Network-Centric Security


Open But Secure

With features ranging from a high-tech tufted vinyl carpet to special air filtration systems, the $45 million addition to Jackson High School in Massillon, Ohio, is a state-of-the-art education facility.

Seagate Announces Hard Drives Designed For Digital Video Surveillance Systems

Seagate Technology recently announced its SV35 Series hard drives, specifically designed for optimal performance in digital video surveillance systems, now have a top capacity of 1 Terabyte, providing 32 full days of high-resolution video streaming.

Toronto Transit Commission To Roll Out IP Video Technology To Entire Fleet

March Networks, a provider of intelligent IP video and business analysis applications, recently announced the Toronto Transit Commission (TTC) is expanding its roll-out of the company's mobile video surveillance solution to its entire fleet of public transit vehicles and has also selected the solution for deployment across its Wheel-Trans paratransit fleet.

Report Cites Decreased Security Breaches Via Encryption Solutions

Conducted by the Aberdeen Group, this study also provides valuable information on the approaches taken to lower operational costs, reduce risk and establish consistent security policies.

Network-Centric Security: August 2007

WELCOME to the world of Network-Centric Security — where security becomes a mission-critical business process in the overall enterprise, requiring close-knit cooperation with the corporate IT department. Today, enterprise security is more than card readers and surveillance cameras at the entrance, or anti-virus software and firewalls in the computer closet. It’s the strategic combination in the design, planning and implementation of both in order to protect physical assets as well as information, intellectual property, product integrity and brand equity. It's where physical security and IT worlds converge.



Surprised By Storage

"I am not a tech guy," said Ken Haverlan, director for security, health and safety at Middletown County Schools in New York. That's why he immediately brought Mike Tuttle, the school district's IT chief, into discussions about a new IP video surveillance network. Although Haverlan's primary goals were capturing identifiable faces and ensuring video was immediately available to first responders, Tuttle recalls his initial question: "How am I going to store all this footage and for how long?"

More Than Just a Wire

Convergence is not new. The IT networking industry has experienced multiple waves of convergence over the past 20 years. And with each wave, convergence has delivered new capabilities and some unexpected high-impact, even game-changing, innovations.

OnSSI Now Manages Firetide Wireless Nets

Fighting the Crowd

TO take advantage of the powerful and ubiquitous TCP/IP communication platform, manufacturers of security products, such as network video cameras, gate access controllers, biometric scanners, perimeter fencing systems and mobile/covert monitoring solutions, are gradually migrating analog-based products to a digital Ethernet platform.

The RF Crowd

TO take advantage of the powerful and ubiquitous TCP/IP communication platform, manufacturers of security products such as network video cameras, gate access controllers, biometric scanners, perimeter fencing systems and mobile covert monitoring solutions are gradually migrating products to a digital platform. In many cases, a wireline network connection is not available at all locations in the facility. Wireless alternatives are increasingly being considered to deploy these Ethernet devices.

The Trend of Change

CHANGE will continue to be the biggest the biggest trend in the security industry well into 2008. Enterprise security management systems are becoming larger and more integrated. Multi-level convergence is occurring in logical security, IT, data, access control and integrated components. Video management and access control are forming an integrated security management system. The future is leading the industry toward an integration platform that involves access control, video, audio, building control, intrusion and fire protection.

Questions and Answers From the Top

AS the security industry continues to grow larger each year, convergence still dominates the topic of conversation. Numerous solutions are beginning to hit the mainstream market to help businesses handle the ever-changing and growing task of bringing disparate systems together. We talked to Ajay Jain, Quantum Secure founder and CEO, about his company’s definition of convergence and some of the upcoming trends companies need to address.

Leaving No Escape

TODAY’S biggest security risk is loss of corporate data. This vulnerability originates from two unrecognized paradigm shifts—dissolution of the corporation’s physical and network perimeter and spyware-based data theft. These two paradigm shifts can be examined by looking at four data security incidents. The incidents will help to provide two solutions to minimize the risk of data loss: a new unified approach to IT and physical security and the need for advanced defenses against spyware.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.