Unifying and Converging IT and Physical Security
, , ,

The Compelling Case for Unifying IT and Physical Security

Most organizations today follow the official plan. They have their building and critical rooms secured with electronic access control, digital video and security intercoms; their IT network secured with a firewall, anti-virus and anti-malware; their website secured and their email servers secured; and both physical security and IT security were installed by the best integrators…

Keep Reading »
Data Center
, , , ,

Big Data and Privacy for Physical Security

Big data and privacy are two interrelated subjects that have not warranted much attention in physical security, until now. Both subjects are about to become of strategic importance to security, due to recent advancements in video analytics and big data technologies, court rulings regarding data privacy rights relating to surveillance video, and the growing value…

Keep Reading »
Security Industry Association (SIA)
, , , , ,

SIA New Member Profile: Cisco Meraki

,

The Security Industry Association (SIA) welcomes aboard Cisco Meraki, video surveillance innovators who made a big splash at ISC West 2017 last week. To learn more about the company and its history, SIA chatted with Emily DeSimone, Cisco Meraki Event Marketing Coordinator. How did you get into the security industry? Cisco Meraki is focused on…

Keep Reading »
, , , ,

Getting on the Path

Shortest Path Bridging can enhance network performance and efficiency Darren Giacomini, BCDVideo As the world of surveillance evolves, the introduction of multi-sensor and megapixel cameras presents a dynamic shift in industry accepted standards. For years, we have known the limitations of pan-tilt-zoom (PTZ) cameras, often finding them looking in one direction, only to miss critical…

Keep Reading »
Security Industry Association (SIA)
, , , , , ,

How Hackers Attack Physical Access Control Systems

,

As physical access control system (PACS) technologies continue to advance, so do attackers. While card cloning can be effective, entry isn’t always gained with this method alone. Attackers are beginning to move beyond the card to the technology that supports it. At ISC West on April 6 from 12:30-1:30 p.m., Valerie Thomas, Executive Security Consultant…

Keep Reading »
Security Industry Association (SIA)
, , , , , ,

Can Your Security System Be Used Against You?

,

As of 2015, nearly 300 million IP cameras have been installed around the world. Many of these cameras have been installed with default usernames and passwords and can be accessed from anywhere in the world. For years, the question has been: How secure is the video that a system produces? But, that question is changing.…

Keep Reading »