Edge storage video cameras have been available on the market for many years and are often used as an integral component to full-featured video management systems. Not every application needs a large-scale system, and in some cases, edge storage cameras can serve well enough alone.
Category: Security Hardware and Technology
The tools of the security trade are advancing at an extraordinary pace. We take a look at the latest security hardware and software, from malware and cyberattack detection to cameras to motion sensors. These articles will help you determine what gadgets may be best for your security strategy—and what will fit your budget.
Every IT department has some old gear that’s functional, but is built to handle old storage material or can’t handle modern work demands. It can often be a pain to recycle, and, it’s still functional, so why get rid of it? Who knows, maybe someone will need a file stored on a legacy medium. Well, […]
Maintenance on security equipment can get ignored until those devices fail—and often under the worst circumstances. It’s critical to schedule maintenance and stay vigilant for any needed inspections, adjustments, or repairs, even on newly installed equipment.
Sometimes, security-related stories make headlines that are too absurd to ignore. This week, there were two. Since it’s Friday, let’s have a weird news roundup.
There is a movement underway to better maintain new buildings sprouting up across America through the integration of systems that support environmental initiatives.
You may remember a news item that made the rounds a little more than a month ago about Google prevented phishing attacks on its more than 85,000 employees by changing how they deployed two-factor authentication (2FA). Rather than relying on one-time codes sent via text or through an authenticator app, they began requiring employees to […]
A properly functioning security system is all but required in this day and age. They’re always on, ready to record any threats to your workforce, property, or other essential organizational assets. Sometimes, though, they are there to witness the best (or worst) of humanity’s “hold my beer” moments. All you need to do is head […]
A successful business is expanding locations on a regional level and needs surveillance at all its sites. A mini-city, large-scale, master-planned community pops up with its own security challenges. Their needs are met in unique ways.
Crowdfunding sites like Kickstarter and IndieGoGo have made serious inroads over the last few years, allowing entrepreneurs and established companies alike to pitch products directly to consumers. I have crowdfunded a couple of projects (nothing security related), and thankfully, I have yet to get burned—either by someone who can’t or won’t deliver a product or […]
For those following along, this year has provided a seemingly never-ending stream of data breaches, hacks, and critical vulnerabilities that have many questioning their online footprint. With companies like Cambridge Analytica essentially exploiting a flaw in Facebook’s business model to gather massive amounts of personal information, or hackers attacking a vulnerable website to gather valuable […]