SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Full-Colour HDCVI Bullet Camera

    Dahua Full-Colour HDCVI Bullet Camera

    Hikvision All-Rounder Traffic Camera

    Hikvision All-Rounder Traffic Camera

    ASSA ABLOY Incedo™ Business

    ASSA ABLOY Incedo™ Business

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Merrion Vaults Opts For Iris ID Biometric Identity Verification Technology To Enhance Security
    • Atos Acquires Ipsotek, Reinforces Its Position In The Edge And Computer Vision
    • FLIR Systems Launches Radiometric Version Of Boson Thermal Imaging Camera Module
    • Ping Identity Hosts A Virtual Event For Security Professionals To Share Real-World Identity Management Stories
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • Which Security Technologies Are Becoming Outdated Or Obsolete?
    • Physical Security And The Cloud: Why One Can’t Work Without The Other
    • Hybrid Working And The Threat Of Desk Data
    • Video Surveillance Is Getting Smarter And More Connected
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Hikvision Provides Their Security Systems To Enhance Maintenance Systems For Chaka Wind Farm

    Hikvision Provides Their Security Systems To Enhance Maintenance Systems For Chaka Wind Farm

    IDEMIA Installs Biometric Access Control Solution With MorphoWave Compact Devices And Digicon DFlow Speedgates At Paris HQ

    IDEMIA Installs Biometric Access Control Solution With MorphoWave Compact Devices And Digicon DFlow Speedgates At Paris HQ

    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Climax Technology Launches GX-DT35B Smart Care Medical Alarm To Keep Seniors Safe

    Climax Technology Launches GX-DT35B Smart Care Medical Alarm To Keep Seniors Safe

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Capture New Opportunities With Computer Vision And Video Analytics

    Capture New Opportunities With Computer Vision And Video Analytics

    Shifting Trends in Operation Centers and Control Rooms for 2021

    Shifting Trends in Operation Centers and Control Rooms for 2021

    5 Steps to Building Resilience in your 2021 Physical Security Plan

    5 Steps to Building Resilience in your 2021 Physical Security Plan

    Critical Event Management: The Digital Transformation of Safety and Security

    Critical Event Management: The Digital Transformation of Safety and Security

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Eagle Eye Networks
    • Hanwha Techwin America
    • Security & Safety Things
    • Leonardo
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Best Practices Guide: Analog Video To Cloud

    Best Practices Guide: Analog Video To Cloud

    Are Your Technology Providers Keeping You In The Dark?

    Are Your Technology Providers Keeping You In The Dark?

    Facing the Ever-evolving Hacker Head-on

    Facing the Ever-evolving Hacker Head-on

    Ensuring Cybersecurity Of Video

    Ensuring Cybersecurity Of Video

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Video surveillance

Video surveillance - Expert commentary

[Download] The Most Viable Converged Solution For Video Security And Monitoring
[Download] The Most Viable Converged Solution For Video Security And Monitoring

A Converged Solution for Video Security, Monitoring and Storage Today’s networked video systems have expanded their functionality beyond simply storing and retrieving video. Deploying the latest video systems depends more than ever on managing video data efficiently and effectively. New tools for managing video data include the use of virtual storage platforms, dynamic tiered storage, and video management system (VMS) software, all combined into a converged, standalone solu...

Video Surveillance Storage: What Decision Makers And Integrators Need To Know
Video Surveillance Storage: What Decision Makers And Integrators Need To Know

High definition has become the camera technology of choice for new installations Video storage is the foundation for new video surveillance infrastructures. Depending on your platform, storage can enhance your surveillance system’s capabilities, or it can limit them. But one thing is certain: your storage decision can no longer be an afterthought. Tremendous Growth In Data Storage Digital technology is transforming the surveillance industry. In fact, it’s estimat...

Access Control Market Sees Impressive Growth Within Security Industry
Access Control Market Sees Impressive Growth Within Security Industry

The access control industry is now picking up the challenge of embracing new technologies The access control business has, over the last 10 years, completely changed its image from being a rather unattractive slow growth and conservative business to taking up a position as a fast-growing confident business. The access control industry has listened and acted on the needs of the stakeholders in the supply chain and as a result the world market for access control products and so...

Tackling Security Market Commoditization With Innovation
Tackling Security Market Commoditization With Innovation

Innovation is not an end goal but an ongoing process that must be sustained Regardless of market, the challenge of commoditization is very real for manufacturers as companies producing lower-end products continue to imitate the most advanced technologies. This creates a perception among customers, and the marketplace in general, that even leading-edge products with greater features, functionality, and value are indistinguishable from others on the market. As a result of commod...

