More than Just a Silver Lining
Using the cloud for access control enhances scalability, availability, resiliency, flexibility and security The power of the public cloud has become a catalyst for a dramatic shift in the information systems and security worlds. On-premises solutions no longer exist in many domains, from customer relationship management to expense management to human resources systems to learning…
Keep Reading »Getting on the Path
Shortest Path Bridging can enhance network performance and efficiency Darren Giacomini, BCDVideo As the world of surveillance evolves, the introduction of multi-sensor and megapixel cameras presents a dynamic shift in industry accepted standards. For years, we have known the limitations of pan-tilt-zoom (PTZ) cameras, often finding them looking in one direction, only to miss critical…
Keep Reading »A Matter of Trust
New digital identity technologies will increase security, functionality, and convenience in many areas A shift in the use of identity technology is leading to increased adoption of mobile devices and the latest smart card technology, a greater emphasis, and reliance on the cloud, and a radical new way of thinking about trust in smart environments…
Keep Reading »Up in the Air
Drones powered by artificial intelligence could transform security Drones are powerful. They are changing our existence. They are here to stay. This article examines a drone application with the potential to have an extraordinary impact on the physical security industry. It is called robotic aerial security (RAS). What Is Robotic Aerial Security? RAS is sometimes…
Keep Reading »Walk this Way, Talk this Way: Using Multiple Biometrics
Combining gait analysis, voice recognition and other biometric identifiers provides a fraud-resistant security solution According to the statistics, terror attacks are continuing to climb as political climates heat up and radicals look for security weaknesses they can exploit to further their messages globally. The list of cities that have fallen victim to major attacks keeps…
Keep Reading »A Needle in a Video Haystack
Event-driven intelligence can identify the most important elements in surveillance data Today’s global security teams are faced with a complex set of threats, from vandalism, violence and severe weather to more extreme dangers, such as terrorism, all of which can be unpredictable. Because of the nature of these threats and the devastation that each one…
Keep Reading »A Sound Solution in Transportation Security
Audio monitoring can enhance situational awareness, reduce crime In 2014, the transportation sector contributed $1.45 trillion to the U.S. economy and represented 8.3 percent of the gross domestic product (GDP). While transportation is paramount to a thriving economy, it also presents some of the greatest security challenges. Millions of people rely on transit systems to…
Keep Reading »Threat from Above
How can potentially dangerous drones be detected and defeated? Unmanned aerial vehicles (UAVs), or drones, have been in use for many years but had not been widely adopted by the mass market until recently. With that adoption has come many new and productive applications of drones, but new threats have also emerged in a wide…
Keep Reading »Video Storage Wars
Hyper-convergence technology can simplify surveillance storage and enhance security The physical security systems and devices of today are more connected via LANs and the Internet than ever before. This extension of the network creates great opportunities, such as the growth of the Internet of Things (IoT), but it also creates additional vulnerabilities. Any IP-enabled device…
Keep Reading »Because You Can Never Be 100% Cybersecure
Effective use of strategies for countering attacks can minimize risk When was the last time you changed your password for your online bank account? Your email? Your social media accounts? How about your online shopping accounts or the myriad other login credentials that make up your digital life? Has it been a few months? Maybe…
Keep Reading »