Stanley Security’s Rich Mellott discusses market forces driving business intelligence (BI) in Security Sales & Integration’s latest IT Intelligence column.
By Rich Mellott · July 10, 2015
Cybersecurity firm Kaspersky Lab reveals that third-parties can hack video surveillance networks and manipulate the data transmitted through it.
SSI Staff · May 29, 2015
Hospitals and medical clinics are regarded as sanctuaries for patients, so it's crucial that these facilities are secure. Let's examine health-care facilities’ escalating security needs.
Bob Stockwell · May 23, 2015
NICE Systems' acquired cyber and intelligence business unit will be merged into Cyberbit, an Elbit Systems subsidiary, in order to consolidate the parent company's cyber activities.
SSI Staff · May 21, 2015
Perhaps the most notable change to PSA-TEC was the inclusion of a new cybersecurity education track and a series of vendor cybersecurity solutions spotlight sessions. Find out what they had to share.
Scott Goldfine · May 10, 2015
Eagle Eye Networks has released as whitepaper that offers 12 cyber-safe best practices for security cameras. The document covers attack vectors and vulnerabilities for both cloud-managed video surveillance systems and traditional video surveillance systems that are connected to the internet or the company’s private network.
SSI Staff · April 30, 2015
One factor advancing the integration of building systems is the impressive range of monitoring and control capabilities today’s building automation systems can provide. What’s more, rich data sets can be stored and analyzed to achieve newfound operational efficiencies.
Rodney Bosch · April 27, 2015
The PSA Security Network will host PSA-TEC 2015 on May 4-8. For the first time, the conference will feature a Cybersecurity Track designed to provide practical solutions and applications for physical security integrators.
Rodney Bosch · April 23, 2015
Are you a security integrator who doesn't think cybersecurity's their business? Think again. Security dealers need to become more proactive to protect clients from these devious and dangerous attackers.
Paul Boucherle · April 20, 2015
Learn the challenges often experienced when attempting to integrate Human Resources and enterprise access control. Awareness of these challenges can promote proactive, strong communication between the HR department, IT personnel and the security integrator, thus resolving these issues to provide effectively integrated client and enterprise security control platforms.
Bob Stockwell · April 09, 2015