Download: Modern Tools To Achieve Excellence In Video Security
Download: Modern Tools To Achieve Excellence In Video Security

Better-performing video systems provide better security. Today’s end users demand systems with optimum performance, providing smooth video streams, higher resolutions, efficient storage, better analysis and quick access to stored images. Here are several technologies driving greater video surveillance capabilities: Innovations In Image Processing To Boost System Performance Higher resolutions are a challenge for video management systems, but new tools are mee...

Deep Learning Technology Applications For Video Surveillance
Deep Learning Technology Applications For Video Surveillance

The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...

Considerations When Designing An IP Video Security Infrastructure
Considerations When Designing An IP Video Security Infrastructure

Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...

Maximizing Camera-Based Applications For Security
Maximizing Camera-Based Applications For Security

Camera apps provide flexibility that is unheard-of with traditional server-based processing and analytics solutions The ability to customize IP video surveillance cameras with third-party apps has been a game-changer in system design and implementation. Traditional analytics require streaming all video to a server or external processor for deep interpretation to detect a license plate, face, or other criteria in each video frame. Apps perform image processing within the camera...

Data Mining For Insider Threats: Another Convergence Of Physical And Cyber Security
Data Mining For Insider Threats: Another Convergence Of Physical And Cyber Security

Insider threat is primarily focused on malicious threats to the company either by, or to, information technology assets For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety of surveys across the IT security industry. Companies are becoming increasingly worried about insider threats. From the cyber security perspective, insider threat is primarily focused on malicious threats...

Shedding Light On Integrated Cameras And Independent Illuminators
Shedding Light On Integrated Cameras And Independent Illuminators

Lighting, or the absence of it, is one issue that significantly affects a camera’s video quality Video surveillance has rapidly advanced over the last two decades. Today, integrators can purchase IP cameras offering complete network control, megapixel cameras with HD imaging, and PTZ cameras with remote directional control. Although these features are impressive, they don't solve all the challenges that surveillance solutions face. Importance Of Lighting For Camera Per...

Shooting Incidents Highlight Importance Of Hospital Security
Shooting Incidents Highlight Importance Of Hospital Security

Hospital security always counts. Patients may arrive from a crime scene and someone has to make sure they weren’t followed by trouble. Doctors, nurses and other medical personnel may come under blame for the death of a loved one and need protection. Heightened Security Needs Think for a minute, though, about the elevated need for security when the victims of a massacre — such as the Orlando massacre — arrive at the hospital. On the heels of the shooting at the Pulse Nightclu...

13 Tips For Security And IT Professionals To Keep IP Video Surveillance Networks Secure
13 Tips For Security And IT Professionals To Keep IP Video Surveillance Networks Secure

Strong passwords are the most basic security measure, but unfortunately ignored by many users Keeping surveillance networks secure can be a daunting task but there are several methods that can greatly reduce risk, especially when used in conjunction with each other. Below are 13 tips security and IT professionals can follow in order to keep an IP video surveillance network secure. 1. The Stronger The Password The Better Strong passwords are the most basic security measure...

View More
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 18
  • 19
  • »
Featured white papers
Best Practices Guide: Analog Video To Cloud

Best Practices Guide: Analog Video To Cloud

Download
Ensuring Cybersecurity Of Video

Ensuring Cybersecurity Of Video

Download
The Inevitability of The Cloud

The Inevitability of The Cloud

Download
Related articles
Incedo™ Business Plus From ASSA ABLOY Opening Solutions Provides Door Access Control And A Whole Lot More

Incedo™ Business Plus From ASSA ABLOY Opening Solutions Provides Door Access Control And A Whole Lot More

Eagle Eye Networks Releases Guide On How To Upgrade Analog Security Cameras To Digital Cloud Video Surveillance System

Eagle Eye Networks Releases Guide On How To Upgrade Analog Security Cameras To Digital Cloud Video Surveillance System

Which Security Technologies Are Becoming Outdated Or Obsolete?

Which Security Technologies Are Becoming Outdated Or Obsolete?

Follow us

Sections Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
About this page

See an extensive list of insightful articles related to Video surveillance, highlighting product, technology and industry trends on Video surveillance from industry thought leaders and experts.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download SecurityInformed.com product tech spec