Current best practices to maximize RMR on life-safety systems beyond monitoring.
Latest column posts
If security dealers do not stay on top of their clients' IP camera systems, they might not be able to spot disconnected cameras, leaving the clients' property unguarded.
Bob Stockwell · June 29, 2016
Smartphones are everywhere now, but are they a part of your security system offering? Check out these seven benefits of mobile security.
By Rich Mellott · April 20, 2016
The benefits are obvious when it comes to 4K video. But there's more to consider -- and install -- before expecting your 4K video surveillance system to deliver the ROI you expect.
Duane Richendollar · March 17, 2016
Security integrators need to work with clients to stay ahead of proximity card threats.
Bob Stockwell · August 12, 2015
Stanley Security’s Rich Mellott discusses market forces driving business intelligence (BI) in Security Sales & Integration’s latest IT Intelligence column.
By Rich Mellott · July 10, 2015
Learn the benefits of biometrics in certain security applications.
Bob Stockwell · June 08, 2015
Hospitals and medical clinics are regarded as sanctuaries for patients, so it's crucial that these facilities are secure. Let's examine health-care facilities’ escalating security needs.
Bob Stockwell · May 23, 2015
Learn the challenges often experienced when attempting to integrate Human Resources and enterprise access control. Awareness of these challenges can promote proactive, strong communication between the HR department, IT personnel and the security integrator, thus resolving these issues to provide effectively integrated client and enterprise security control platforms.
Bob Stockwell · April 09, 2015
Learn how linking social media to the physical security information management (PSIM) environment and merging social networking with facial recognition capabilities can help improve security.
Bob Stockwell · February 12, 2015
As more end users begin to evaluate security technology options, security integrators can work with them more effectively to ensure their facilities and assets will be secured.
Bob Stockwell · January 13, 2015
A hosted access control system can provide the most-used aspects of access control, such as integration into video, high security access cards, multiple factor authentication and others.
Bob Stockwell · December 09, 2014
Security systems integrators should establish an annual preventative maintenance program that includes regular battery replacement and complete load testing of each device attached to single power supply.
Bob Stockwell · November 18, 2014
Security systems integrators need to outline the benefits of incorporating physical security information management systems (PSIMs) for the existing and prospective clients.
Bob Stockwell · November 14, 2014
Let's examine the transition to digital detection on the edge.
Bob Stockwell · November 07, 2014
Installing security contractors need to consider several factors when deciding whether to use existing wiring, or to install new Cat-5 or -6 cabling infrastructure to upgrade analog video solutions to IP and outdated access control systems.
Bob Stockwell · October 14, 2014