As more IoT devices (sensors) are introduced, new services emerge that integrate them. Clients will see new approaches to optimizing their people, processes and technology architecture.
Both of the new MegaDome G3 and G3 RS (remote setup) dome camera series from Arecont Vision offer H.264 compression in an all-in-one camera, lens and housing solution.
Since its establishment in 2001, video surveillance manufacturer Hikvision has grown rapidly to have the largest global market share for its segment. However, the company’s space in the industry spotlight has not come without challenges, including being vulnerable to the Mirai malware attack in March 2017 and skepticism from end users and other vendors about the Chinese video surveillance company.
Security magazine recently set some of these questions to Hikvision USA’s President, Jeffrey He, who responded to some recent allegations and end users’ concerns.
Blending legacy physical security devices and software with newer products and services often is at the heart of any retrofit project – whether you are a retail business in search of higher resolution camera technology for more accurate images, or you’re the head of a multi-location organization that wants to take advantage of current access control card reader technology without installing completely new door controllers, card readers and wiring.
Complexity is not our friend. It is the enemy of execution. However, where there is complexity there is also opportunity for technology and service providers who understand the complexity, embrace it and reduce its impact on their client’s organization.
The proliferation of Internet of Things (IoT) devices is greatly expanding the ecosystem in which physical security lives, opening up exciting new integration possibilities and business opportunities within the enterprise market.
Today's Chief Security Officers (CSOs) are worried about their investment, but more than that, they're worried about preserving employee safety, the safety of their data and the ability of their systems to integrate fully.
Between security systems manufacturers, integrators and end users, is anyone fully prepared to mitigate cybersecurity risk?
April 1, 2017
Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.