Networking Security


Enabling Collaboration - IP based system provides speed for emergency response teams

Enabling Collaboration

Emergency preparedness requires critical communications to be response ready—help can’t wait when disaster strikes.

Creative Uses for Hosted Video Surveillance - What do golf tournaments, racetracks, pedestrian malls and construction sites have in common

Creative Uses For Hosted Video Surveillance

Hosted video has leveled the playing field for many small businesses looking to secure their properties with the latest network surveillance technology.

In A Flash - Flash memory delivers performance benefits to video storage, but at what cost

In A Flash

Surveillance data is critical in applications ranging from retail to government, and gaming to transportation.

Indoor Wireless Path Loss - Four factors must be considered for transmission range

Indoor Wireless Path Loss

Unlike digital systems, trying to quantify the range performance of radio frequency (RF) communication systems can be difficult due to the large role the environment has on radio frequency signals.

HID Global Shows off NFC Access Control Technology in Action at ISC West

With mobile technology becoming an important trend in the security industry, HID Global showcased its NFC access control technology in action during a lunch Thursday at ISC West.

Mobile Takeover at ISC West

All attendees and exhibitors were introduced to “The Future of Security” early Wednesday morning; yet, many exhibitors came to Las Vegas armed with the mobile technology know-how to take on the new wave of mobile communication.

The Future of Security

The future of security is always on the minds of industry leaders and developers. As a welcome to all attendees at this year’s ISC West Conference in Las Vegas, an early morning session devoted to the future of the security industry addressed how IT and security convergence in the cloud will create better end-user operability.

South American Retailer Deploys Verint IP Video Solution

Verint Systems Inc. recently announced that Falabella is implementing its Nextiva IP video management software, along with Nextiva single- and multi-port encoders, and IP cameras, in 33 stores and distribution facilities across Chile.



Quantum Secure SAFE Physical Identity and Access Management Software Enhanced With New Analytics Modules

At ISC West 2012, Quantum Secure is introducing SAFE Analytics Suite, a bundle of new software modules to enable end-users to prepare for risks or even prevent risk-based events before they occur.

Axis Touts Faster, Smaller Products at ISC West

Axis Communications touted faster and smaller with the introduction of a slate of new products at a press breakfast to start ISC West Wednesday in Las Vegas.

Expecting More Growth this Year

Every so often I get lucky and find myself at the right place, at the right time, and hopefully doing the right things. For many years I’ve experienced this within the security industry. Being able to talk one-on-one with a company CEO is an example of three right opportunities.

RedCloud Awarded Patent for Technology that Integrates Physical, Logical Security Systems

RedCloud, formerly known as PlaSec, today announced that it has been awarded a new patent by the US Patent Office, recognizing and protecting core, underlying technology and intellectual property pioneered by RedCloud that enables the integration and convergence of physical and logical security systems.

Sentry360 Unveils 14-Megapixel Surveillance Camera

Sentry360 recently unveiled the IS-IP14K, the world’s smallest 14 megapixel surveillance camera at the ISC West.

Next Level Security Systems Unveils New, Unified Security Management Solution

Next Level Security Systems, a provider of a new breed of unified, networked security solutions, will highlight the next evolution of its open platform, IP-based security technologies at ISC West 2012.

Walgreens Distribution Center Deploys Wireless Video Solution for Monitoring Robots

HauteSpot Networks Corp., an international provider of wireless video surveillance and security solutions, recently announced the national deployment of HauteSpot wireless in a Walgreens distribution center.

Research: VsaaS Market Set to Double Over Next Three Years

IMS Research estimates that the world market for cloud based video surveillance, or video surveillance as a service (VSaaS), was worth more than $500 million in 2011, an increase of 25 percent from 2010. However, the big question is what does the future hold for this emerging market?

VideoIQ Introduces Rialto Analytic Bridge Product

VideoIQ, provider of intelligent all-in-one video surveillance solutions, recently announced the Rialto-A4, the first member of Rialto Analytic Bridge product family.

Barix Compact Master Paging Station Makes U.S. Debut at ISC West

Barix AG will unveil its Annuncicom PS1 Paging Station to the security industry at ISC West. The compact, elegant device gives commercial businesses, office buildings, educational institutions, medical facilities and others a simple, fully-integrated hardware solution for paging and intercom over IP.

Researchers Develop Smartphone App To Protect Consumers

Carnegie Mellon University CyLab researchers have developed a new smartphone app that leverages the growing proliferation of these devices to establish a secure basis for Internet communications.

CompTIA, Cybersecurity Experts Call For Best Practices with Increased Adoption of Mobile Technologies

In today's "post-PC" world, businesses of all sizes, as well as policy makers at all levels, need to be ready to address and manage increasing security and privacy challenges, found a panel of experts at CompTIA's mobile security briefing. Several dozen Hill staff, policy makers, security and privacy experts and technology advocates participated in the discussion.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.