SourceSecurity.com RSS - Expert Commentary SourceSecurity.com RSS - Expert Commentary from SourceSecurity.com http://us.sourcesecurity.com/news/industry-news.html Copyright (C) SourceSecurity.com 2017 Expert Commentary Wed, 22 Nov 2017 08:00:00 GMT Wed, 22 Nov 2017 08:00:00 GMT Preventing Terror Threats: Lockdown Procedures For Public Spaceshttp://us.sourcesecurity.com/news/articles/preventing-terror-threats-lockdown-procedures-public-co-1645-ga.24071.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/preventing-terror-threats-lockdown-procedures-public-co-1645-ga.24071.htmlExpert CommentaryWed, 22 Nov 2017 08:00:00 GMT<p><strong>The threat of international terrorism has changed the way the domestic security industry thinks about protection, just as much as it has for national security services. <span class="translate_hls">While</span> violent attacks and terrorism were once predominantly aimed at government, military or political establishments, an uncertain global political climate means the ability to rapidly lock down facilities has risen to the top of any organization&rsquo;s security wish list.</strong></p> <p>In reality though, just how easy is it for most organizations to lock down their facilities at a moment&rsquo;s notice? <span class="translate_hls">While</span> all security systems aim to secure people and property from attacks or theft, the ability to enact a full access lockdown very much depends upon not only the individual components, but also the intelligent solutions used to oversee them.</p> <p>The security industry&rsquo;s foresight in moving towards much closer systems...Top 3 Mistakes When Integrating Security Entrances And Access Control Systemshttp://us.sourcesecurity.com/news/articles/top-3-mistakes-integrating-access-control-security-entrances-boon-edam-co-286-ga.24069.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/top-3-mistakes-integrating-access-control-security-entrances-boon-edam-co-286-ga.24069.htmlExpert CommentaryWed, 22 Nov 2017 08:00:00 GMT<p><strong>Access control and security entrance integration is a specialized discipline. It is true that security entrances require only a dry contact and can integrate with virtually any access control system, but there are some things to be considered when researching the right access control system for your organization&rsquo;s security goals.</strong></p> <p>After 21 years&rsquo; experience in the security industry&mdash;four of those serving as an advisor for security solutions to dozens of Fortune 1000 companies&mdash;and a <a href="/companies/company-listing/lenel-systems-international.html" class="orangebold">Lenel</a> certification, I&rsquo;ve seen a lot when it comes to security entrances and access control systems. Based on that experience, here are three mistakes I&rsquo;ve seen too many times that I hope I can help you avoid.</p> <h2>Mistake 1: Device Placement</h2> <p>The placement of your access control device will not only affect the throughput of your entrance,...The Future Is Here: Artificial Intelligence To Become Standard For Smart Citieshttp://us.sourcesecurity.com/news/articles/artificial-intelligence-video-analytics-safe-cities-deep-learning-co-2214-ga.24014.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/artificial-intelligence-video-analytics-safe-cities-deep-learning-co-2214-ga.24014.htmlExpert CommentaryWed, 15 Nov 2017 08:00:00 GMT<p><strong>A tipping point is defined as: &ldquo;The point at which a series of changes becomes significant enough to cause a larger, more important change&rdquo;. In the same way that IP video changed surveillance a decade ago, our industry is now feeling the impact of recent developments in Artificial Intelligence, Machine Learning, Deep Learning, Big Data, and Intelligent Video Analysis. </strong></p> <h2>Keyword Definitions</h2> <p>Let&rsquo;s start with a few more definitions. Artificial Intelligence (AI) deals with the simulation of intelligent <span class="translate_hls">behavior</span> in computers. Machine Learning (ML) deals with developing computer algorithms that access data and use it to learn for themselves. Neural networks are computer systems that loosely mimic human brain operation.</p> <p>Deep Learning is a subset of ML based on neural networks that has been proven to provide breakthrough capabilities in many problems that were previously unsolvable, and Big...How Live Streaming Video Adds Security, Safety And Business Intelligence For End Usershttp://us.sourcesecurity.com/news/articles/security-safety-business-intelligence-live-streaming-video-ip-surveillance-co-15181-ga.24011.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/security-safety-business-intelligence-live-streaming-video-ip-surveillance-co-15181-ga.24011.htmlExpert CommentaryWed, 15 Nov 2017 08:00:00 GMT<p><strong>End users can add security, safety and business intelligence &ndash; while achieving a higher return on investment at their protected facilities &ndash; with live streaming video. It can be deployed effectively for IP video, network video recorders (NVRs) and body-worn cameras.</strong></p> <p>The growing use of streaming video is resulting in vast technological developments and high-end software that promotes reduced bandwidth, high scalability and lower total cost of ownership (TCO). Here&rsquo;s how users can add value to security with live streaming video and what they should look for in the procurement of technology solutions. Questions are answered by Bryan Meissner, Chief Technology Officer and Co-Founder of EvoStream.</p> <p><span style="color: #71adcd; font-size: 18px; font-weight: bold;">Q: What is live streaming video and how does it apply to physical security?</span></p> <p><span class="blue_bold">BM:</span> In its simplest and most popular form, video...Security Essentials To Protect Your Business From Crimehttp://us.sourcesecurity.com/news/articles/safeguard-business-technology-prevent-crime-cctv-co-3767-ga.23993.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/safeguard-business-technology-prevent-crime-cctv-co-3767-ga.23993.htmlExpert CommentaryWed, 08 Nov 2017 08:00:00 GMT<p><strong>Crime is preventable, and safeguarding your businesses through the use of technology is essential. Whether you want to avoid burglaries or common vandalism, you need to comply with the General Data Protection Regulations to protect your brand&rsquo;s identity. Security should be one of your main focuses and with the help of 2020 Vision, providers of access control systems, we take a look at some of the most efficient items that you need in place to protect your property.</strong></p> <h2>Effectively Deployment Of Video Surveillance</h2> <p>A shocking statistic that you might be unaware of is that for every 100 crimes, an average of 16 are prevented through the use of video surveillance. If a business hasn&rsquo;t already installed a CCTV system, it is already at risk and criminals who want to commit horrendous crimes against that business can instantly spot vulnerabilities. It is also known for crime rates (burglaries and vehicle crimes) to reduce in areas that have...Smart home trends: Combining professional security with the DIY approachhttp://us.sourcesecurity.com/news/articles/smart-home-automation-professional-security-providers-co-6591-ga-co-14183-ga-co-12304-ga-co-10901-ga.23901.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/smart-home-automation-professional-security-providers-co-6591-ga-co-14183-ga-co-12304-ga-co-10901-ga.23901.htmlExpert CommentaryWed, 18 Oct 2017 08:00:00 GMT<p><strong>The smart home market has seen significant growth since 2010. Specifically, less than 0.5% of homes in the American region had connected home devices such as thermostats, lighting, security and entertainment in 2010; by the end of 2017, nearly 12% of households in the region will have connected home devices, an average of six devices per home.</strong></p> <p>The success of smart homes started with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically.</p> <h2>Smart Home Technology Partnerships</h2> <p>A few recent examples include the relationship with Vivint and Best Buy and Vivint with Sprint. In most cases, Best Buy is a competitor to...Advanced Threat Detection: How Video Analytics Is Evolving To Meet The Need For Speedhttp://us.sourcesecurity.com/news/articles/video-surveillance-technology-evolving-digital-age-co-2173-ga.23859.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/video-surveillance-technology-evolving-digital-age-co-2173-ga.23859.htmlExpert CommentaryWed, 11 Oct 2017 08:00:00 GMT<p><strong>In the digital age, speed has never been more critical. Customers expect an instant response to a query. Executives expect sales data on their tablets in front of them in real-time. A site manager at an oil refinery needs an instant alert about a defective valve. An IT manager expects to know about a phishing email before it hits his employees&rsquo; inboxes.</strong></p> <p>The 'need for speed' is impacting the physical security sector too. Customers increasingly expect their security systems to identify and act upon threats before they turn into real incidents. They expect to know right now if the fire or intruder alarm is false, and to take corrective action swiftly.</p> <p>Driven by this heightened customer demand for quicker information to make better decisions faster, innovation in video surveillance technology has accelerated in recent years.</p> <h2>Video Analytics For Fast Threat Detection</h2> <p>Video analytics enables site managers and security teams to...Download: Safeguarding Food Production With Video Surveillancehttp://us.sourcesecurity.com/news/articles/download-safeguarding-food-production-video-surveillance-oncam-co-9294-ga.23999.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/download-safeguarding-food-production-video-surveillance-oncam-co-9294-ga.23999.htmlExpert CommentaryMon, 13 Nov 2017 08:00:00 GMT<p><strong>When we contemplate where and how our food is made, cleanliness and hygiene are typically at the top of the list of necessities. And when it comes to production facilities, strict regulations and sanitation requirements are in place to ensure that the highest levels of food safety are met.&nbsp;</strong></p> <p>This white paper by <strong>Oncam</strong> explores the different aspects of food safety and defense in the production, manufacturing and catering environments. It also offers practical guidance to the types of food certification available making safety equipment compliant and what to look out for.</p> <p><em>Oncam is an independent, specialized IP video and technology company with a reputation for being one of the most innovative firms in today's market. Oncam's sole focus is on 360-degree smart IP video - working with partners to deliver high-value business solutions for customers that leverage Oncam's award-winning technology. Oncam has deep industry knowledge...Why Fleet Managers Are Choosing Automated Key Control Solutionshttp://us.sourcesecurity.com/news/articles/automated-key-control-solutions-manage-fleet-vehicles-co-3579-ga.23961.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/automated-key-control-solutions-manage-fleet-vehicles-co-3579-ga.23961.htmlExpert CommentaryWed, 01 Nov 2017 08:00:00 GMT<p><strong>For fleet managers, the control and management of your fleet begins with control and management of the keys that start the vehicles. For some, this critical task is left to a very basic &ndash; and incredibly low-tech &ndash; solution, such as hooks mounted on a pegboard with a notebook for signing vehicle keys in and out.</strong></p> <p>There are a number of shortcomings with this type of &ldquo;system,&rdquo; most notably that employees tend to ignore it altogether. With this type of honor system approach, there is no way to track keys, control who can use which vehicles or know who has a key at any given time. Further, as fleet manager you have no way to know if your mandated key policies are being followed; you are blind to overuse or misuse of certain vehicles, potential liabilities and many other problems.</p> <h2>Automated Key Management Solutions</h2> <p>The unfortunate reality is that many fleet managers aren&rsquo;t aware of these potential issues until it...Four Ways To Avoid Security Breaches When Migrating To The Cloudhttp://us.sourcesecurity.com/news/articles/four-ways-improve-cloud-security-migration.23931.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/four-ways-improve-cloud-security-migration.23931.htmlExpert CommentaryTue, 24 Oct 2017 08:00:00 GMT<p><strong>Cloud computing has many benefits, including greater flexibility, infrastructure cost savings, and enhanced computing performance. However, the cloud presents new security challenges that organizations need to address. A failure to implement security controls and adhere to solid data governance practices could result in a breach.</strong></p> <h2>Preventing Worst Case Scenarios</h2> <p>Consider this scenario, a company begins their migration by getting excited about the possibilities the cloud can provide to their applications. They task a few of infrastructure engineers to work with the developers to start a proof of concept. The migration team modifies the settings and access controls to ensure the application is works.</p> <p>The migration team, excited with the success of their proof of concept, adds in a few more application features and submits the change ticket for the applications to be moved into production. The migration then grids to a halt. An assessment...Five Emerging Terrorism Trends Security Professionals Must Anticipatehttp://us.sourcesecurity.com/news/articles/factors-driving-modern-terrorist-attacks-co-14307-ga.23756.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/factors-driving-modern-terrorist-attacks-co-14307-ga.23756.htmlExpert CommentarySun, 24 Sep 2017 08:00:00 GMT<p><strong>What drives terrorism? It's a question asked by governments, individuals, militaries and businesses. Terrorist tactics and tradecraft constantly evolve to respond to external forces that enable, constrain and otherwise shape them. </strong></p> <p>Tracking the influential forces that shape terrorism is crucial to understanding how attacks are conducted and placing an attack in context. But most importantly, understanding the drivers of terrorism helps security professionals anticipate terrorism trends so they can train their teams and deploy assets accordingly. With this in mind, I want to briefly discuss the main drivers I track to forecast terrorist dynamics and then discuss five terrorism trends I believe will arise in the next few years because of these factors.</p> <h2>Five Main Drivers Of Terrorism</h2> <p><strong>1. Past Attacks</strong>: The tactics used in past attacks and the security force response to them have long driven terrorist trends. Perhaps this has...Cyber Security Myths And How They Can Are Damaging Your Businesshttp://us.sourcesecurity.com/news/articles/myths-surrounding-cyber-security-digital-age.23828.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/myths-surrounding-cyber-security-digital-age.23828.htmlExpert CommentaryWed, 04 Oct 2017 08:00:00 GMT<p><strong>There has been a significant shift in the methodology used by cyber criminals over the past couple of years, in particular. <span class="translate_hls">While</span>&nbsp;traditional &lsquo;hacking&rsquo; and malware are still prevalent, there has been a boom in other types of attack, in particular Ransomware and Social Engineering. So, why has this happened?</strong></p> <h2>Most Profitable Types Of Cyber Attack</h2> <p>There is an old saying, &ldquo;follow the money&rdquo;, and nowhere is this more pertinent when considering cyber-crimes against UK business. Look at the number of cyber-attacks over the past 12 months from the Beaming Breaches Report in May 2017 - the usual cyber-attacks still feature highly:</p> <ol> <li><strong>Phishing</strong> - 1.3m businesses affected</li> <li><strong>Viruses</strong> - 1.28m businesses affected</li> <li><strong>Hacking</strong> - 1m businesses affected</li> </ol> <p>However, to understand why these emerging threats are...Drone Terror: How To Protect Facilities And Peoplehttp://us.sourcesecurity.com/news/articles/drone-proliferation-demands-regulations-security-solutions-co-9526-ga.23223.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/drone-proliferation-demands-regulations-security-solutions-co-9526-ga.23223.htmlExpert CommentaryWed, 14 Jun 2017 08:00:00 GMT<p><strong>The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. </strong></p> <p><span class="blue_bold">Drone Security Risks</span></p> <p>Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible.</p> <p>Security professionals and technologists are working furiously to address the gaps in drone defense. Currently, the most...Facilities Are Running Out Of Time To Comply With “All Hazards” Emergency Planninghttp://us.sourcesecurity.com/news/articles/healthcare-providers-rules-hazards-planning-cms-3178-co-12612-ga.22440.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/healthcare-providers-rules-hazards-planning-cms-3178-co-12612-ga.22440.htmlExpert CommentaryThu, 16 Feb 2017 08:00:00 GMT<p><strong>The early October wildfires in Northern California and recent spate of hurricanes in the Southeast and Puerto Rico reinforce the fact that the healthcare community is in need of more stringent attention to organized and community-supported Emergency Management.</strong></p> <h2>Regulating Healthcare Facilities</h2> <p>With the potential for catastrophes in the future, the Centers for Medicare and Medicaid Services (CMS) has been working on "All-Hazards" Emergency Preparedness for several years and published CMS-3178 - The Final Rule for Healthcare Emergency Preparedness on September 16, 2016.&nbsp;</p> <p><strong>The purpose of this new regulation is to:</strong><br /><strong>(1) Establish consistent emergency preparedness requirements across provider and supplier networks,</strong><br /><strong>(2) Establish a more coordinated response to natural and man-made disasters, and</strong><br /><strong>(3) Increase patient safety during emergencies.</strong></p> <p>This is...How IT will help you exceed your video surveillance goalshttp://us.sourcesecurity.com/news/articles/information-technology-changing-security-market-co-2803-ga.23767.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/information-technology-changing-security-market-co-2803-ga.23767.htmlExpert CommentaryMon, 25 Sep 2017 08:00:00 GMT<p><strong>If I asked you today how your video surveillance environment has changed over the past few years, how would you respond? I bet the answer could include the following options:</strong></p> <ul> <li>An increase in the number of cameras</li> <li>The addition of more advanced technologies such as high-definition video, video analytics, 360-degree video devices, cloud-based services and more IT innovations.</li> <li>Demand for more video data to drive business, IT and security initiatives.</li> </ul> <h2>Modern Video Surveillance</h2> <p>The modernization of today&rsquo;s video surveillance technology has changed the way video is being used and enhances the value it brings to an organization. Now, stakeholders look for ways to glean new business or operational values from security technologies. Such uses include marketing, customer service, operational monitoring and employee training &mdash; all of which help show better return on investment. <br /> <br /> One thing is...Going Digital: New Technologies For Emergency Managementhttp://us.sourcesecurity.com/news/articles/digital-emergency-management-21st-century-co-15083-ga.23712.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/digital-emergency-management-21st-century-co-15083-ga.23712.htmlExpert CommentaryThu, 14 Sep 2017 08:00:00 GMT<p><strong>In recent years, organizations have transformed the way we prepare, respond to and manage emergency situations globally. Through the rapid uptake of new technologies, organizations can accurately account for their individuals in the event of an emergency and maintain the safety of their employees and visitors.</strong></p> <p>In the event of an emergency in an organization, an efficient and rapid evacuation is of the utmost importance, as hundreds or thousands of people need to be evacuated as quickly as possible. The objective of the building evacuation is an efficient relocation of people from a hazardous building under imminent danger to safe areas through safe and rapid evacuation routes.</p> <h2>Smart Building Technology</h2> <p>While we cannot prevent some situations, organizations can take steps to mitigate risks against their personnel to ensure that their workplace safety comes from a properly designed emergency evacuation plan. To minimize...Checklist To Protect Empty Schools From Arson, Theft And Vandalismhttp://us.sourcesecurity.com/news/articles/important-checklist-protect-empty-schools-security-co-3767-ga.23692.