Corporate Security


Products

  • IP Video Management Software

    The V5.48 provides additional video performance enhancements, along with code optimizations for improved handling of views for cameras and layouts, and better management for network interfaces. more

  • HALO

    The HALO platform, which includes a fully integrated suite of connected home solutions available through a single app, has added new Central Station operator video alarm verification along with new energy efficiency features like solar power and energy monitoring to its list of capabilities. more

  • Hybrid Cloud Archiving Service

    Security Center will allow organizations to easily scale the available storage capacity of their surveillance system, and eliminate the need to invest in additional servers. With the ability to continue leveraging their existing on-premise storage equipment, this hybrid cloud service will provide a cost-effective solution for customers who need to extend their video retention period or implement off-site recording. more

  • TowerRAID

  • CompleteView 4.4


Webinars


Podcasts

  • Podcast: Cisco Systems

    An interview with Bill Stuntz, vice president and general manager of the physical security business unit at Cisco Systems. more


Whitepapers

  • Understanding CFATS: What It Means to Your Business

    Whitepaper: Understanding CFATS

    In 2006, the U.S. Congress mandated that “High Risk” chemical facilities develop and implement security plans to guard against the possibility of terrorism. Congress authorized the Department of Homeland Security to develop and administer the appropriate regulations. Congress established fines of $25,000 per day and closure of the facility as the penalties for any company found to be out of compliance. In 2008, DHS began the rollout of the regulation with the most significant and complicated portion of the implementation beginning now. more

  • Policy-Based Physical Security Management

    Practically all facility-based physical security systems, devices and services operate in silos, very loosely connected with each other. Obtaining a comprehensive view of physical security operations for all corporate locations worldwide is very challenging. The problem further gets exasperated with localized security processes, ad-hoc event handling, countless alarms and a lack of holistic reporting from multi-vendor proprietary systems. more

  • Building Enterprise Secure File Transfer Processes that Improve Your Security and Compliance

    Virtually all businesses today have work processes that dictate the need to share critical business information with people outside as well as inside the organization. The information may be highly confidential intellectual property, patient health records, sensitive customer data, financial information or the like. This presents a challenge. more


Free e-News Subscription

Security Today newsletter provides essential industry news and product information that can help you stay afloat in the fast-paced world of security.

I agree to this site's Privacy Policy