White Papers

Virtualization for Video Surveillance Environments

Video management systems have evolved over the past 10 years from limited functionality analog digital video recorders (DVRs) to high-performance digital systems available today. There have been challenges in migrating to the latest digital systems because of the high initial capital expenditures required and the need to overhaul existing infrastructure. The following describes the evolution of video surveillance data management systems and how a technical breakthrough in Serverless Computing will accelerate the migration from analog to digital by offering higher returns at lower investment outlays.

Setting a New Precedent

Judges and jurors. Prosecutors and prisoners. Clerks and complainants. Barristers and bailiffs. Day in and day out, thousands of people move through the striking Calgary Courts Centre. This technologically advanced building sets a new standard for operational and energy efficiency. And an Endura IP video security system from Pelco plays a key role in the smooth administration of justice there.

Efficiencies in Transportation

Singapore’s LTA (Land Transport Authority) is the agency responsible for the development and infrastructure of Singapore’s highways, roadways and railways. A few years ago the agency was tasked with setting up Junction Electronic Eyes (J-Eyes), a system of surveillance cameras installed at major signalized junctions to act as remote eyes for operators at the control center. Today, the system monitors and manages traffic along expressways; can deter illegal parking and loading or unloading along major roads; deters congestion; implements appropriate action plans and provides motorists with updated traffic information on incidents to mitigate their effects. The overall result is a safer and more pleasant journey.

Improving Coverage and Quality in Surveillance Applications

Video surveillance traces its roots to the 1960’s when closed-circuit television was first used to monitor and record activities at remote locations. Technology has advanced substantially in nearly half a century since then, making video surveillance more versatile and affordable than ever before. With so many advances in digital cameras, video compression, wireless networks and other areas, it is now feasible and cost-effective to make video surveillance more widespread, and therefore, more effective.

Eight Rules for Creating Great White Papers

White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This is unfortunate, because – written and applied well – white papers are one of the most powerful tools in the sales and marketing toolkit.

Desktop Authority: USB and Port Security Option

The myriad of portable storage mediums today make it essential for corporations to prohibit or monitor the use of certain devices on the company network that can be potentially harmful to a corporation. Confidential data can easily be copied to any portable device, viruses can be introduced to the network and spread corporate wide and illegal software and content can be copied to the company network.

Tripwire: Proactively Reduce Risk and Improve IT Security in Physical and Virtual Enviroments

Securing the IT infrastructure in today’s computing environment may well be the biggest challenge faced by organizations. Not only must organizations ensure the integrity of their systems and data, but often they must also prove that their security processes and policies measure up against standards and regulations established and enforced by national standards-developing entities. In addition, the recent popularization of virtualized environments adds a new layer of complexity to the security picture. Businesses are just beginning to comprehend the security implications of these environments.

ScriptLogic: Effective Desktop Management Under FDCC

The Federal Desktop Core Configuration (FDCC) standards have created a unique set of challenges for federal agency IT departments. While the current focus has been on scanning and reporting compliance rates, future efforts will be centered on successfully improving compliance through effective policy and exception management. Native tools provide some of the capabilities, but to really effectively manage the desktop in an FDCC environment; more granular management options are needed. This paper is intended to introduce some of those challenges and provide some options for resolving them.

maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.

The Primer: Nuts and Bolts of Federated Identity Management

For any IT department, it is imperative to understand how your organization can securely manage and control users’ identities. With so many employees accessing up to thirty different resources over the Internet to do their daily jobs—often with thirty different usernames and passwords—organizations are struggling to maintain a secure working environment. This white paper provides an introduction to leveraging user credentials securely through federated identity management.

SPONSORED VIDEO - Click here for more info.

Digital Edition

  • Security Today Magazine - October 2019

    October 2019


    • Expanding Cybersecurity Solutions
    • The Mighty PoE
    • Theft on Wheels
    • Smart City Technologies
    • Quality Control is Everything

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety