By Stephen Joseph
Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.
By Adlan Hussain
There have been many discussions and articles about PSIM over the last five years, but there is also a lot of confusion around exactly what it does, how it is defined, and in what way it differs from other forms of security management.
By Kim Rahfaldt
Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more.
By Jon Daum
Houses of worship have long been known as welcoming, open havens, offering support and guidance for people in need, but that mission is being challenged by active shooters and other criminals committing assault, theft, arson and vandalism.
By Pan Kamal
Today’s instant economy requires that more of a company’s business processes be open to external stakeholders.
By Fernando Pires
Over the past decade, high-tech devices, megapixels, Power over Ethernet, and many other new offerings and improvements have revolutionized the physical security landscape.
By Andrew Elvish
Cyberattacks are on the rise. Whether via IT infrastructure or internally, the Security Industry faces the challenge of guaranteeing that the data in their systems remains private, properly protected and encrypted.
By Ajay Jain
Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.
By Ralph C. Jensen
You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.
By Larry Goldman
Sales of home automation systems and connected or smart locks are growing every year.
By Robert Ogle
The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.