Network / IP

Why Video Management Software Is Integral And Interwoven Into 2018’s Security Outlook

  The record-breaking attendance at the 2017 industry trade shows was a clear indication of a growing need for and interest in security. While cybersecurity was a main theme, with encryption and automatic-updating technology taking center stage, customized solutions and visible examples of increased manufacturer’s support were also highlighted. These latter two are interwoven through activities such as manufacturer’s training seminars that highlight the advan...

Why The Future Looks Bright In Cyberspace For The Security Industry In 2018

  What a year it’s been! 2017 has been a monumental period of product innovation and growth for Pivot3. The company experienced a more-than-50-percent increase in bookings from Q2 to Q3 this year, including a record number of million-dollar orders. We also saw deals supporting multiple use cases more than double, and experienced continued growth in the video surveillance market, driven by new product enhancements and contracts worth more than $1 million. We have also in...

Why Collaboration In The Security Industry Is Needed To Increase Cybersecurity In 2018

2017 demonstrated the need for increased safety, security, and collaboration. We predicted that there would be an increase in the role of cybersecurity in 2017, and without a doubt there was great focus around the need for stronger network security protocols. Growing Focus On Cybersecurity Cybersecurity continues to be top of mind and organizations demand solutions that are cyber-secure. Manufacturers, integrators, and end-users must actively collaborate to develop policies and solutions that...

QNAP Launches TVS-x73e 4/6/8-bay NAS, Featuring AMD RX-421BD Quad-core APU

QNAP Systems, Inc. has announced the release of the high-performance TVS-x73e series – an SMB NAS lineup featuring an AMD RX-421BD quad-core APU, up to 64GB DDR4 RAM, two M.2 SATA 6Gb/s SSD slots (for SSD cache acceleration with Qtie auto-tiering), the unique USB QuickAccess port, dual 4K HDMI output, and hardware-assisted 4K video transcoding acceleration. Private Cloud Designed for versatile business needs, the secure and scalable TVS-x73e series provides a pair of PCIe slots for flexi...

How To Prepare For Active Shooter Incidents | Infographic

This Active Shooter infographic summarises information about trends among active shooter incidents, and outlines how an organization can develop a plan before tragedy occurs, including:   Statistics on the numbers and types of recent active shooter incidents. A profile of common traits among active shooters. How to prepare beforehand, and what to do when the police arrive. How organizational planning ensures maximum preparednes...

VIVOTEK And Trend Micro Announce Partnership To Tackle Cybersecurity

VIVOTEK, the IP surveillance solution provider, and Trend Micro Incorporated, cybersecurity solutions, have announced a strategic partnership to offer cutting-edge cyber-defense solutions. With VIVOTEK’s experience in IP surveillance and Trend Micro’s extensive expertise in cybersecurity, the partnership enables users to enjoy higher levels of network security when deploying VIVOTEK’s network cameras, and strengthen defences in response to the emerging security challenges of th...

Round Table Discussions

What Are The Challenges Of Body-worn Cameras For The Security Industry?

Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?

How Does The IT Department Influence Security Purchases?

In recent years, information technology (IT) departments at end user companies have often been seen as adversaries of traditional security departments – or, at least, as a thorn in their side. One of the issues is territorial: As physical security products have migrated to use of Internet protocols and the network infrastructure, the IT and security departments have clashed – erm… make that interacted – more and more often. New realities such as cybersecurity have made i...

How Can Security Systems Be Used To Predict Bad Things?

It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most com...