Remember the early days of video analytics? All the alerts triggered by a passing shadow? Or leaves quivering in the breeze? Even a car with bright headlights driving by?
- By Robert Muehlbauer
- Sep 18, 2023
In 2023, managing financial resources is increasingly critical for everyone. A key to affordable smart security is to use automated and intelligent tools to reduce costs. In municipalities, the idea is to use smart video surveillance systems to trigger event notifications and reduce the need to pay large numbers of staff to watch all the cameras, all the time.
- By Mark Espenschied
- Sep 18, 2023
The cloud continues to be a major topic of discussion across the security and surveillance industry. Cloud adoption rates are continuing to increase as many customers move past earlier concerns about cloud security and reliability and begin to realize the significant benefits that come with the cloud: efficiency, scale, and cost savings.
- By Aaron Saks
- Sep 18, 2023
Security organizations are sitting on a goldmine of data collected by cameras, VMS, access control systems (ACS), automated license plate recognition (ALPR), intrusion systems and other connected devices.
- By Charles Pitman
- Sep 18, 2023
Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust?
Advances in AI are happening quickly. That is one of the reasons it is so exciting for some and potentially alarming for others. By focusing on AI, or more precisely, the subsets of AI known as machine and deep learning
- By Hiroshi (Huey) Sekiguchi
- Aug 01, 2023
Multi-cloud environments are common and popular because they simplify what used to be complicated workflows, and they help organizations stay connected in an efficient manner.
- By Venkat Thummisi
- Jul 19, 2023
Nearly three-quarters of all cyberattacks involve ransomware which means a majority of defenders are failing to detect ransomware successfully. The fact is, ransomware isn’t the first stage of the attack, it’s often the last stage; and cyberattacks usually get labeled or categorized as ransomware when data is encrypted or stolen and a ransom is demanded by cybercriminals.
- By Stu Sjouwerman
- Jun 20, 2023
Today, creating a safe environment across schools, hotels, office buildings, housing complexes and other facilities has become a necessity. There are so many dangers lurking in buildings of all sizes and shapes from fire hazards, vaping issues, chemical/air quality issues, intruders and so much more.
- By Monique Merhige
- May 30, 2023
Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more.
- By Bruce Czerwinski
- Mar 22, 2023
The widespread adoption of peer-to-peer (P2P) payment platforms has made it significantly more convenient for individuals to share money digitally. In 2022, 84% of consumers said they used a P2P service, and the popularity shows no signs of waning.
- By Al Pascual
- Feb 17, 2023
As security technology has become more widely used, the interest in new capabilities and increased security measures has increased. As we head into 2023, these three trends will shape the security landscape.
- By Brian James
- Jan 24, 2023
More organizations today are relying on cloud-based solutions to transform and grow their business than ever before. All major cloud service providers, including Google, Amazon, Microsoft and IBM, have seen astonishing growth in cloud-solution revenue over the last few years, and there is no slowdown in sight.
- By Jennifer Hones
- Jan 09, 2023
According to a 2022 study conducted by Ponemon Institute, the average U.S. enterprise manages approximately 135,000 endpoint devices. Given that most, if not all of these devices require dependable power to maintain functionality, the need to deliver reliable power efficiently to devices, which is critical to building safety, security and comfort have never been higher.
- By JR Andrews
- Dec 01, 2022
Modern surveillance systems generate an overwhelming (and mostly unused) amount of data. This is especially true when recording video in 24/7 operations, which is essential to capturing evidence, incidents and events
- By Joe Danielson
- Dec 01, 2022
Organizations of every type and size often need to make informed decisions for areas of improvement, enhancement, and change.
- By Fabiola Ruvalcaba
- Sep 20, 2022
Today, financial institutions across the globe focus on security and safety more than ever before. Known threats, such as workplace violence, terrorism, and natural disasters, continue to be significant challenges, while cybersecurity risks have expanded.
- By Alan Stoddard
- Sep 19, 2022
Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world.
- By Steve Hanna
- Jun 01, 2022
Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).
- By Dave Krauthamer
- May 02, 2022
It is no surprise in the world of video data storage, there is an evolution from on-prem to the Cloud and Video-Surveillance-as-a-Service (VSaaS).
- By Sean Chang
- Jan 27, 2022