Blog posts tagged as “Security” (15 results)

What you need to know about migrating to an IP-based access control system

June 17, 2014

Migrating from a traditional Access Control System (ACS) to an IP-based system can seem like a huge undertaking. Without a clear sense of the process, you may find that you have several questions: Can you retain any of the time and money invested in your legacy system? Will your organization be vulnerable during the switchover? Will you be able to expand your system as your organization grows? … Read more

Tags:   Access Control / Security

Extending Perimeter Security Across Vertical Markets

June 12, 2014

The week before last, I discussed the importance of airport perimeter security in response to the Mineta San Jose Airport breach in our blog called “Ramping Up Perimeter Security at Airports”, but there are many other organizations and industries that incorporate perimeter intrusion detection systems (PIDS) as part of a holistic security strategy. … Read more

Tags:   Transportation / Utilities / Security

Trending into 2014

January 22, 2014

Top 10 IP Physical Security Trends for 2014 … Read more

Tags:   Technology / Security / Trends

Hot Off the Press - Stratocast Preview

January 31, 2013     |    Author Erick Ceresato

Back in November, we announced our alliance with Microsoft, through which we are developing a new line of cloud-based security solutions on Windows Azure. Our plans have come one step closer to fruition, as today's news of Genetec's new video surveillance service, Stratocast, hit the wire to shed a bit more light into what we've been working on. The product is currently being deployed and tested in beta sites around the world, and will be publicly demonstrated for the first time in our booth at ISC West 2013 in Las Vegas. … Read more

Tags:   Cloud / Stratocast / Video Surveillance as a Service / VSaaS / Security

Unicast, Multicast, or Both: What’s Right for You?

July 6, 2012     |    Author Francis Lachance

When it comes to video surveillance applications, there are usually two methods in which video is commonly streamed over a network, from the camera to its destination: unicast or multicast transmissions. The reality is that each video transmission method comes with its own pros and cons, and every installation’s functional requirements will dictate which transmission is best. … Read more

Tags:   Security / System Management / Video Surveillance / Bandwith Management / Omnicast