Fixing the gaps in your PACS

Over the years, wrongdoers have used physical access control system (PACS) weaknesses to commit bad acts, some of a serious criminal nature. Some vulnerabilities in these incidents were due to system design flaws, while others could be attributed to poor data security practices. Here are several true stories that highlight the real world consequences of […]

2017: The Year of H.265?

  BY TOM COOK  With ever-increasing video resolution, there is no doubt that H.265 compression is the future. The growing demand for 4K and higher-megapixel video is driving the adoption of H.265 relatively quickly, as improvements in image quality, bandwidth efficiency and storage reduction are so compelling. However, despite the demand for H.265-enabled cameras, some manufacturers […]

Market Report: New Attack Vectors in Healthcare

Workplace violence — once the cornerstone of healthcare security — may not be the first thing a hospital security director is worried about in today’s climate. It appears, in fact, that physical security measures deployed by integrators in hospitals and other facilities has contributed to a marked downturn in violent crime. The 2016 Healthcare Crime Survey, conducted […]

Using the IoT to increase productivity

BY ROBERT MARTENS .   Access control is one of those areas that hasn’t previously been looked at from a productivity and personal experience standpoint, but with the IoT, you get the benefits of improved employee morale as well as significant cost savings from the many efficiencies the system can make possible. In recent years, IT departments […]

Business Case Drive Enhancements to Video Analytics

BY CODY FALCON . The industry has come a long way from analog CCTV video surveillance systems. The days of a few low-resolution cameras being monitored by a security guard at a desk are becoming rarer in mid-sized to enterprise organizations. Putting the cameras on an enterprise network and treating the video like any other data gives […]

Critical Infrastructure Sector Battles Growing Variety of Security Threats

The U.S. Department of Homeland Security defines “critical infrastructure” as assets that provide “the essential services that underpin American society and serve as the backbone of our nation’s economy, security and health. We know it as the power we use in our homes, the water we drink, the transportation that moves us, the stores we […]

How To Cope With Environmental And Networking Challenges Affecting Video Surveillance At Remote Sites

    Properly conducting video surveillance for any organization comes with several challenges. Not the least of which is how to architect a system that finds the right balance between quality, cost and bandwidth impact. This becomes even more challenging in non-traditional, demanding environments that are uncontrolled or highly dispersed, whether that’s an oil field, […]

High Airflows, High Risks: Protecting Datacenters

Aspirating sensor technology offers a high level of protection for datacenters while addressing the unique conditions and complications of these environments. By David George .   Although there is a low probability of fire in datacenters, even a small fire in a single piece of electronic equipment can result in extensive dam-age and costly interruption of […]

YOU DON’T HAVE TO BE AN EXPERT TO MAXIMIZE YOUR CAMPUS PASSIVE FIRE PROTECTION

Campus Safety Magazine. By Zach Winn    The unfortunate reality of fire safety systems on many campuses is that they’re usually installed once and never thought of again. During installation or construction phases, schools, universities and hospitals follow fire codes as much as necessary to pass inspections, and then proceed to invest their resources and […]

New vision

  Nathan T. Larmore, Scott McChesney  Advances in security camera technology, data analytics, digital video storage and mobility applications have dramatically improved the performance and capabilities of electronic security systems. These functional improvements also have changed the time-tested fundamentals of security system programming, design and implementation. The required level of understanding goes far beyond specification […]

Page 1 of 5123...Last »
logo_ul_listed logo_csaa logo_sia