Data Security


Deploying in a Hybrid, Cloud Environment

The way organizations manage access control is evolving. Traditional on-premises systems come with high IT and server requirements. At the same time, fully cloud-based solutions may not meet the needs of every facility.

Protecting Cloud Apps Common in Healthcare with API Security

Protecting Cloud Apps Common in Healthcare with API Security

Many healthcare information systems (HIS) applications rely on APIs to exchange data and interact with external systems. With the increasing adoption of cloud computing, the usage of APIs has grown exponentially in healthcare

Standing on a Cloud Platform

You might say Robert Messer has his head in the clouds. He is the founder and manager of IPTECHVIEW, and his goal has always been addressing the co-exisitence of the cloud and security solutions. His goal was a new platform selling components such as security cameras, NAS systems for video archiving and various VMS to resellers and installers.

The Best Line of Defense

The Best Line of Defense

Of the many challenges plaguing the security industry today, stricter compliance regulations are a top concern for many administrators. A main reason for this is because the longer data must be retained, the longer the window of opportunity for a cyberattack grows.

Making the Case for Cloud Security

Making the Case for Cloud Security

The cloud continues to be a major topic of discussion across the security and surveillance industry. Cloud adoption rates are continuing to increase as many customers move past earlier concerns about cloud security and reliability and begin to realize the significant benefits that come with the cloud: efficiency, scale, and cost savings.

Getting More from Your Data

Getting More from Your Data

Security organizations are sitting on a goldmine of data collected by cameras, VMS, access control systems (ACS), automated license plate recognition (ALPR), intrusion systems and other connected devices.

12 Commercial Crime Sites to Do Your Research

12 Commercial Crime Sites to Do Your Research

Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust?

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.



Why Hackers Have Their Sights Set on Healthcare

Why Hackers Have Their Sights Set on Healthcare

We see it time and time again, the headlines splashed along newspapers and email newsletters that a hospital or its network of offices have been hit in a cybersecurity attack. Now more than ever, we continue to expect that attackers will target nursing homes, doctors’ offices, and other medical facilities due to the immense pressure the industry is facing to modernize. While the advancements in technology are vital to ensuring better patient care, they also open doors for threat actors everywhere.

Protecting Sensitive Data

Digital banking has become commonplace across the world, with the number of people using these services projected to reach 3.6 billion by 2024.

Enhancing Situational Awareness

In an era marked by technological advancements and increasing security concerns, the integration of artificial intelligence (AI) into video surveillance systems has revolutionized situational awareness and critical infrastructure protection.

Survey: Insider Threats Surge Across U.S. Critical Infrastructure

Survey: Insider Threats Surge Across U.S. Critical Infrastructure

Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyber threats in the last three years, according to new research by leading cyber security services firm Bridewell.

Report: 47 Percent of Internet Traffic is From Bots

Report: 47 Percent of Internet Traffic is From Bots

Imperva Inc. recently released 2023 Imperva Bad Bot Report, a global analysis of automated bot traffic across the internet. In 2022, nearly half (47.4%) of all internet traffic came from bots, a 5.1% increase over the previous year. The proportion of human traffic (52.6%) decreased to its lowest level in eight years.

New Research Shows Ransomware Attacks Resurge with Victims Doubling in 2023

New Research Shows Ransomware Attacks Resurge with Victims Doubling in 2023

Black Kite, provider third-party cyber risk intelligence, recently released its highly anticipated report, “Ransomware Threat Landscape 2023: Ransomware Resurgence”.

10 Data Security Enhancements for Your Business

10 Data Security Enhancements for Your Business

More than three quarters (77 percent) of IT decision makers across the United States and Canada believe their companies are likely to face a data breach within the next three years according to survey results released recently by Adastra, the global Data and Analytics solution provider.

Harmonizing the Power of Data

Today, financial institutions across the globe focus on security and safety more than ever before. Known threats, such as workplace violence, terrorism, and natural disasters, continue to be significant challenges, while cybersecurity risks have expanded.

Building the Future We Deserve – A Cyber Success Story

Building the Future We Deserve – A Cyber Success Story

Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).

Similarities at Data Centers and Airports

Similarities at Data Centers and Airports

Few sectors face higher regulation and compliance standards in the United States than the aviation industry.

Overcoming the Problems

Overcoming the Problems

What you are about to read is like an old-fashion action-thriller book or movie. There is a very mean-spirited evil villain, and, happily, a protagonist to save the day.

Yesterday’s Hype

Yesterday’s Hype

Let’s admit it. When analytics first hit the market, they got off to a rocky start. Lots of hype, and high expectations. When it came to delivering on those promises, their performance often fell short of the mark.

Featured

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

  • Deploying in a Hybrid, Cloud Environment

    The way organizations manage access control is evolving. Traditional on-premises systems come with high IT and server requirements. At the same time, fully cloud-based solutions may not meet the needs of every facility. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.