Security Sales & Integration magazine’s first Physical-Logical Security Assessment shows security systems integrators are acknowledging issues surrounding cybersecurity that also affect networked physical security systems.
Scott Goldfine · March 12, 2015
That was the daunting message by security experts who addressed cybersecurity issues at a Wisconsin Homeland Security Council gathering.
SSI Staff · March 11, 2015
Blue Coat’s previous owner agreed to sell the company for $2.4 billion in an all-cash deal after taking it private in 2012 for $1.3 billion.
SSI Staff · March 11, 2015
Think your security business is too small to be an attractive target for cyber criminals? If so, you could not be more grievously wrong. Learn cost-efficient, uncomplicated techniques to safeguard your organization and your client’s sensitive information.
By Hank Goldberg · March 09, 2015
The current PACS architecture significantly limits access control system capabilities. This paper explains why next generation PACS architecture is long overdue: it presents the critical IT-aligned attributes and capabilities that next generation PACS architecture must possess.
February 18, 2015
Although an organization’s computer network is normally built to deal with large amounts of data, including that of video surveillance applications, installing security contractors need to fully leverage the functionalities of the end user’s IT investment to optimize bandwidth capacity. Learn principles behind proper cabling uses, bit rate control fundamentals and more.
The increasing need to transmit digital information from point to point has created various networking challenges for installing security contractors. This FREE download from Security Sales & Integration delves into the cabling and other infrastructure that determines the amount of bandwidth a network can achieve, along with insights into different transmission methodologies.
February 17, 2015
Security systems integrators need to be mindful of cyber attacks to datacenters and network communication hubs, as well as understanding how to protect access to databases or documents that are residing in their datacenters or on their servers when installing electronic security systems.
By Jorge Lozano · February 06, 2015
Jesse Vroman shares his inspirational rags-to-riches story. It’s an eye-opener for company owners and operators, showing how capable and talented employees can come from unexpected places.
Scott Goldfine · January 29, 2015
Some 150 security industry professionals, most of them systems integrators, were on hand for what may very well be looked back upon as an historic event: PSA’s Cybersecurity Congress.
Scott Goldfine · January 26, 2015
SYNNEX Vice President Kirk Nesbit explains what the convergence of physical and cyber security means for IT providers in this Q&A.
By Colleen Frye · January 20, 2015