Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Powerful

Expert Commentary

867 articles found
Showing 1 to 20 of 867 articles
Page 1 of 44 pages
[Download] The Evolution Of Cards And Credentials In Physical Access[Download] The Evolution Of Cards And Credentials In Physical Access
Physical access control has been a key component of many organizations’ security strategies for several decades. Like any technology, access...
Video Surveillance Storage: What Decision Makers And Integrators Need To KnowVideo Surveillance Storage: What Decision Makers And Integrators Need To Know
Video s torage is the foundation for new video surveillance infrastructures. Depending on your platform, storage can enhance your surveillance...
Could Perimeter Intrusion Detection Benefit From USA Economic Uncertainty?Could Perimeter Intrusion Detection Benefit From USA Economic Uncertainty?
With the current state of economic uncertainty, there is a huge opportunity in 2017 for perimeter intrusion detection (PID) manufacturers to reach the...
Video Management Systems Evolve Beyond Traditional Physical SecurityVideo Management Systems Evolve Beyond Traditional Physical Security
Over the course of 2016, we witnessed a continuation of the prevalent trend towards more integrated and intelligent networked systems using Video...
Will Security Industry Consolidation Stifle Innovation?Will Security Industry Consolidation Stifle Innovation?
The security industry will continue to see consolidation through acquisition in 2017. At the advent of IP camera adoption, we saw a great decline in...
Growing Data Security Trends: Internet Of Things And Cyber SecurityGrowing Data Security Trends: Internet Of Things And Cyber Security
As the whirlwind of 2016 quickly winds down, it is a good opportunity to look back at the significant trends from this year. As predicted, the industry...
Physical Security Continues To Support Cybersecurity AimsPhysical Security Continues To Support Cybersecurity Aims
At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend , and that certainly proved to be the case...
Ongoing Network Attacks Encourage Consolidation Of Physical And CybersecurityOngoing Network Attacks Encourage Consolidation Of Physical And Cybersecurity
Ongoing attacks on private networks drew attention in 2016. Most public were the Wikileaks and other privacy violations during the 2016 election cycle....
Access Control Moves From Siloed Security Solution To Integrated ApproachAccess Control Moves From Siloed Security Solution To Integrated Approach
The year of 2016 ended with Vanderbilt finalizing the acquisition of Access Control Technology Ltd., which strengthened the company’s product...
[Download] Hitachi Video Management Platform: The Most Viable Converged Solution For Video Security And Monitoring[Download] Hitachi Video Management Platform: The Most Viable Converged Solution For Video Security And Monitoring
A Converged Solution for Video Security, Monitoring and Storage Today’s networked video systems have expanded their functionality beyond...
Video Management Software Advancements And Future TrendsVideo Management Software Advancements And Future Trends
Overall, 2016 has been a great year for AxxonSoft. We have seen great progress in the industry on an economic level as well as in development....
Growth Of Cloud-Based Access Control SolutionsGrowth Of Cloud-Based Access Control Solutions
Predicting where or how security access trends would develop in 2016 was an educated guess at best. We did, however, forecast continued growth in the...
SourceSecurity.com’s 10 Most Clicked Articles Posted In 2016SourceSecurity.com’s 10 Most Clicked Articles Posted In 2016
Again in 2016, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the...
SourceSecurity.com's Top 10 Expert Panel Roundtable Discussions In 2016SourceSecurity.com's Top 10 Expert Panel Roundtable Discussions In 2016
SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions. The very...
Access Management Becomes ‘mobilized,’ Pervasive And PersonalizedAccess Management Becomes ‘mobilized,’ Pervasive And Personalized
After two decades of advances from simple visual ID badges to smart cards, standards-based access control systems and mobile ID solutions, the industry...
Global Security Market Focused On Organizational Collaboration In 2016Global Security Market Focused On Organizational Collaboration In 2016
In the past year, we have continued to see that the global security market is both dynamic and evolving. The term “security” no longer means...
Robotics Are Trending In The Security Solutions SectorRobotics Are Trending In The Security Solutions Sector
The emergence of smart technology into the security sector is changing risk management economics and strategy in unique ways. Such technology leverages...
3 Ways Technology Will Change Access Control In 20173 Ways Technology Will Change Access Control In 2017
The winds of change have swept into the access control market in 2016. The hardware is transitioning away from being solely panel-based, software is...
Wireless Access Control Sees Major Growth In 2016Wireless Access Control Sees Major Growth In 2016
The shift from wired to wireless access control was expected to gather pace in 2016—and that has happened. This year we at Assa Abloy surveyed a...
Top 10 Security Industry Mergers & Acquisitions In 2016Top 10 Security Industry Mergers & Acquisitions In 2016
Merger and acquisition activity has become a familiar topic in the physical security market. In 2016, SourceSecurity.com covered M&A news involving...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy