As violence and shooting within Chicago-area expressways continues to increase year-over-year, the Governor, Illinois Department of Transportation, Chicago Department of Transportation and Illinois State Police will install 200 cameras in surrounding expressways to help solve crimes.
Now, user experience is at the forefront of the evolution of security technology, with devices being developed that both enhance and simplify the way in which people interact with security solutions. One significant advancement for the security industry has been the development and introduction of frictionless access control technology – a solution that alters and simplifies the overall user experience.
Eagle Eye Networks released its new report detailing camera use and insights from cameras connected to the Eagle Eye Networks Cloud Video Management System (VMS). The insights are analyzed from a sample data set of 100,000 cameras in 90 countries around the world. True Cloud, technology improvements, COVID-19, and the need for business intelligence are transforming the video surveillance market.
Built in 2002, Continuum in South Beach is a two-tower, 38-story resort-style oceanfront condominium located on the southern-most tip of Miami Beach in South Florida. Continuum’s on-site Command Center currently manages 264 channels and growing. The emphasis is on tactical real-time operations and live visualization.
There are few discussions in the physical security business that don’t at some point focus on the topic of cybersecurity. One area frequently missing from these conversations is the importance of a trusted supply chain for manufacturers. Since a product is only as good as the hardware and software inside it, examining how something is built can give us rapid insight into its potential vulnerabilities and overall cyber worthiness. The NDAA (National Defense Authorization Act) ban is particularly focused on the subject of component sourcing for security devices. What is inside that device that could be exploited? Where did it come from? What do we know about the manufacturing process? These are all important questions about the manufacturing supply chain that need to be considered by anyone who cares about cybersecurity.