IP transmission - Security beat

Userful Enhances Cyber Security Operations Centers Using Software Approach

For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber se...

Transitioning To New Ownership, Pelco Envisions Its Next Chapter

The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Tra...

Adapting Servers For IP Video Surveillance Systems: Choosing The Right Solution

Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the vid...

IFSEC International 2018: Security Systems Adapt To Accommodate Data Needs

Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analyzing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of d...

Open Platform Access Control The Focus At MercTech4 Event in Miami, FL

Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are incre...

Veracity Expands Scope With Acquisition Of Software Provider icomply

Veracity, the Scottish company specializing in IP video transmission, storage and display, has made a small but significant acquisition that has the potential to impact its business profoundly, according to the company. Known for its COLDSTORE surveillance storage system and other video products, Veracity is expanding its scope with the acquisition of I-Comply Ltd. (icomply), a provider of command-and-control software whose UK customer base includes universities, hospitals, cities and power and...