surveillance

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
Published By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
    
Aria Systems
Published By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : 
new technology, best practices, competitive advantage, smart campus
    
Avaya
Published By: Cambium Networks     Published Date: Oct 03, 2016
Download this white paper to learn more about how HCSO improved their capacity and speed for video surveillance with Cambium Networks.
Tags : 
video surveillance, public safety, crime watch, monitoring streets
    
Cambium Networks
Published By: Cambium Networks     Published Date: Oct 03, 2016
What’s the catalyst behind this astonishing growth? There’s little question that one of the prime drivers — perhaps the most important of all — is the meteoric rise of reliable, high quality, cost-efficient wireless broadband video surveillance networks.
Tags : 
video surveillance, security, wireless broadband, safety, video camera
    
Cambium Networks
Published By: Cisco     Published Date: Mar 10, 2011
All-in-one video surveillance solution helps Skye Dental improve office security and deliver superior patient experience.
Tags : 
cisco, business phone system, voip, video surveillance, security, voice and data communication
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.
Tags : 
cisco, surveillance, ip-enabled, devices, data, integration, iot, business, marketing, technology
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
The latest version of the Medianet-enabled Video Surveillance Manager (VSM) now runs on the Cisco Unified Computing System. Scale and reliability are redefined as Intelligent Networked Surveillance has come of age. VSM 7 and MediaNet have completely changed how this is deployed and operated.
Tags : 
cisco, vsm, surveillance, manager, unified, computing, system, scale, video, security, technology
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.
Tags : 
cisco, medianet, media, net, video, intelligence, surveillance, deployment, small business
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.
Tags : 
cisco, medianet, media, net, video, intelligence, surveillance, deployment, cameras, 6000
    
Cisco
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA
Published By: D-Link     Published Date: Oct 27, 2017
See how to facilitiate faster information sharing and accelerate innovation with a core network built on integration and customer support
Tags : 
networking, switching, switches, infrastructure, core network, surveillance, security, reliability, integration, power over ethernet, poe, smart switches
    
D-Link
Published By: D-Link     Published Date: Oct 27, 2017
See how to handle increased traffic and evolving technologies of your organization by optimizing at the core - your network infrastructure
Tags : 
networking, switching, switches, infrastructure, core network, surveillance, security, reliability, integration
    
D-Link
Published By: D-Link     Published Date: Oct 27, 2017
Identify the top 10 reasons you should use smart PoE switches to improve your network capabilities and seamlessly integrate your infrastructure - from switches to surveillance and access points
Tags : 
networking, swtiching, switches, infrastructure, core network, surveillance, security, reliability, integration
    
D-Link
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: FPSN, LLC     Published Date: Jan 03, 2011
Creating awareness to the current state of video surveillance used for the majority of US businesses and what technology allows for the most effective systems for green usage, higher detail quality and overall smart purchases
Tags : 
ip based, megapixel, surveillance, public safety, mobile video, spy cameras, wireless, cctv, network video, outdoor surveillance, crime video, green energy
    
FPSN, LLC
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: Iomega InfoCenter     Published Date: May 17, 2012
So, how do you know which solution is best suited for your business needs and IT requirements? Read this Buyer's Guide for five easy steps to help you determine which Iomega video surveillance solution is right for you.
Tags : 
surveillance, video surveillance, surveillance solutions, external hard drive, portable hard drive, network storage, multimedia, iomega, network storage, data storage, smb, storage, enterprise, infrastructure, digital, cameras
    
Iomega InfoCenter
Published By: Korenix Technology     Published Date: Aug 03, 2010
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Tags : 
igmp, igmp snooping, igmp query, ip surveillance, video surveillance, video multicast, video multicasting, video transmission
    
Korenix Technology
Published By: Nexsan by Imation     Published Date: May 11, 2015
Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.
Tags : 
imation, nexsan, physical security, camera, surveillence, storage, online surveillance
    
Nexsan by Imation
Published By: Nokia     Published Date: Mar 03, 2016
This white paper reveals how extensive deployment of video surveillance places heavy demands on network resources. The mission-critical network must therefore be able to support the high-bandwidth required by video traffic efficiently, with multiple stringent QoS levels.
Tags : 
ip cctv, nokia, ip video cameras, video, video management, video management system, ip video traffic, ip cctv system architecture, network, cctv, mission-critical network, video streams, mobile video stream
    
Nokia
Published By: SAP     Published Date: Jul 16, 2012
Contrary to popular belief, an IP-based video surveillance system of 40 cameras offers a lower total cost of ownership (TCO) than an analog-based surveillance system, according to a new study from Axis Communications.
Tags : 
technology, white paper, analog, surveillance, tco, total cost of ownership, infrastructure
    
SAP
Previous   1 2    Next    
Search Offers      
Get your company's offers in the hands of targeted business professionals.