Historically, storage has been a challenge for video system designers and installers, with requirements rising along with camera resolutions. The addition of big data, the Internet of Things (IoT), integrated systems and IT applications to the mix have multiplied storage needs exponentially.
Viakoo’s Camera Firmware Update Manager (CFUM) module reports on the firmware version currently present in each camera device on the network and can update cameras on older firmware versions to the most recent to mitigate the risk of cyber attacks.
Genetec is expanding its Streamvault™ (SV) turnkey security infrastructure portfolio to include enterprise-grade servers, workstations and storage solutions, available with Genetec Security Center pre-installed.
There is a world of difference between knowing the right thing to do and actually following through and doing it. Think about doctors who repeatedly remind their patients to quit smoking, or to be careful with their cholesterol, to get regular exercise and adopt healthier eating habits instead of eating bacon with every meal. We know what we should do. Quite often, though, that knowledge is not enough to actually change our behavior.
When it comes to potential cyberattacks, the Boy Scouts’ motto says it all: “Be prepared.” In other words, make sure you’re always in a state of readiness. This is especially true when you’re talking about installing multi-component security solutions.
Axis Communications' Academy's Encoder Training is a technical course developed for system designers, installers and consultants. The course will introduce you to Axis Communications' encoder offering and show you all the benefits of working with video encoders. Read More
The Axis Communications Design Tool has been completely retooled to provide system designers with much more information on Axis Camera installations. Please join us for this demonstration of the powerful new tool from Axis engineered to take the guesswork out of surveillance systems Read More
ON DEMAND: All networked systems and devices are exposed to cybersecurity threats. Building security systems are no exception to this rule. Many security systems have been afflicted by ransomware and cyber vulnerabilities. Some have been exploited to create bot armies or to provide an easy entry point for cyber criminals looking to attack valuable corporate assets. Neglect of cyber-hygiene is at the root of many of these issues.