Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Expert tip: When to use megapixel cameras

Fredrik Nilsson
April 13, 2010
While VGA resolution cameras continue to dominate the market, megapixel surveillance has been quickly gaining ground. Though megapixel cameras cost more than lower-resolution cameras and require more storage for the
Read More

So, Who’s Using All Those Megapixel Cameras?

Paredes Mig
April 13, 2010
Go to any security media outlet and the talk is about megapixel cameras, even though depending on whom you ask, somewhere around 80 percent of all installations are still analog
Read More

How to Implement Cellular Alarm Solutions in your Security Portfolio

Shawn Welsh
April 6, 2010
In August 2009, The Economist estimated that home phones are being disconnected at a rate of nearly 700,000 lines per month. At that rate, the last phone line in America
Read More

How to Maximize Your DVR and NVR Storage

Mark S. Wilson
March 21, 2010
Surveillance storage solutions can have many challenges, thanks to myriads of DVR and NVR features and benefits that can range from common specifications to helpful elements such as intelligent PTZ
Read More

The Elements of a Successful Security Project

Jason Oakley
Jason Oakley
March 16, 2010
The complexity of security technology implementations demands a formal project management discipline to ensure success. More project managers in the security industry are pursuing formal qualifications such as CSPM or
Read More

How to Deploy Effective Security Outdoors

John Romanowich
March 9, 2010
Nuisance alarms are the bane of the security industry. Whether false alarms come from burglar alarms, outdoor sensors or some other system component, they can undermine security effectiveness and cause
Read More

Why Physical Keys Should Still Be a Part of your Security Strategy

March 2, 2010
Lost keys, unauthorized duplicate sets of keys and manual tracking of keys are just some of the challenges faced by management using conventional key/lock systems. But given the tremendous range
Read More

PCI COMPLIANCE: What you Don’t Know CAN Hurt You

Larry Wine
February 23, 2010
To some people, the idea of crime against merchants seems like the latest Clint Eastwood movie, but the more modern day characterization is the exploitation of customer’s sensitive payment card
Read More

Before the Alarm Sounds – Developing Effective Monitoring Response Plans

Jacky Grimm
February 16, 2010
An alarm sounds at one of your customer’s locations. It’s time for your monitoring station to spring into action. But will the response be appropriate for the event? Will it
Read More

Reducing the Cost of Storing Video Surveillance Data over Time

Charles Foley
February 9, 2010
The video surveillance world has seen a number of trends that are increasing overall system costs, including increased camera counts for better coverage, increased resolutions that produce better video, and
Read More
Previous 1 2 … 258 259 260 261 262 263 264 265 266 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing