Adapting Surveillance for Security-as-a-Service
Over the coming years the surveillance industry will follow a similar path that the IT industry has tread increasingly more service offerings. These offerings will range from live remote monitoring to...
View ArticleWhy the High-End Camera Market Keeps Growing
It often appears that everyone in the industry is talking about how to lower the costs of networked surveillance cameras compared to that of the analog security video type. What doesn’t seem to get as...
View ArticleHow to Implement Advanced Surveillance Training Policies
Some of the most challenging needs facing decision makers in today’s networked surveillance come after the initial deployment. After the selection and installation of hardware, software and camera...
View ArticleHow to Manage Surveillance Over the Private Cloud
What’s happening in the IT industry should be seen as a predictor for the future of networked surveillance. Approximately a year ago, a major indicator occurred that predicted that managed services...
View ArticleIncorporating Mobile Surveillance Options
The two-way Motorola radio has been the cornerstone of real-time communications for the emergency response and security industry for nearly a century, and is soon to be complemented by smartphone...
View ArticleKeeping New Video Analytics Simple
Over the past year big improvements in how to install, configure and operate video analytics were made that will enable the acceleration of growth in adoption of video analytics. As any technology...
View ArticleUpdates in Video Management Software Highlight Scalability
It’s safe to say that the video management software products have begun the 2.0 era. This era is all about how big the software can scale, and each year the industry will announce the new “biggest”...
View ArticleSix Common Mistakes in Day to Night Surveillance
While there are hundreds of articles, product descriptions and manufacturer specifications on what makes a “true” day/night surveillance camera, there may be a misunderstanding of how to design them...
View ArticlePost-Sales Support Keeps End Users Secure Long-Term
When customers are deciding to start migrating their analog CCTV and DVR-based surveillance systems to IP cameras and network-based recording, up to 80 percent of their time and budget is consumed by...
View ArticleTop 5 Impacts of the Booming Megapixel Market
The leading physical security market analysts all predict that megapixel cameras will continue to significantly outgrow the standard resolution camera marketplace, with many forecasting this segment...
View Article4 Creative Ways to Add Innovation to the Supply Chain
How do you protect assets using video surveillance in an environment that doesn’t have access to continuous power or network transmissions, and is managed by third parties offsite from your location,...
View ArticleChoosing the Right Video Recording Technology for Your Enterprise
The security industry is chock full of acronyms, especially in the field of video recording, and determining the correct choice for your enterprise can be confusing. These five areas of comparison can...
View ArticleStudying the Pros and Cons of Proprietary Wireless Surveillance
There are many examples within the technology industry of proprietary being considered better than standards-based systems. This certainly is the case within the Wireless Mesh Network (WMN) industry....
View ArticleComparing Surveillance Options for SMBs, Enterprises
In the analog security video boom, end users’ surveillance needs were very similar, regardless of their company’s size, but today’s surveillance product technologies are rapidly changing this...
View ArticleHow Remote Monitoring Can Combine Services and Surveillance
The size of the global security guarding and monitoring services industries in 2014 is projected to be more than $85 billion and has historically been growing at an annual rate of between four and...
View ArticleChanging the Definition of Surveillance in the Age of Converged Risk
The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines...
View ArticleMeasuring the Role of Risk Transfer in Cybersecurity Management
An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and...
View ArticleMaking Surveillance a Business Intelligence Necessity
In business, anomalies (events that differ from the norm) should get your attention. From a loss prevention perspective, one of the most effective ways to counter theft and fraud is to identify and...
View ArticleUsing Security Convergence to Enable the Enterprise
The concept of remote decision making, while necessary in 2000, is not necessary today. Let’s use the significant security and power of existing IT networks, let it all be managed by IT and let...
View ArticleIn Defense of Post-9/11 Surveillance
Surveillance was performed by putting people on the street and watching from parked cars and vans disguised at Bell Telephone service vehicles with portholes cut out for still cameras.
View ArticleLeveraging Surveillance Technologies for Safer Cities
Safe City initiatives typically start with the integration of security video. In most cases the cameras are operated by the police department or other local government entities such as Departments of...
View ArticleIntegrating Security Systems for Greater Business Value
Security countermeasures, such as surveillance, address threats and if done effectively eliminate them; this is more likely the case when an integrated solution is deployed. In looking at integrated...
View ArticleHow PSIM and Unified Platforms Drive Risk Management
Risk management too often is perilously fragmented and insufficiently funded. Managing the overall risk equation is assuredly a CEO-level and management team obligation. But the design and execution...
View ArticleHow the Internet of Things Impacts Surveillance
If the revelations by Edward Snowden proved anything, it is that the U.S., its allies and its enemies possess tremendous capabilities to know as much about individuals, groups, companies, and...
View ArticleRight-Sizing Technology for Agile Surveillance Success
In recent years, “cyber” has monopolized most of the serious coverage in the security industry, and rightly so, given the underprepared stance of many government and commercial organizations in the...
View ArticleHow to Use Smarter Surveillance to Close Intelligence Gaps
The ISIS-inspired terrorist attacks in Paris in January and the threats against shopping malls in the U.S., Canada and the UK by Al-Shaabab highlight threats that call for more fully integrated...
View ArticleFinding the Right Technology to Unlock Cloud and Mobile Surveillance
Businesses have listened to staff and abandoned in-house developed tools in favor of consumer products and ubiquitous software-as-a-service (SaaS) capabilities. They want to exploit the benefits that...
View ArticleCrowd-Sourced Surveillance: A Public Threat or a Public Service?
The past several months, more than any time in history, have highlighted the evolving role of surveillance in law enforcement, public safety and security.
View ArticleUsing Continuous Evaluation to Thwart Insider Threats
Before November 2009 little attention was paid to the silent threat cultivating inside of the U.S. Army. That all changed when a common U.S. Army officer, Major Nidal Hasan, killed 13 soldiers and...
View Article10 Factors to Assess Your Integrator's Cyber Skills
Cybersecurity is more than just a headline associated with attacks on critical infrastructure assets, such as utility companies or our nation’s repository of its personnel records of employees with...
View Article
More Pages to Explore .....