“Banks Heap Suits on Target over Breach,” read a recent headline of a Wall Street Journal story. By that time, seven financial institutions had already filed class action suits against the retail giant alleging it did not sufficiently protect its customer’s data.
- By David Rizzo
- May 01, 2014
When UCF began planning an upgrade to their security solution—standalone,
battery-operated access control that did not provide the level of security
needed and a variety of small, analog video systems dispersed throughout multiple
campuses
- By Brent Doherty
- May 01, 2014
As access control systems have become more prevalent in business environments, companies are looking to leverage this technology to deliver additional solutions at less expensive costs.
- By Gerald McHugh
- May 01, 2014
Museums are complicated for security professionals. They must be open and welcoming to the public, but they often have quiet nooks and crannies where patrons sit and ponder the art and human endeavor on display.
- By Vicki Contavespi
- May 01, 2014
As the sophistication of the security industry evolves daily, companies are honing their partner loyalty programs to assist integrators in all aspects of the industry.
- By Ginger Hill
- May 01, 2014
When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.
- By Mauricio Chacon
- May 01, 2014
While an alarm system can’t protect your customers from everything, it is a proven measure of deterrence. Homes with alarm systems are three times less likely to get burglarized than homes without them.
- By Rob Phillips
- May 01, 2014
Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.
- By Charles P. Williams
- May 01, 2014
There is no telling what an appetite for success and a passion for technology will produce. One thing for certain, the desire to give the customer the best security solution possible will likely bear a long-term, winning combination.
- By Ralph C. Jensen
- May 01, 2014
ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.
- By Ralph C. Jensen
- May 01, 2014
Paris has the Eiffel Tower; New York has the Empire State building; Sydney has its Opera House; Rome has the Coliseum; and London has the London Eye, a well-known symbol for an extraordinary city.
- By Chris Maras
- May 01, 2014
While most organizations have developed highly sophisticated, comprehensive emergency plans, they are often lacking the communication vehicle to meaningfully convey them and make them accessible to a wide audience before, during and after an event. Mobile devices provide a simple, efficient and secure channel to proactively get the most up-to-date plans and best practices into the right hands and mitigate overall risk.
- By Christopher Britton
- Apr 30, 2014
Developer and manufacturer of long-range industrial wireless Ethernet radios embraces 10 years of business success.
Shocking results of a two-year security study of a healthcare network revealed via weak passwords, lack of authentication and embedded web servers.
- By Ginger Hill
- Apr 29, 2014
Identity management company innovates with a REST API for directories - now available for download.
Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
196 page catalog is easily accessible via smart phone, computer or tablet and includes all five NACE brand product lines.
Security cameras yanked from exterior of businesses with rope; are the suspects setting these businesses up for something worse? (Video included)
- By Ginger Hill
- Apr 24, 2014
Offers three light-condition operating modes in one unit for greater operational flexibility and image clarity.