Open architecture easily allows company to transition to upgraded security
Teachers Credit Union, headquartered in South Bend, Ind., is the largest credit union in the state, reaching from inside the Michigan border from Niles, Mich., to Greenwood, Ind.
Salvaging the existing investment in coax cabling is often the number-one reason surveillance users are reluctant to switch to network video. The perceived cost of storage is a close second.
How a paperless solution streamlined and helped secure one police department’s workflow
Anyone involved in law enforcement knows how crucial secure document management is to efficiency across all departments.
Perhaps the most common challenge and opportunity facing any industry in today’s world is creating solutions that can accommodate the transitions that come with the rapid advancement of technology.
A security system is only as good as its weakest link
The best defense is a good offense. That often-used sports principle applies to military applications. It is an axiom that applies to the security industry, as well.
When mobile phones threaten security, it’s time to ‘decellerate’
This just in: There are now more cell phone users on the planet than wearers of shoes. That random yet eye-opening nugget comes courtesy of WikiAnswers, so consider the source, but still: more than shoes?
Not only do we as U.S. citizens have a right to be concerned about security, we should be up in arms about what the federal government is not doing to protect our country.
When mobile phones threaten security, it’s time to 'decellerate’
Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.
Open platform enables SaaS for multiple camera initiatives
The IT division’s network team at WKU implemented Milestone’s open platform video management software, XProtect Corporate.
Using remote video surveillance reshapes physical security
A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?