ISC West, the largest physical security tradeshow in North America, once again was home to more than 10,000 new product introductions. Here are a few of the visitor management solutions introduced this year, from smart card readers to ID badges and more.
It’s an ongoing and inevitable conundrum for security systems managers: not all end users are experts.
May 1, 2014
The Town of Addison, Texas, is also seeing a return on its surveillance investment through easier-to-manage VMS. After a routine camera filter-and-replace, the Town’s IT department replaced cameras at three locations throughout the community: a 150,000 square-foot Athletic Club , a 44,000 square-foot Conference and Theatre Centre , and the 20-acre Addison Circle Park.
The security industry is chock full of acronyms, especially in the field of video recording, and determining the correct choice for your enterprise can be confusing. These five areas of comparison can help security leaders ask the right questions about their potential purchases.
It’s a balancing act. James Connolly wanted to significantly cut losses while having better images for liability and prosecution use. Tatiana Fokina, on the other hand, wanted to create a secure shopping experience that matches her inventory and customer profile.
For small and medium-sized facilities with less than 25 cameras, finding an appropriately sized video management program is tricky – you want to have enough power to monitor your assets appropriately, but not so much that half of the system’s capabilities never get used.
Danske Bank Group, Denmark’s largest financial institution and a top-100 world bank, has selected the March Networks’ video management software and hybrid recorders for advanced security at its corporate facilities in Copenhagen.
Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.