Critical Infrastructure


A Tale of Three Cities

Salvaging the existing investment in coax cabling is often the number-one reason surveillance users are reluctant to switch to network video. The perceived cost of storage is a close second.

New Index Ranks Ability of G20 Nations to Withstand Cyber Attacks, Harness Digital Environment

A benchmark study of 19 of the world’s 20 leading economies found that the United Kingdom and the United States lead Group of 20 (G20) countries in their ability to withstand cyber attacks and to deploy the digital infrastructure necessary for a productive and secure economy. The index also found that several major economies—Argentina, Indonesia, Russia and Saudi Arabia—do not have cybersecurity plans and do not appear to be developing them.

Powering Your Campus

Powering Your Campus

By the time disaster strikes, it is too late to take many of the important steps to protect a campus. Unfortunately, many educational institutions overlook disaster preparedness planning or simply assume a calamity won’t happen on their campus.

Power to the System

Power to the System

Power supplies are a vital system component but are not always considered to be mission critical. Often situated in a utility area, power supplies are essential to continuous, trouble-free operation.

Symantec: Global Critical Infrastructure Providers Less Aware and Engaged in Government Programs

Critical infrastructure providers come from industries that are of such importance that if their cyber networks were successfully attacked and disabled, it would result in an actual threat to national security.

Achieving Integrated Security Excellence

Achieving Integrated Security Excellence

With the number of IT devices used in businesses today growing rapidly, organizations are seeking solutions that not only reduce risk and secure property and staff, but also offer IT and security convergence for maximum protection of people and property across buildings systems.

Lets Work Together

Let's Work Together

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.

Finding Financing

Finding Financing

Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.



Securing Products on the Go

Securing Products on the Go

Distributors worldwide are increasingly challenged with enhancing the effectiveness of their operations. In an industry characterized by high turnover, strict regulations, slim margins and tenuous customer loyalty, retail distributors need to make smarter decisions and manage their businesses more effectively.

Tale from the Dark Side

Tale from the Dark Side

In this autumnal month of witchery, trickery, and general tom-ghoulery, there comes a Halloween-worthy tale disturbing enough to haunt the mind of any business owner or information technology professional.

PureTech Systems Offers Internship Program for Students

The internship program for Arizona college students is entering its third term.

Ethernet Direct to Donate Percentage of Profits to Twin Towers Orphan Fund

Five percent of all gross profit made in the month of September will be donated to the Twin Towers Orphan Fund.

On The Cyberwar Path

On the Cyberwar Path

If, like me, you’re geeky enough to still recall certain scenes from 1983’s “WarGames” (and right now I can still pretty clearly see Barry Corbin as the general saying to Dabney Coleman’s character, “After very careful consideration, sir, I’ve come to the conclusion that your new defense system sucks”), then the news permeating the summer about the Pentagon publishing (in part) its first formal cyberwar strategy probably was no big surprise. In fact, the only eye-opening part might have been that prior to this summer it didn’t already have one.

WAGO Names 2010 National and Regional Distributors of the Year

WAGO Corp. has named long-time distributors, Heilind Electronics and B.W. Clark Inc. the 2010 National Distributor and Regional Distributors of the Year.

Massachusetts Sheriff's Department Deploys COLDSTORE Surveillance Storage System

After a lengthy search and the evaluation of multiple potential storage solutions, the Worcester Sheriff's Department has chosen Veracity's COLDSTORE as the surveillance storage system for a new 300+ camera project. COLDSTORE will be used to provide over 500TB of storage in conjunction with Genetec's Security Center 5.0 Unified Security Platform.

clouDevice VDI Thin Clients Receive Citrix Ready Verification

Interphase Corp. recently announced that clouDevice VDI (virtual desktop infrastructure) thin client devices have received Citrix Ready verification for Citrix XenDesktop.

USFA Releases University Housing Fires Report

FEMA’s United States Fire Administration (USFA) has issued a special report focusing on the causes and characteristics of fires in college and university residential buildings that include dormitories and fraternity and sorority houses.

SightLogix Names Dollacker & Associates as Manufacturer's Rep

The systems expert will represent SightLogix outdoor video solutions in the south central U.S.

Boston Hynes Convention Center Up to Code with Community R-Series

John B. Hynes Veterans Memorial Convention Center is one of three convention centers in Boston, located in the city's historic center.

4D Security Solutions Expands Urban Management Capabilities

The company, in partnership with Microsoft, improves the safety and efficiency of cities and municipalities with its new capabilities.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.