By Rolland Trayte
Cell towers and accompanying cell sites attract more attention in the area of security than ever before.
By Patricia Logue
Susceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life.
By Matt Krebs
Hosted video has leveled the playing field for many small businesses looking to secure their properties with the latest network surveillance technology.
By Del V. Salvi
There are hundreds of specialized tools used on a daily basis at the United Airlines jet engine rebuild and test facility, a 20-acre maintenance and operations center adjacent to San Francisco International Airport.
By Kim Rahfaldt
Since 1925, northern New Jersey has turned to Holy Name Medical Center in Teaneck for healthcare excellence.
By Mike Derby
Unlike digital systems, trying to quantify the range performance of radio frequency (RF) communication systems can be difficult due to the large role the environment has on radio frequency signals.
By Ian Johnston
The development of custom video drivers is a huge barrier for less-established brand names. From a stand-alone camera manufacturer’s perspective, it is impossible to gain market share without being included in the more popular VMS platforms. Without strong market share, however, VMS companies cannot devote the time or the energy to support these lower-tier brands.
By TJ Kennedy
Its deputies in the field were being asked to make do with an old, end-of-life mobile data terminal (MDT) system that it had been using for more than two decades.
By Steve Surfaro
Both physical security and IT professionals place great importance on cyber security.
By Ben Bradley
Emergency preparedness requires critical communications to be response ready—help can’t wait when disaster strikes.
By Samuel Shanes
The town of Oyster Bay, part of the New York metropolitan area, is the only town in Nassau County that extends from the North Shore to the South Shore of Long Island.
By Lee Caswell
Surveillance data is critical in applications ranging from retail to government, and gaming to transportation.
By Dan Myslewski
When selecting a partner for your government security program, it’s important to keep in mind the four C’s that lead to success: commitment, compliance, coverage and communication.