In today’s retail climate, hardly a day goes by without news of another legacy-brand retailer announcing store closings or financial restructuring. In fact, nearly 7,000 store closing announcements occurred in 2017, setting a new record. With the public’s embrace of online shopping, this trend will likely continue and perhaps accelerate.
If you’ve ever been to a large sporting event, convention or rally, you know all too well how slow the Wi-Fi signal can be when many in the crowd attempt to tweet or upload to Instagram at the same time.
Beyond traditional security and surveillance applications, video cameras in manufacturing and assembly environments are tools used to improve personnel management, maintain safety, reduce liability and optimize efficiency. Production and operations managers looking to reduce costs or tighten timelines can deploy cameras in their factory or plant.
Your security site plan can have a lot of moving parts. For critical infrastructure sites (i.e., power plants – nuclear, gas, electrical or solar, petroleum refineries, data centers, etc.), it’s important to know what’s happening inside and outside, regardless if you’re onsite or not. Not knowing what’s going on is, to put it mildly, discomforting. Knowing something has happened without being sure exactly what that might be can be just as frustrating.
Security team professionals are all too familiar with the task of keeping up with developing technology and improved solutions for campus protection. Frequent, rapid changes make it critical for security management not only to stay abreast of these new technologies, but understand the difference between passing trends and multi-layered security solutions that add value and strengthen a Risk and Vulnerability Assessment Plan (RVAP).
In October 2016, the Department of Defense (DoD) issued the DFARS 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting clause. These regulations required prime contractors and their suppliers to provide adequate security on all covered contractor information systems.
What defines infrastructure as being “critical”? Technically, these are systems and assets, either physical or virtual, which are so vital that their incapacity or destruction would have a debilitating impact on security, national economic stability, public health and safety or any combination of those matters.
The marketplace for physical security solutions is hyper-competitive and isn’t going to change anytime soon. Security Integrators charged with finding products like cameras, video management software, NVRs, cabling, racks and cabinets, etc. are under great pressure to boost profits for every job. If you are like most integrators sources for your security product supply chain range from distributors to manufacturers, online and in some cases even big-box retailers.
The “Internet of Things” has evolved from buzzword status to mainstream reality, but not without its challenges. While most still think of millions of IP-enabled devices as an exciting opportunity, 2016 gave us a sobering reminder of the pitfalls of not properly securing our internet-connected refrigerators, DVRs and thermostats.
WESCO’s industry-leading Expert Webinar Series takes you on a deep dive of the latest technologies and most relevant topics in data communications and security. Partnering with tech leaders from a variety of best-in-class manufacturers, WESCO’s BICSI-accredited Expert Webinar Series always provides fresh, innovative information that will help you stay on top of your field. Reminder: Expert webinars recorded prior to 2017 are not BICSI accredited.
Physical security concerns are an integral issue for healthcare facilities. These vital organizations are open to the public and serve vulnerable populations. A physical or cybersecurity attack could be devastating to the facility, its personnel, patients and the community. Conducting a risk assessment can significantly mitigate the vulnerabilities of a healthcare facility to ensure a safe environment for everyone.
Industrial controls systems are facing an enemy that’s only becoming more hazardous – cyberattacks. Last year, one report found that 34 percent of industrial control systems around the globe were breached more than twice in one year. To better protect and secure federal agencies’ networks, new federal guidelines were published that standardize government cybersecurity efforts. The Unified Facility Criteria UFC 4-010-06, released by the Department of Defense (DoD) in September 2016, lists requirements for incorporating cybersecurity into control system design. It is the first complete list of standards and processes for cybersecurity design guidance specifically written for all DoD control systems.
With retail theft on the rise, many retailers install Internet protocol (IP) cameras for security purposes. But the benefits of video surveillance can go far beyond reducing shoplifting. Many retailers don’t realize that IP-based video is data that can be gathered, stored and analyzed just like any other electronic information.
When a surveillance camera is installed, you want to know that the images it captures will be crisp, clear and useful. To get the most from video surveillance, it’s important to understand the basic factors that contribute to good image usability. Learn how light affects exposure settings and contributes to image quality to guarantee that your images always look sharp, never fuzzy.
As medical technology moves toward increasing connectivity, the door has opened to security breaches. Since 2005, over 880 million records have been stolen due to data breaches. With today’s advances in technology, patients and physicians have better access to lifesaving medicine and procedures. But keeping patients and their data safe from cyber criminals is a growing concern.
Security professionals know that there is an almost endless supply of market-available access control solutions. The ensuing headaches that come from selecting the wrong system can be avoided by doing a little homework and asking the right questions. Having all the facts guarantees that you’ll choose a solution ideally suited to your customers' needs.
For years, high-definition (HD) security cameras were considered the gold standard. Cutting-edge technology is changing that. New 4K surveillance camera technology offers major benefits and opportunities to the video security industry. With the biggest advantage of higher resolution, 4K technology is changing the industry. The 4K standard of camera technology has already shown great promise in the broadcast, digital cinema and consumer businesses.
Video surveillance has come a long way from the days when analog CCTV cameras dominated the market. Significant technological advances, such as delivering HD-quality video or higher, improve overall surveillance capabilities and provide other value-added benefits.
Companies rely on different types of surveillance cameras for various reasons, such as reading a license plate or recognizing a face. Megapixel cameras have become a reliable option for businesses that need quality, high-resolution images to help protect their employees and assets. But high resolution isn’t their only attractive feature. Megapixel cameras also offer a greater return on investment (ROI) than other types of cameras.
Have you ever seen multiple security cameras grouped in one spot in a stadium or parking garage? More than one camera may be required to provide full coverage of large areas. But a “camera tree” that mounts a camera off of each branch, or one massive enclosure that houses four full-size brick cameras, is awkward — and ugly.
Universities and colleges face many possible risks. While it may be impossible to plan for every crisis situation, you can put processes in place to be prepared. Creating a robust emergency plan is the first step to ensuring a safe place for students, faculty, and the general public. But once your plan is in place, how do you know if it is actively protecting your campus?
If you’ve stayed at a hotel recently, you likely weren’t given a traditional room key. This is because there is a growing shift toward digital locks, including among commercial businesses. More companies are seeing huge value in converting to electronic door access through standalone, all-encompassing networked, or hybrid systems.
There is much to consider when helping customers design a complete video surveillance system. Getting started will involve selecting the right materials, understanding the installation process, and knowing how to prepare for future growth and change.
In the event of a critical situation, campuses could save lives with the help of a strong emergency plan. To get there, they must think beyond traditional security methods. Those approaches are a solid start, but they might not be enough. Now campuses must evaluate all potential security scenarios to ensure the safety of students and staff.
Locking our doors is one of the first and most effective forms of security, including in the workplace. To protect their employees and assets, companies can choose from either mechanical (keyed) locks or electronic systems. But does one provide better security over the other?