Current best practices to maximize RMR on life-safety systems beyond monitoring.
Latest column posts
Learn how linking social media to the physical security information management (PSIM) environment and merging social networking with facial recognition capabilities can help improve security.
Bob Stockwell · February 12, 2015
As more end users begin to evaluate security technology options, security integrators can work with them more effectively to ensure their facilities and assets will be secured.
Bob Stockwell · January 13, 2015
A hosted access control system can provide the most-used aspects of access control, such as integration into video, high security access cards, multiple factor authentication and others.
Bob Stockwell · December 09, 2014
Security systems integrators should establish an annual preventative maintenance program that includes regular battery replacement and complete load testing of each device attached to single power supply.
Bob Stockwell · November 18, 2014
Security systems integrators need to outline the benefits of incorporating physical security information management systems (PSIMs) for the existing and prospective clients.
Bob Stockwell · November 14, 2014
Let's examine the transition to digital detection on the edge.
Bob Stockwell · November 07, 2014
Installing security contractors need to consider several factors when deciding whether to use existing wiring, or to install new Cat-5 or -6 cabling infrastructure to upgrade analog video solutions to IP and outdated access control systems.
Bob Stockwell · October 14, 2014
Although 4K monitors have the potential to add incredible value to end users' video surveillance systems, there are several components that security installers should review with their clients before making that move.
Bob Stockwell · October 09, 2014
Proper planning can help prevent large-scale retail retrofit hazards.
Bob Stockwell · July 24, 2014
Newfound efficiencies with today’s mass notification solutions.
By Bob Stockwell · January 09, 2014
Here are six tips to help repeal cyberattacks on a business' enterprise platform.
By Bob Stockwell · December 01, 2013
What is the integrator's role in protecting networks with encryption and other network protocols?
By Bob Stockwell · October 31, 2013
A primer on troubleshooting IP address conflicts.
By Bob Stockwell · September 30, 2013
Maximizing network bandwidth begins with consulting with IT personnel.
By Bob Stockwell · September 03, 2013
Editor’s Note: SSI is pleased to introduce this new column covering network security and featuring STANLEY Security’s Bob Stockwell.
By Bob Stockwell · July 31, 2013