Cybersecurity is more than just a headline associated with attacks on critical infrastructure assets, such as utility companies or our nation’s repository of its personnel records of employees with the highest security clearances.
Where there is darkness, light. Or, at least, actionable security video boasting higher quality images at night. George Carlin, as the hippy dippy weatherman, had his spot-on prediction: “Weather forecast for tonight: dark. Continued dark overnight.” Add an additional nighttime forecast of likely chance of greater crime risk, too.
California Assemblyman Mike Gatto and Sen. Ted Gaines announced a bill that would allow first responders to jam, hack or otherwise take down drones "in the course of firefighting, air ambulance, or search-and-rescue operations."
4K ultra-high definition (UHD) technology increases situational awareness and offers considerable value in control room environments. Delivering ~8.3 million pixels, 4K/UHD displays significantly enhance the ability of operators to monitor finely detailed imagery in a range of applications.
It turns out that the hype about higher and even higher resolution security video is both real and unreal. The drums are now beating about 4K video but, according to end users and the experts, today’s megapixel sweet spot is 2 megapixels. It provides the image clarity, fits into many budgets and can work with most network infrastructures.
AVAILABLE ON DEMAND This webinar examines how Brown Shoe Company uses security technology in its more than 1,300 locations. Join Protection 1’s Lisa Ciappetta, Senior Director Marketing, and Jim Shepherd, National Account Manager, together with their customer, Kevin Darnell, Director of Loss Prevention at Brown Shoe Company, for this webinar!
On Demand Migrating from an analog to an IP camera system has traditionally been a difficult, time-consuming endeavor. Recent innovations make this an easy, risk free process. This webinar will introduce you to technology that can save you up to 70% in expenses and speed up migration.
ON DEMAND | The number one challenge, and often the number one oversight, is infrastructure requirements to support your IP Migration. Attendees will learn to design a IP platform that is easy to manage, switch technology advancements and avoid the gotcha.
Not all employees are saboteurs or malicious actors, but without education, unwitting employees could cause just as much damage as a targeted data theft in the long run. Read how to prevent this in the August 2015 issue of Security. Also read how building stronger relationships with local and national law enforcement can aid in school security awareness and response, learn about the dangers of continuing to use old credit card terminals, and see the ASIS International 2015 product review.