Skip to main content

10 Technology Game-Changers for 2019

  With public safety, smart city and smart building segments predicted to have an immediate and lasting effect on the North American electronic security market, where are the opportunities for security integrators to move the needle on gross margin? Here are 10 technologies generally outside the “traditional” electronic security industry that represent new opportunities on […]

Geospatial Awareness Could Be the Next Big Thing for VMS

Everything is going geospatial; from Twitter to Google, from Facebook to Pinterest.  Although it may manifest itself under other names: location-based, geo-intelligence, GEOINT, map-based, geo-referencing, geo-analysis, these are all terms referring to the concept of geospatial, which is defined as relating to or denoting data that is associated with a particular location.  It may sound […]

Radar vs. LiDAR: A Technology Toe-to-Toe

BY PAUL ROTHMAN      While both are finding massive demand in the self-driving automotive industry, the advances being made in radar and LiDAR technologies are having a discernible effect on the perimeter surveillance industry, where both technologies are gaining momentum as viable alternatives or enhancements for detection along vast perimeters. To learn more about these […]

America’s Critical Infrastructure: Threats, Vulnerabilities and Solutions

The tragic events of 9/11 awakened America to its critical infrastructure’s vulnerabilities and to the threats to this infrastructure – both physical and cyber. In the almost two decades that passed since then, the ability to monitor, detect and defend against a wide slew of threats to critical infrastructure has increased considerably, as witnessed by […]

The Convergence of Physical and Logical Access: What it really means for an Organization’s Security

FOR MANY SECURITY PROFESSIONALS, recent high-profile data breaches have shifted attention to external cyber threats. Despite this newfound focus, the Institute for Critical Infrastructure Technology reports that more than half of all cybersecurity incidents can be traced to insiders with legitimate access to corporate facilities and networks. Another survey from the Ponemon Institute reveals that […]

New Research Confirms the Rising Role of IT in Physical Access Control

While physical security professionals have suspected a shift toward increased involvement of the IT department in physical access control, recent research has shown this to be true. A survey conducted by HID Global of more than 1,500 IT Managers, Directors and staff, as well as Chief Information and Chief Technology Officers, found that IT departments […]

How to mitigate IoT threats to video surveillance systems

The expanding world of security video surveillance has yet to evolve into the Orwellian nightmare predicted in the novel 1984. But as device connectivity continues to define the digital age, monitoring the technology that monitors us is demanding stricter rules and protocols to ensure risk is mitigated, threats are dealt with in a proactive manner […]

Page 2 of 12123...10...Last »
Want to place your system on test with the central station? Click here
Would you like to build your inspection reports? Click here
Read the Red Hawk Observer Newsletter Articles. Click here
Would you like a free, no obligation survey of your business? Click here

*Not all services shown on our website are available in all jurisdictions. Please check with your local Red Hawk office to determine which services can be performed by the Red Hawk office in your area.
logo_ul_listed logo_csaa logo_sia SDM100 FAST50