By Ben Williams
- Dec 01, 2022
Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.
- By Despina Stamatelos
- Dec 01, 2022
Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.
The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.
- By Santiago Bassett
- Nov 30, 2022
Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC).