Make Your Network Edge Intelligent and Meet Tomorrow’s Needs Today

In the new digital business reality, the network edge has never been more important. Often overlooked, the network edge is the cornerstone that determines whether digital success is realized or lost. Today the network is critical in enabling change in virtually all organizations as they take their digital transformation journey. This journey will help organizations innovate faster, reduce cost and complexity, and lower risk. It translates into the ability to increase agility, improve employee productivity, better engage with customers, and protect key intellectual property and assets. The network edge is…

Read More

The Proxim Advantage Video Security via Wireless

Wide operating temperature range Security is not just a concern in temperate climates. The Middle East with day time temperatures reaching 50°C, and other areas such as Russia or Canada going as low as -40 degrees C, the wireless network has to be able to survive these brutal temperature ranges. Tsunami® products are rated for -40 to +60 degrees C operation. For those environments that are more temperate there are version of Tsunami® that support -30 to 55°C temperature ranges. Beyond these core, fundamental requirements for any wireless network carrying…

Read More

Survey Highlights Needs for Intelligent Video Surveillance Solutions

Pelco by Schneider Electric recently surveyed 489 end-users within the surveillance industry about their surveillance needs and where they see the industry headed. The survey analyzed how end-users view their current surveillance systems and the expectations they have for emerging technologies. Key findings The study revealed significant and valuable insights into the current state of the video surveillance market, and how users rate their existing systems and market offerings in terms of meeting their business needs. Here are five of the top findings of the study: One-third of end-users believe…

Read More

Safe Cities: Collaborative Monitoring

Cities across the world are constantly changing and evolving faster than at any point in their history. They have become more congested, and criminal activities have soared leading to the destruction of public assets. Compounding the problems, terrorism has become a major concern that presents communities and neighbourhoods with new security problems. Faced with a wealth of challenges, which are often elusive, cities are expected to manage and control the change to allow their communities to have a standard of living that meets modern day expectations. The terror attacks around…

Read More

The Convergence of Physical & Logical Access

For many security professionals, recent high-profile data breaches have shifted attention to external cyber threats. Despite this newfound focus, the Institute for Critical Infrastructure Technology reports that more than half of all cybersecurity incidents can be traced to insiders with legitimate access to corporate facilities and networks. Another survey from the Ponemon Institute reveals that the majority of respondents are more concerned by outside threats than those that originate internally. While external threats are very real, working to confront internal vulnerabilities can prevent incidents from happening in the first place.…

Read More

Security Considerations for Code Signing

Recent security-related incidents indicate the need for a secure software supply chain to protect software products (also referred to as code) during the development, build, distribution, and maintenance phases. Of particular concern is provisioning and updating software that plays a critical role in platform security. A wide range of software products including firmware, operating systems, mobile applications, and application container images must be distributed and updated in a secure and automatic way to prevent forgery and tampering. An effective and common method of protecting software is to apply a digital…

Read More

A Guide to Connected Lighting for IP Video Surveillance

Connectivity is the heartbeat of smart technology. Connectivity between devices improves the quality of decision making from each device, the level of service that each device can provide, and magnifies the value of the overall system. A truly smart device can make relevant decisions, whether that decision is a recommendation on Netflix or Spotify, automatic windscreen wipers that operate when rain is detected or smart heating that turns on 30 minutes before we arrive home from work. To be smart a device has to be connected to other sensors, whether…

Read More

Building a Future-Proof Data Processing Solution with Intelligent IoT Gateways

To date, most discussions about the Industrial Internet of Things (IoT) have been about connecting new devices and rapidly bringing them online. In this white paper we look at the implications of bringing such a large number of devices online, namely, the need for efficient methods to collect information from these devices, and discuss how to handle the large amount of data collected from these devices. Industrial IoT solutions are judged on their ability to adapt to various data acquisition needs and how they can transform the data collected from…

Read More