surveillance

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
Published By: Iomega InfoCenter     Published Date: May 17, 2012
So, how do you know which solution is best suited for your business needs and IT requirements? Read this Buyer's Guide for five easy steps to help you determine which Iomega video surveillance solution is right for you.
Tags : 
surveillance, video surveillance, surveillance solutions, external hard drive, portable hard drive, network storage, multimedia, iomega, network storage, data storage, smb, storage, enterprise, infrastructure, digital, cameras
    
Iomega InfoCenter
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : 
video surveillance, access control, business intelligence
    
Tyco Integrated Security
Published By: Nokia     Published Date: Mar 03, 2016
This white paper reveals how extensive deployment of video surveillance places heavy demands on network resources. The mission-critical network must therefore be able to support the high-bandwidth required by video traffic efficiently, with multiple stringent QoS levels.
Tags : 
ip cctv, nokia, ip video cameras, video, video management, video management system, ip video traffic, ip cctv system architecture, network, cctv, mission-critical network, video streams, mobile video stream
    
Nokia
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: Cambium Networks     Published Date: Oct 03, 2016
Download this white paper to learn more about how HCSO improved their capacity and speed for video surveillance with Cambium Networks.
Tags : 
video surveillance, public safety, crime watch, monitoring streets
    
Cambium Networks
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: SAP     Published Date: Jul 16, 2012
Contrary to popular belief, an IP-based video surveillance system of 40 cameras offers a lower total cost of ownership (TCO) than an analog-based surveillance system, according to a new study from Axis Communications.
Tags : 
technology, white paper, analog, surveillance, tco, total cost of ownership, infrastructure
    
SAP
Published By: D-Link     Published Date: Oct 27, 2017
See how to facilitiate faster information sharing and accelerate innovation with a core network built on integration and customer support
Tags : 
networking, switching, switches, infrastructure, core network, surveillance, security, reliability, integration, power over ethernet, poe, smart switches
    
D-Link
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: Cisco     Published Date: Mar 10, 2011
All-in-one video surveillance solution helps Skye Dental improve office security and deliver superior patient experience.
Tags : 
cisco, business phone system, voip, video surveillance, security, voice and data communication
    
Cisco
Published By: Korenix Technology     Published Date: Aug 03, 2010
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Tags : 
igmp, igmp snooping, igmp query, ip surveillance, video surveillance, video multicast, video multicasting, video transmission
    
Korenix Technology
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
See how a video system can benefit your business by both preventing security risks and providing evidence if a safety event does occur.
Tags : 
video surveillance, exposure to liability
    
Tyco Integrated Security
Published By: Cisco     Published Date: Jan 21, 2015
Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.
Tags : 
cisco, surveillance, ip-enabled, devices, data, integration, iot, business, marketing, technology
    
Cisco
Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
Published By: D-Link     Published Date: Oct 27, 2017
Identify the top 10 reasons you should use smart PoE switches to improve your network capabilities and seamlessly integrate your infrastructure - from switches to surveillance and access points
Tags : 
networking, swtiching, switches, infrastructure, core network, surveillance, security, reliability, integration
    
D-Link
Published By: SpectorSoft     Published Date: Aug 20, 2013
Quickly detect and be alerted to insider threats by monitoring employee activity with this free trial from Spector 360.
Tags : 
monitor employee, employee tracking, monitor computer activity, employee monitoring software, data loss protection, track web usage, detect fraud, insider threat, data breach, productivity loss, employee fraud, chat recorder, loss prevention, employee investigation, computer surveillance
    
SpectorSoft
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Workplace violence is a complex issue. Learn initial steps you can take to help protect your business from the serious disruptions that stem from violence in the workplace.
Tags : 
video surveillance, workplace violence
    
Tyco Integrated Security
Published By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance systems are evolving from being used primarily for security purposes to being used for analytics and improved ROI. With that in mind, it's important to consider many factors and how they affect the architecture of your surveillance system. This webinar will provide some of the top trends that may affect the outcome of your storage architecture.
Tags : 
surveillance, seagate, surveillance hdd, surveillance solutions
    
Seagate Technology
Published By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc propose d'améliorer concrètement l'alimentation, le refroidissement, les baies, la sécurité physique, ainsi que la surveillance et l'éclairage. Il s'intéresse aux petites salles serveurs et succursales d'une charge informatique de 10 kW.
Tags : 
    
Schneider Electric
Published By: Venafi     Published Date: Mar 26, 2015
We rely on cryptographic keys and digital certificates for encryption and authentication. But certificates can, and do, expire, creating costly outages. Organizations need visibility, continuous surveillance, policy enforcement, and automation to eliminate outages caused by expired certificates and secure their keys and certificates.
Tags : 
outages, digital certificates, encryption, authentication, surveillance, automation
    
Venafi
Published By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Nexsan by Imation     Published Date: May 11, 2015
Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.
Tags : 
imation, nexsan, physical security, camera, surveillence, storage, online surveillance
    
Nexsan by Imation
Previous   1 2    Next    
Search Offers      
Get your company's offers in the hands of targeted business professionals.