IT Security


Encrypted USB Drives

The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.

Cisco Announces Plan to Acquire Sentryo

Cisco Announces Plan to Acquire Sentryo

Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.

An Iron Solution

An Iron Solution

One of the primary criteria for any surveillance, access or security system is the requirement for a consistent and reliable power source, as even the most complex and expensive system solutions will be rendered useless if power is interrupted.

Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

The company said Wednesday that large, enterprise firms were most likely to focus on cybersecurity and AI. Small and midsize firms are more likely to prioritize DevOps skills, experience with end-user hardware and IT infrastructure proficiency.

How to Protect Your Business from Amazon

How to Protect Your Business from Amazon

If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.

Your Top Data-Exposure Risk: Employees

People are fallible creatures. As the saying goes, nobody’s perfect.

Choosing the Right VMS for Your Business

Choosing the Right VMS for Your Business

Since every business is unique, it comes as no surprise that each has different security needs.



The Next Evolution

The Next Evolution

It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.

Four Video Storage Trends to Watch

Four Video Storage Trends to Watch

Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.

What the FCC

What the FCC's Recall on Net Neutrality Means for Cybersecurity

The FCC has voted to roll back an Obama-era Net Neutrality Rules.

Moving the Discussion Forward

Industry Vertical

Moving the Discussion Forward

Only a few years ago, the inevitable shift to all things Cloud was met with guarded optimism. But today, the shift is really happening.

Survey Reveals Serious IoT Concerns

Survey Reveals Serious IoT Concerns

The survey was based on responses from 603 IT and line-of-business decision-makers involved in enterprise security teams across the US, UK, Germany, France, Australia and New Zealand.

Hacked Off

Hacked Off

While our industry is fairly good at anticipating and reacting to new physical security threats, we’ve been very slow to react to the clear and present danger from cybersecurity attacks.

Educating End Users

As a provider of storage for video surveillance systems, the hardest part of my job is educating end-users, integrators and consultants on the best way to purchase storage for their systems.

How to prepare your network and defend against the “Gadget Hordes”

How to Prepare Your Network and Defend Against the “Gadget Hordes”

With each passing year, network and security administrators have been faced with more and more devices appearing inside the walls of their corporate network.

Bandwidth Throttling

VMS Bandwidth Saving Technologies

Beyond the core functionalities of recording and displaying video, one of the most important capabilities of modern Video Management Software platforms is the ability to reduce bandwidth required for transmitting live video.

The Cloud Keeps Evolving in 2017

The Cloud Keeps Evolving in 2017

Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.

Contextual Analytics

Contextual Analytics

Each of the millions of decisions made each day by people, devices and systems falls into one of two categories: binary and contextual.

Where the Cloud Meets Video Surveillance

Where the Cloud Meets Video Surveillance

I’m sure by now everyone understands the basics of “The Cloud” since it has become ubiquitous with almost all business apps now offered or exclusively offered in the cloud.

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety