White Papers


The Advantages of Virtual Barrier Analytics for Perimeter Systems

The Advantages of Virtual Barrier Analytics for Perimeter Systems

Together, artificial intelligence (AI) and machine learning have transformed the perimeter security technology landscape. FLIR's powerful new video analytics for perimeter intrusion detection—Virtual Barrier analytics—is purpose-built to deliver superior detection precision, classification accuracy, geolocation of targets, resilience against false alarms and situational awareness for perimeter intrusion detection systems (PIDS). Designed to continuously improve, Virtual Barrier analytics are built to keep pace with today’s evolving perimeter threats. This white paper will discuss the strategic value of Virtual Barrier analytics for PIDS, as well as its specific performance benefits when compared to other analytics.


Are Your Emergency Messages Reaching The Right People?

Are Your Emergency Messages Reaching The Right People?

Here are the pros and cons of some of the more popular mass notification solutions available today, as well as suggestions on how to make your emergency alert program more effective.


Deploying Push-to-Talk over Cellular and Wi-Fi Radio Networks

Deploying Push-to-Talk over Cellular and Wi-Fi Radio Networks

Demand for Push-to-Talk over Cellular (PoC) is growing due to the nationwide coverage and low cost. This White Paper reviews how PoC systems are deployed using 4G/LTE cellular networks, Wi-Fi networks, and unified PoC and LMR radio platforms. The different types of PoC devices are also reviewed, including PoC radios, video bodycams, and smartphones, along with dispatching applications that support instant group voice and video calling and GPS location tracking.




The AI (R)Evolution of Enterprise Security

The AI (R)Evolution of Enterprise Security

Today, the threats to enterprise workplace safety are more diverse, and have greater consequences both financially and in human form, than ever before. Workplace violence incidents, whether homicide or simple assault, are extremely costly to companies.


Perimeter and Intruder Security for Educational Establishments

Keeping students, teachers, visitors and educational facilities safe from criminal activity is a task which must be taken seriously. GJD and LILIN Americas have created this white paper to provide recommendations on how intrusion detection technology, combined with IP video surveillance systems, integrate to provide versatile security solutions for educational buildings.


Avoiding an Identity Crisis: Why Advanced Visual Security is a Critical First Line of Defense

Avoiding an Identity Crisis: Why Advanced Visual Security is a Critical First Line of Defense

Find about the potential cost of counterfeited IDs to your organization. Also, learn about new, technologically-advanced visual security features that can combat this problem, easily and cost-effectively.


Key Elements to Successful High Volume Distributed Card Issuance

Key Elements to Successful High Volume Distributed Card Issuance

Get the latest on successful high volume distributed ID card issuance


Top 10 Considerations for Choosing the Right Secure Issuance Solution

Top 10 Considerations for Choosing the Right Secure Issuance Solution

You’ve decided that you need to create new ID badges for your employees, staff and/or visitors, but where do you start?


Physical and Mobile IDs — Working Together to Protect Your Identity

Physical and Mobile IDs — Working Together to Protect Your Identity

Learn how the proliferation of mobile phones, proof of identity has now evolved to include mobile IDs


Understand the Best Practices for Video Storage Infrastructure

Best Practices for Video Storage Infrastructure

This white paper focuses on how to specify video storage, why video is a unique storage challenge and why systems must be carefully thought out to ensure crucial data isn’t lost. Central to the discussion is a review of the three storage technologies you are likely to run across including Direct Attached Storage (DAS), Network Attached Storage (NAS) and Storage Area Networks (SAN).


  • The Power of the Open Platform The Power of the Open Platform

    In this interview, sponsored by OpenEye, Eric Fullerton addresses the specific advantages of an open platform solution. He also talks how an end user can streamline operations and reduce cybersecurity risk in the cloud. Reducing the burden on IT will make it easier to manage and maintain video deployments and integrations of all sizes.

Digital Edition

  • Security Today Magazine - July August 2022

    July / August 2022

    Featuring:

    • Place Your Bets
    • Landmark Security
    • Adding Audio to ROI Programs
    • Protecting the Infrastructure
    • Unique Hiring Demands

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety