How to minimize cyberthreats in IP-based physical security systems
Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.
How secure is surveillance data accessed on mobile apps?
Mobile apps that can provide access to security solutions have become a standard facility for most solution providers. Such ‘on-the-go' access does raise some concerns, however, especially with regard to protecting surveillance data from unwanted, third-party access.
What makes video effective in chain store shrink prevention
A major challenge chain operators deal with is shrinkage, or losses from employee/customer theft and other management issues. As a result, operators turn to video surveillance to prevent such losses. This article explores some of the features that make video surveillance for chain applications effective, and caveats that installers should be aware of.
What are the common vulnerabilities of IP-based physical security systems for cyber intrusion?
In today's connected world, IP-based systems offer numerous breach points for cyber-attacks. Ironically, physical security systems based on IP infrastructure are among the most vulnerable systems to be attacked due to low awareness and limited offering of “hardened” security solutions.
Key functions of mobile apps for surveillance
Mobile apps have become an integral part of most security solutions, but their abilities could vary depending on the manufacturer. Customers would do well to know some key functions that should be included in an app.
How smart buildings differ across industries
Key verticals for smart buildings and the associated big data applications are large buildings where besides high energy consumption there is also care and engagement with environmental issues.
Facial recognition systems: a toss-up between security and privacy?
In light of recent global terrorist events around the globe, governments have been making an effort to amp up national security and protect the lives of people residing in the area. Biometric systems, such as facial recognition, has gained much attention over the past few years because of its fast, non-contact process and application in a wide variety of fields, both security and non-security rela
Big data enables smart buildings
Big-data systems are used to process and analyze the vast amounts of information generated by various sensors in the modern smart building. Their success in doing so is bound to drive cost savings and also change the way we work, however widespread adoption is still far.
Cybersecurity: a growing issue for surveillance systems
Video surveillance has become ubiquitous with today's modern security system found in small private installations to massive enterprise projects. Many are also migrating from an analog- to an IP-based or cloud managed security system, believing (rightly) that features such as better resolution, remote access, and accompanying analytic software will enhance the overall security provided.
Detect unwanted drones with drone detection solution
Drone Lab's drone detection solution helps users detect unwanted, intrusive drones in air, ground, or water, using multi-factor authentication system.
Robots in physical security – down the road, but still not close
Will 5G be the answer to mainstream connected devices?
Drone startups: carving out a niche for success
VIVOTEK demos compression, intelligent solutions at secutech
Hunt integrates IoT devices with NVR
FingerTec demonstrates its 'soft' power
Seagate on how to choose an HDD and customer feedback on SRS
Copyright © 2016. Messe Frankfurt New Era Business Media Ltd. All rights reserved.