This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Keywords » video

Items Tagged with 'video'
%{topic} RSS FeedRSS

ARTICLES

Training Future Digital Security Leaders

Training Future Digital Security Leaders

February 8, 2019
No Comments

Training Future Digital Security Leaders, by George Finney, CISO at Southern Methodist University


Read More
New Newswire Feature Image 3/8/2012
Security News -- Violence Prevention

Houston's Costly Homeland Security Videos Go Viral

August 20, 2012
No Comments

The latest video, "Run. Hide. Fight," has more than 800,000 hits on YouTube alone, but cost $200,000 to make. However, one director says, that evens out to 25 cents per person warned about active shoo


Read More

Megapixel Cameras in a Petrol Station

June 11, 2012
No Comments
The keys to successful planning and construction of a new petrol station involve the cost efficiency of the labor, the structural engineering of the facility, and the safety and security of patrons and employees.
Read More
Exclusives Feature Image

Eyes in the Sky: Cloud Computing and Video Surveillance

Robert Kramer
March 27, 2012
No Comments
The role of cloud-based services is being increasingly accepted and adopted by users in all parts of life. Cloud-based software is provided as a service over the Internet, typically on a subscription basis.
Read More
SchoolBus_feat

Expect Video on School Buses

March 16, 2012
No Comments
More than a third of adults involved in student transportation remember their school bus driver's name, according to a poll for First Student. Now and into the future, they will also acknowledge security cameras and their value on their buses. Besides providing a memorable experience, school buses are the safest way for children to get to and from school.
Read More
Exclusives Feature Image

Why You Can’t Afford to Ignore Video Analytics

Chuck Westfall
January 24, 2012
No Comments
In this age of heightened security, the sheer quantity of video needing to be monitored from cameras observing sensitive locations can be a daunting challenge for security professionals at all levels. Added to this task is the expense and potential fallibility of dedicated personnel hired to scrutinize video displays for extended periods of time.
Read More
Exclusives Feature Image

Think Hybrid and Save Money: How to Maximize Your Existing Video Surveillance Assets

Karenkrivaa
Karen Krivaa
January 10, 2012
No Comments
The rate at which many technologies are evolving is astounding. Just think what today’s smartphone can do, how email and the Internet have changed our work lives, or how the fax machine — though useful — is now considered outdated. This rapid evolution brings us many new opportunities; it also raises the challenge of what to do with systems, technology and equipment that are still functional, but no longer as effective. Security and surveillance markets in particular are affected by these exponential advancements.
Read More
Exclusives Feature Image

How to Provide Usable Evidence that Stands Up in Court

Mark S. Wilson Fred Zagurski
January 10, 2012
No Comments
When all is said and done, there are three variables in providing the type of recordings that the courts want.
Read More
Generic Image for Enterprise Services

Changing the Insurance/Arrests/Alarms Paradigm

November 22, 2011
No Comments
A discussion with Keith Jentoft, President, RSI Video Technologies, Inc.
Read More
Blog Logo
Security Seeks Overall Scene, Accurate Information Fast

Time to Get Complete Picture Across All Devices, Systems

Exclusive Survey Shows Complexities, Diverse Risks Demand a PSIM Approach
October 28, 2011
No Comments

A majority of security professionals believe that there is much to gain by integrating data from traditional physical security devices and systems, including access control, video, RFID, GPS, sensors and building management systems, in to one common operating picture.


Read More
More Articles Tagged with 'video'

EVENTS

Industry

1/10/12
Marriott Jacksonville
4670 Salisbury Road
Jacksonville, FL
United States
Contact: Tom Hanley

Axis Communications' Academy 2-day Fundamentals Training

Network Video Fundamentals is the building block of the Axis Communications' Academy training program. The fundamentals have been developed and refined to meet the educational requirements of both traditional analog CCTV and IT professionals. So whatever your background, you can achieve the advanced technical proficiency you need to work successfully with Axis products and solutions. Read More

Industry

7/12/12
Axis Experience Center
Chelmsford, MA
United States
Contact: Tom Hanley

1-Day Axis Certification Prep Course

The Axis Certification Preparation Training is a one day, instructor led course designed to introduce and prepare you for the Axis Network Video Exam. Read More

Industry

7/17/12
Hotel Ft. Des Moines
Des Moines, IA
United States
Contact: Tom Hanley

Axis Communications’ Academy 2-Day Fundamentals Training with FREE Encoder Training

Network Video Fundamentals is the building block of the Axis Communications’ Academy training program. Read More

Industry

7/31/12
Embassy Suites Hotels  
Little Rock, AR
United States
Contact: Tom Hanley

Axis Communications’ Academy 2-Day Fundamentals Training with FREE Encoder Training

Network Video Fundamentals is the building block of the Axis Communications’ Academy training program. Read More

Webinar

10/18/18 to 10/18/19
Contact: Vania

A Changing Tide: The Importance of Video Data Management in Enterprise Environments

ON DEMAND: Today more than ever before, organizations have significant interest in the intelligence that can be derived from video. Content can be leveraged for a multitude of purposes including operational efficiency, situational awareness, marketing and risk mitigation, making it highly valuable to multiple stakeholders. In fact, video is the most prominent Big Data application in the world, and once captured it has to be stored and protected to ensure its usefulness as a business intelligence tool.

Read More
Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

Globe

Which Countries Have the Worst and Best Cybersecurity?

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

password1-900px.jpg

New Vulnerabilities Found in Top Password Managers

password1-900px.jpg

How Americans Leave their Personal Info Open to Thieves

20180226SEC_DataminrFeb_360x184customcontent

Events

February 26, 2019

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
March 7, 2019

Finding Your Physical Security Blind Spots with Artificial Intelligence (A.I.)

Security infrastructures are undergoing a digital transformation with growing adoption of intelligent access control, video surveillance and analytics as well as IoT devices and sensors – generating more data to than ever before. Harnessed properly with artificial intelligence and a risk-based model, this data can be exposed and leveraged to improve life safety, minimize risk and increase operational efficiency.
View All Submit An Event

Poll

Employee Background Screening

How Often Does Your Organization Conduct Background Screening on Employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Feb-2019-Cover_144px

2019 February

In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing