Smart buildings are essential building blocks within the complex smart city ecosystem as they contribute significantly to the sustainability of cities. Many governments’ visions of smart cities include not only making urban environments more sustainable.
- By Brent Jacot
- Sep 20, 2022
The IoT presents a huge opportunity market. Every second, 127 new IoT devices are connected to the web, and experts predict that by 2025, that figure will equate to more than 75 billion connected devices overall. Unfortunately, this volume of connected devices brings inevitable security risks.
- By Alexandre Araujo
- Nov 29, 2021
There have been on-going discussions the past several years about how Big Data and Artificial Intelligence (AI) can be used to modernize physical security systems and operations.
It is the end of the line for analog phone systems, which can leave alarm companies hanging out to dry trying to figure out if they need to replace costly alarm panels.
- By Monique Merhige
- Mar 29, 2021
The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.
- By Richard Kanadjian
- Aug 01, 2019
Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.
- By Kaitlyn DeHaven
- Jun 07, 2019
One of the primary criteria for any surveillance, access or security system is the requirement for a consistent and reliable power source, as even the most complex and expensive system solutions will be rendered useless if power is interrupted.
- By JR Andrews
- Apr 01, 2019
Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.
- By Richard Diver
- Mar 01, 2019
The company said Wednesday that large, enterprise firms were most likely to focus on cybersecurity and AI. Small and midsize firms are more likely to prioritize DevOps skills, experience with end-user hardware and IT infrastructure proficiency.
- By Jessica Davis
- Nov 09, 2018
People are fallible creatures. As the saying goes, nobody’s perfect.
- By Jason Cronk
- Sep 01, 2018
If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.
- By Scott Lindley
- Sep 01, 2018
Since every business is unique, it comes as no surprise that each has different security needs.
- By Ray Cooke, Andrew Elvish
- May 13, 2018
It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.
- By Shawn Guan
- Mar 01, 2018
Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.
- By Eric Polet
- Feb 01, 2018
The FCC has voted to roll back an Obama-era Net Neutrality Rules.
- By Sydny Shepard
- Dec 15, 2017
Only a few years ago, the inevitable shift to all things Cloud was met with guarded optimism. But today, the shift is really happening.
- By Christian Morin
- Dec 01, 2017
The survey was based on responses from 603 IT and line-of-business decision-makers involved in enterprise security teams across the US, UK, Germany, France, Australia and New Zealand.
- By Jessica Davis
- Nov 13, 2017
While our industry is fairly good at anticipating and reacting to new physical security threats, we’ve been very slow to react to the clear and present danger from cybersecurity attacks.
- By Tom Galvin
- Sep 01, 2017
As a provider of storage for video surveillance systems, the hardest part of my job is educating end-users, integrators and consultants on the best way to purchase storage for their systems.
- By Scott Seraboff
- Apr 01, 2017
With each passing year, network and security administrators have been faced with more and more devices appearing inside the walls of their corporate network.
- By Mike Baker
- Mar 24, 2017