Security professionals face many challenges in selecting video surveillance systems that address their unique needs.
- By Jeff Whitney
- Sep 01, 2019
The world of outdoor security cameras is changing rapidly, and with it, the need for secure, high-quality camera housing.
- By Kaitlyn DeHaven
- Sep 01, 2019
How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
- By Evan Francen
- Aug 02, 2019
While video surveillance often takes center stage in security deployments, equally as important is audio.
- By Richard Brent
- Aug 01, 2019
Although IP-based network cameras are the prevailing standard for new installations, it wasn’t that long ago that analog cameras, and the complex infrastructures required to support large numbers of them, were the only way to accomplish the job.
- By Robert Wegner
- Jun 01, 2019
At the start of every new year, I get a sampling of what new technologies are going to be introduced. Most of the time, I’m in way over my head. Sometimes I understand and relate to the solution, the technology and what it all means.
When this upgrade project began in early 2017, there was a mix of standard-resolution legacy video cameras scattered throughout the facilities.
- By Courtney Dillon Pedersen
- Jun 01, 2019
Most access control systems are focused on improving security and protecting the business, ensuring that only the right people have the right access to the right areas. It keeps the bad guys out and the good guys in.
- By John Carter
- Jun 01, 2019
Today, many video surveillance systems use IP-based equipment, which sends recorded video across ethernet cabling to local, remote, and cloud-based recorders, often using the same LAN infrastructure that is used by general office workers.
And harness their power.
- By Matt Johnson
- Apr 08, 2019
Every interview I get for the magazine is enjoyable, and even entertaining. Every conversation is a story but once in a while I have a lead that I know will stick with me for quite a long time.
- By Ralph C. Jensen
- Apr 01, 2019
See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.
- By Tom Galvin
- Apr 01, 2019
As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.
- By Rich Aycock
- Apr 01, 2019
Like many metropolitan cities, Hartford, CT has its share of crimes. And solving those crimes usually involves sifting through an overwhelming amount of data.
- By Kevin Taylor
- Apr 01, 2019
Video surveillance management is becoming increasingly sophisticated in terms of operational capabilities, including the type and scope of analytics available.
- By Peter Ainsworth
- Apr 01, 2019
Gone are the days of paper-based note-taking and incident reporting, or hiring four guards to cover the role of one. Today’s security companies need to be more efficient and responsive, including being better at scheduling resources.
- By Mark Folmer
- Apr 01, 2019
With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.
- By J. Matthew Ladd
- Mar 01, 2019
The following predictions for ISC West 2019 dive deeper into how these innovations, among others, will help move the security industry forward.
- By Joe Oliveri
- Mar 01, 2019
Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).
Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes.
- By Dana Pruiett
- Mar 01, 2019