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/important-checklist-protect-empty-schools-security-co-3767-ga.23692.htmlExpert CommentaryTue, 12 Sep 2017 08:00:00 GMT<p><strong>After a lot of studying and getting ready for what seems like an endless stream of exams, teachers and students alike will enjoy having some much-needed time off &mdash; whether it&rsquo;s just for a weekend, a break during the school year or the long summer holidays.</strong></p> <p>Schools that are left empty for a sustained amount of time obviously increases the risk of arson attacks, thefts and vandalism. Staff members at an establishment should therefore work through this checklist before they leave the classroom on the last day of term &mdash; as well as throughout the new school year heading into weekends:</p> <h2>Checks Around The School&rsquo;s Perimeter</h2> <p>Before looking at the school itself, there are a few aspects that should be checked around the perimeter of the education establishment. Report any large or overgrown trees or shrubbery both inside the school grounds and around the perimeter. These can make access to the grounds easier, as well as lead...Six Advantages Of An Effective PSIM Solutionhttp://us.sourcesecurity.com/news/articles/essential-features-good-psim-solution-co-6026-ga.23668.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/essential-features-good-psim-solution-co-6026-ga.23668.htmlExpert CommentaryWed, 06 Sep 2017 08:00:00 GMT<p><strong>PSIMs have had a bad rap in the pro security industry for a multitude of reasons; ranging from suppliers overpromising on integration and control capabilities to complexity of implementation and use. However, there is a silver lining to this story. </strong></p> <p>Today, advanced PSIM solutions are being successfully deployed in commercial applications with the ability to integrate previously disparate professional access, video, notification, building operations and more onto a unified control and management platform. Equally important, these new PSIM solutions are easy to operate, allowing faster and more efficient implementation and use.</p> <p>To help organizations sort through the many available PSIM options, here are six key attributes to look for in a best-in-breed solution.</p> <h2>Simplifying workflow</h2> <p>Fast and effective response is vital when an incident occurs, and standard operating procedures are critical to achieving this goal. However, even the...Video Surveillance Storage Solutions: The Good, The Bad And The Uglyhttp://us.sourcesecurity.com/news/articles/choosing-video-surveillance-storage-solutions-integrators-co-4687-ga.23667.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/choosing-video-surveillance-storage-solutions-integrators-co-4687-ga.23667.htmlExpert CommentaryWed, 06 Sep 2017 08:00:00 GMT<p><strong>When a news story of global interest begins to break, reporters across the world will scramble to find CCTV footage of the event, however isolated the incident may seem. Given the average of one camera installed for every twenty-nine people on the planet, it is perhaps unsurprising how often a persistent journalist, investigator or member of the public will actually be able to uncover footage.</strong></p> <p>In fact, this number is estimated to be as high as one camera for every eleven people in mature markets such as the US and the UK. Such a high number of CCTV systems in use at any one time generates a huge amount of raw data. <a href="https://technology.ihs.com/571026/big-big-big-data-higher-and-higher-resolution-video-surveillance" class="orangebold">According to a report by IHS, Inc</a>., 566 petabytes of data were produced in just one day by all new video surveillance cameras installed worldwide in 2015.</p> <h2>Growing Demand For Modern Surveillance...Four Ways The Cloud Improves Your Cyber Security Posturehttp://us.sourcesecurity.com/news/articles/ways-cloud-improves-cyber-security-posture-co-2566-ga.23370.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://us.sourcesecurity.com/news/articles/ways-cloud-improves-cyber-security-posture-co-2566-ga.23370.htmlExpert CommentaryWed, 12 Jul 2017 08:00:00 GMT<p><strong>Adoption of the cloud is not slowing down. In fact, what&rsquo;s happening is quite the opposite. <a href="http://www.salesforce.com/assets/pdf/misc/IDC-salesforce-economy-study-2016.pdf">According to IDC</a>, worldwide spending on cloud computing is expected to reach $162 billion USD in 2020, growing at a compound annual rate of 19%. This isn&rsquo;t surprising when you consider that more organizations are looking outside their own environment for solutions that will help them become more agile, maximize resources and save money. Yet, while this study and countless others show that more companies are embracing the cloud and its benefits, many are still hesitant to make the move. One of the biggest reasons why is security. </strong></p> <p>Particularly in the physical security industry, there is a common misconception that on-premises systems on closed networks are more secure. Many still believe that connecting to a cloud-based application becomes a source of...