SSI logo

Systems Integration

Top Story

Waste Management to Security Management: One Man’s Unusual Odyssey

Jesse Vroman shares his inspirational rags-to-riches story. It’s an eye-opener for company owners and operators, showing how capable and talented employees can come from unexpected places.


Latest in Systems Integration

Axis Communications General Manager Fredrik Nilsson describes how he sees business models evolving for security product suppliers, dealers/integrators and monitoring providers during 2015 in the latest Under Surveillance blog. Scott Goldfine · December 25, 2014

What does IHS’ Jon Cropley expect to be the major security technology shift for 2015? Find out in the latest Under Surveillance blog. Scott Goldfine · December 19, 2014

A multitude of software, products and services are moving to the proverbial cloud, so why should electronic security solutions be any different? Integrators will need to understand unique challenges related to security along with common misconceptions. SSI Staff · December 18, 2014

What does Security-Net's Jim Coleman see developing in the areas of political, legislative and standards issues for the electronic security industry in 2015? Find out the answer to this question and more in the latest Under Surveillance blog. Scott Goldfine · December 17, 2014

Research data will be used to create a Compensation & Benefits Report to help NSCA members identify successful staffing strategies, ensure a constant workflow and positive work environment and benchmark current employee offerings. SSI Staff · December 16, 2014

Scheduled for Dec. 16, the Western Digital-sponsored webinar will present attendees with new opportunities to partner with managed service providers and other cyber experts to cover themselves against liability, tap into the billions of dollars being allocated in this area, and deliver total security solutions to end users. SSI Staff · December 15, 2014

Cyber-attacks are dominating news headlines and shaking up the electronic security industry. With devices residing on enterprise networks and connected to the Internet, the risk of compromise threatens integrators’ credibility, liability and livelihood, as well as the security and assets of their end-user customers. Subject matter experts define the challenges, discuss solutions and outline opportunities. Scott Goldfine · December 15, 2014

Today’s business climate calls for an evolution in your approach to RMR in order to maintain existing accounts’ satisfaction levels and to improve the opportunities to attract new high-quality subscribers. Bob Dolph · December 15, 2014

What type of year does Louroe Electronics CEO Richard Brent anticipate for security in 2015? This question and more is answered in the latest Under Surveillance blog. Scott Goldfine · December 15, 2014

What are some pressing security industry issues that PSA Security Network’s Bill Bozeman expects to remain unresolved? This question and more is answered in the latest Under Surveillance blog. Scott Goldfine · December 14, 2014




EDITOR'S CHOICE