 
                    
                                        
		            
                    Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.
                    
			            - By Peter  Boriskin
- Dec 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.
                    
			            - By Jeff  Whitney
- Dec 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.
                    
			            - By Courtney Dillon Pedersen
- Dec 01, 2018
 
            
                
	                
                    
                                        
		            
                    When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.
                    
			            - By Jeff  Capone
- Dec 01, 2018
 
            
                
	                
                    
                                        
		            
                    Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change. 
                    
			            - By Gadi  Bar-Ner
- Dec 01, 2018
 
            
                
	                
                    
                                        
		            
                    My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.
                    
			            - By Ralph  C. Jensen
- Dec 01, 2018
 
            
                
	                
                    
                                        
		            
                    We live in a world where computer hacking, data breaches, identity theft, and stolen records of all sizes have become worldwide events that can happen at any time.
                    
			            - By Ruben  Lugo
- Dec 01, 2018
 
            
                
	                 
                    
                                        
		            
                    The coffee chain says hackers might have accessed customer info through a data breach.
                    
			            - By Sydny  Shepard
- Nov 30, 2018
 
            
    
                
	                 
                    
                                        
		            
                    Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats 
                    
			            - By Liviu  Arsene
- Nov 30, 2018
 
            
                
	                 
                    
                                        
		            
                    The cameras are expected to cost about $30,000 and will be installed in about three months.
                    
			            - By Sydny  Shepard
- Nov 30, 2018