In a new industry with strict regulatory requirements, the video surveillance system is everything but ordinary. First, it had to be a modular system to allow the company to scale it through the multiphase project.
- By Mary Wilbur
- Oct 01, 2018
Video analytics solutions are enabling organizations to realize the full value of their video surveillance resources and enhance safety, security and overall business operations.
- By Stephanie Weagle
- Oct 01, 2018
A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples.
- By Yaron Zussman
- Oct 01, 2018
Every day, tens of millions of parents entrust schools with their children’s safety and every day, those parents worry if that trust is misplaced. In addition to the frequent headlines about school shootings, children deal with other pressing issues at school, whether it’s bullying, drugs or harassment.
- By Jeanie James
- Oct 01, 2018
Protecting government agencies requires the widest palette of security solutions with facilities ranging from a storefront military recruitment center to a bustling international airport or a biological research center.
- By Paul Hefty
- Oct 01, 2018
In the security industry, our mission is critical: protect the people, places and things that matter most.
- By Jeff Huggin
- Oct 01, 2018
As cloud computing and software as a service (SaaS) have evolved, video surveillance as a service (VSaaS) or cloud surveillance, has emerged as the most popular option for businesses seeking to simplify their physical security installations.
- By Andre Fontana
- Oct 01, 2018
Every businessperson wants to bring something different, or unique, to the table when they talk about their business solutions. In the security industry, or more particularly, the security consultant, the same applies. You’ve got to have a secret sauce.
- By Ralph C. Jensen
- Oct 01, 2018
The industry is changing so rapidly that the following statement might seem bold but it’s true. No one wants to buy a camera.
- By Alex Walthers
- Oct 01, 2018
Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.
- By Hilding Arrehed
- Oct 01, 2018
With the added video capabilities, Manteno authorities can alert agencies north or south of town to be on the lookout for specific vehicles with good description details.
- By Courtney Dillon Pedersen
- Oct 01, 2018
Northwestern Mutual operated several disparate security systems for access control, alarm management, intercom, video and visitor management. The new building project provided an opportunity to upgrade the security system and overall security program.
- By Kim Rahfaldt
- Oct 01, 2018
By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks.
At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).
- By Dan Gundry
- Oct 01, 2018
The TSA is implementing some pretty amazing technology in order to improve explosives detection. In late August, the agency unveiled a state-of-theart advanced technology computed tomography (CT) checkpoint scanner for screening passengers and their baggage.
- By Ralph C. Jensen
- Oct 01, 2018
Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.
- By Peter Boriskin
- Oct 01, 2018
Good business is about partnerships. Our cover story in this issue comes from Jeff Huggins who has written about different examples of not only keeping people secure, but also offering protection.
- By Ralph C. Jensen
- Oct 01, 2018
The hack dates back to April 2018, and compromised information includes email addresses and passwords.
- By Jordan Lutke
- Sep 28, 2018
“Firefox Monitor” will allow users to check whether their personal information and passwords have been part of a data breach
- By Jordan Lutke
- Sep 28, 2018