 
                    
                                        
		            
                    As network security professionals are acutely aware, they must be continuously vigilant to meet the ever-evolving threats driven by the bring your own device (BYOD) trend that is extending the network outside the office.
                    
			            - By Michael  Harris
- May 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Multiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card. 
                    
			            - By Dave  Adams
- May 01, 2013
 
            
                
	                 
                    
                                        
		            
                    The transition of existing physical security systems, such as fire and burglar alarm or video surveillance systems, to the next generation of technology has never been easier or more affordable than it is today.
                    
			            - By Jim  McLaughlin
- May 01, 2013
 
            
                
	                 
                    
                                        
		            
                    When the first network camera was introduced in 1996, its functionality was pretty bare bones: digitize images and send them across the network to a centralized video management system.
                    
			            - By Robert  Muehlbauer
- May 01, 2013
 
            
                
	                 
                    
                                        
		            
                    FMC Corp. is a diversified, chemical company with leading positions in agricultural, industrial and consumer markets. Since the company’s inception in 1883, FMC has been providing solutions to companies worldwide and to their customers.
                    
			            - By Pramod  Akkarachittor
- Apr 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Although video analytics have been around for years in various forms, they haven’t always been easy to use, or economical, at least not for a small business owner. 
                    
			            - By David  Klein
- Apr 01, 2013
 
            
                
	                 
                    
                                        
		            
                    The increasing demands put on networks by mobile devices and bring-your-own-device programs, virtualization and private clouds, and the transition to IPv6 have created greater complexity and risk for IT teams to manage. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device. 
                    
			            - By Ronnie   Pennington
- Mar 01, 2013
 
            
    
                
	                 
                    
                                        
		            
                    IT professionals are adopting the latest technologies to meet increasing bandwidth demands, create higher and faster performing networks and increase availability. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    When developing IP surveillance installations, many security system integrators and IP-Surveillance network designers have turned to PoE technology, and for good reason. Using PoE cameras and switches eliminates the need for separate power and data cables, thus simplifying installation, increasing flexibility for camera locations and saving money.
                    
			            - By Steven  Olen
- Feb 07, 2013
 
            
                
	                 
                    
                                        
		            
                    Connection of industrial network devices with a cellular modem can be challenging. In most cases, industrial network devices are operating backwards from how typical consumers utilize an Internet connection over a cellular modem. 
                    
			            - By Michael  Derby
- Feb 01, 2013
 
            
                
	                
                    
                                        
		            
                    The email resembled the organization’s own employee e-newsletter and asked recipients to visit a website to confirm that they wanted to continue receiving the newsletter. Another email carried an attachment it said contained the marketing plan the recipient had requested at a recent conference. A third email bearing a colleague’s name suggested a useful website to visit.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    We often talk about security in terms of commercial and industrial ventures, but the military also speaks of security, and their message varies little from what we hear at tradeshows. In fact, the military is quite interested in private industry partnering where there is value and productivity is placed on many communities in our nation. 
                    
			            - By Ralph  C. Jensen
- Jan 01, 2013
 
            
                
	                 
                    
                                        
		            
                    There’s no question that the 21st century has brought significant change to security solutions. An abundance of connectivity options and the application of technologies—such as IP, virtualization, hosted solutions and mobile—are enhancing the way we secure the enterprise and helping to improve security.
                    
			            - By Jeremy   Brecher
- Jan 01, 2013
 
            
                
	                
                    
                                        
		            
                    Arecont Vision cameras provide an expanded coverage area at a 150-acre produce facility for Brisbane Markets Ltd. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Prism’s sophisticated video analytics software uses IQeye HD megapixel images to create valuable intelligence.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    SurroundVideo Panoramic and MegaView IR Bullet-style cameras secure the facility and production operations in Indonesia textile plants.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    There is a misconception in the security industry that megapixel cameras are more expensive than conventional cameras. Don’t believe it. 
                    
			            - By Scott  Schafer
- Dec 01, 2012
 
            
                
	                 
                    
                                        
		            
                    It is beyond dispute that Machine to Machine (M2M) technology and communications will influence our daily personal and business lives in the coming years.
                    
			            - By Cathal  McDaid
- Dec 01, 2012
 
            
                
	                 
                    
                                        
		            
                    Scalable system architectures have been the source of many debates within the security industry.
                    
			            - By Mahesh  Saptharishi, Ph.D.
- Dec 01, 2012