The latest version (4.9) of Tyco Security Products’ victor video management system and VideoEdge NVRs brings greater system functionality and a variety of new, intuitive features for security operators and administrators, including centralized licensing, push-to-talk audio, personnel activity monitoring, system-wide health monitoring, interactive maps and a virtual pan-tilt-zoom (PTZ) function.
The latest version of this unified IP security platform offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control software.
Video surveillance technology is a powerful tool, and managing the data it creates is the key function of a video management solution (VMS). If you're investing in a new VMS solution, carefully consider these 10 criteria when evaluating your options.
ISC West, the largest physical security tradeshow in North America, once again was home to more than 10,000 new product introductions. Here are a few of the visitor management solutions introduced this year, from smart card readers to ID badges and more.
It’s an ongoing and inevitable conundrum for security systems managers: not all end users are experts.
May 1, 2014
The Town of Addison, Texas, is also seeing a return on its surveillance investment through easier-to-manage VMS. After a routine camera filter-and-replace, the Town’s IT department replaced cameras at three locations throughout the community: a 150,000 square-foot Athletic Club , a 44,000 square-foot Conference and Theatre Centre , and the 20-acre Addison Circle Park.
The security industry is chock full of acronyms, especially in the field of video recording, and determining the correct choice for your enterprise can be confusing. These five areas of comparison can help security leaders ask the right questions about their potential purchases.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!