Video surveillance technology is a powerful tool, and managing the data it creates is the key function of a video management solution (VMS). If you're investing in a new VMS solution, carefully consider these 10 criteria when evaluating your options.
ISC West, the largest physical security tradeshow in North America, once again was home to more than 10,000 new product introductions. Here are a few of the visitor management solutions introduced this year, from smart card readers to ID badges and more.
It’s an ongoing and inevitable conundrum for security systems managers: not all end users are experts.
May 1, 2014
The Town of Addison, Texas, is also seeing a return on its surveillance investment through easier-to-manage VMS. After a routine camera filter-and-replace, the Town’s IT department replaced cameras at three locations throughout the community: a 150,000 square-foot Athletic Club , a 44,000 square-foot Conference and Theatre Centre , and the 20-acre Addison Circle Park.
The security industry is chock full of acronyms, especially in the field of video recording, and determining the correct choice for your enterprise can be confusing. These five areas of comparison can help security leaders ask the right questions about their potential purchases.
It’s a balancing act. James Connolly wanted to significantly cut losses while having better images for liability and prosecution use. Tatiana Fokina, on the other hand, wanted to create a secure shopping experience that matches her inventory and customer profile.
For small and medium-sized facilities with less than 25 cameras, finding an appropriately sized video management program is tricky – you want to have enough power to monitor your assets appropriately, but not so much that half of the system’s capabilities never get used.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.