RSS feed Get our RSS feed

News by Topic

surveillance

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : new technology, best practices, competitive advantage, smart campus
     Avaya
By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
     Aria Systems
By: Nokia     Published Date: Mar 03, 2016
This white paper reveals how extensive deployment of video surveillance places heavy demands on network resources. The mission-critical network must therefore be able to support the high-bandwidth required by video traffic efficiently, with multiple stringent QoS levels.
Tags : ip cctv, nokia, ip video cameras, video, video management, video management system, ip video traffic, ip cctv system architecture
     Nokia
By: Venafi     Published Date: Mar 26, 2015
We rely on cryptographic keys and digital certificates for encryption and authentication. But certificates can, and do, expire, creating costly outages. Organizations need visibility, continuous surveillance, policy enforcement, and automation to eliminate outages caused by expired certificates and secure their keys and certificates.
Tags : outages, digital certificates, encryption, authentication, surveillance, automation
     Venafi
By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc propose d'améliorer concrètement l'alimentation, le refroidissement, les baies, la sécurité physique, ainsi que la surveillance et l'éclairage. Il s'intéresse aux petites salles serveurs et succursales d'une charge informatique de 10 kW.
Tags : 
     Schneider Electric
By: D-Link     Published Date: Oct 27, 2017
See how to facilitiate faster information sharing and accelerate innovation with a core network built on integration and customer support
Tags : networking, switching, switches, infrastructure, core network, surveillance, security, reliability
     D-Link
By: D-Link     Published Date: Oct 27, 2017
See how to handle increased traffic and evolving technologies of your organization by optimizing at the core - your network infrastructure
Tags : networking, switching, switches, infrastructure, core network, surveillance, security, reliability
     D-Link
By: D-Link     Published Date: Oct 27, 2017
Identify the top 10 reasons you should use smart PoE switches to improve your network capabilities and seamlessly integrate your infrastructure - from switches to surveillance and access points
Tags : networking, swtiching, switches, infrastructure, core network, surveillance, security, reliability
     D-Link
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
     Cisco Umbrella EMEA
By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
     Forcepoint
By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : smart mobility, technology solutions, integrated management
     Fujitsu America, Inc.
By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
     Fujitsu America, Inc.
By: Cisco     Published Date: Jan 21, 2015
Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.
Tags : cisco, surveillance, ip-enabled, devices, data, integration, iot, business
     Cisco
By: Cisco     Published Date: Jan 21, 2015
The latest version of the Medianet-enabled Video Surveillance Manager (VSM) now runs on the Cisco Unified Computing System. Scale and reliability are redefined as Intelligent Networked Surveillance has come of age. VSM 7 and MediaNet have completely changed how this is deployed and operated.
Tags : cisco, vsm, surveillance, manager, unified, computing, system, scale
     Cisco
By: Cisco     Published Date: Jan 21, 2015
Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.
Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
     Cisco
By: Cisco     Published Date: Jan 21, 2015
Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.
Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
     Cisco
By: Iomega InfoCenter     Published Date: May 17, 2012
So, how do you know which solution is best suited for your business needs and IT requirements? Read this Buyer's Guide for five easy steps to help you determine which Iomega video surveillance solution is right for you.
Tags : surveillance, video surveillance, surveillance solutions, external hard drive, portable hard drive, network storage, multimedia, iomega
     Iomega InfoCenter
By: SpectorSoft     Published Date: Aug 20, 2013
Quickly detect and be alerted to insider threats by monitoring employee activity with this free trial from Spector 360.
Tags : monitor employee, employee tracking, monitor computer activity, employee monitoring software, data loss protection, track web usage, detect fraud, insider threat
     SpectorSoft
By: Tyco Integrated Security     Published Date: Dec 08, 2014
See how a video system can benefit your business by both preventing security risks and providing evidence if a safety event does occur.
Tags : video surveillance, exposure to liability
     Tyco Integrated Security
By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : video surveillance, access control, business intelligence, security
     Tyco Integrated Security
By: Tyco Integrated Security     Published Date: Dec 08, 2014
Workplace violence is a complex issue. Learn initial steps you can take to help protect your business from the serious disruptions that stem from violence in the workplace.
Tags : video surveillance, workplace violence
     Tyco Integrated Security
By: Tyco Integrated Security     Published Date: May 05, 2015
Maximizing your security resources can be one rewarding way to extend your resources and visibility into your business.
Tags : security resources, security technology, video surveillance, security resources, security
     Tyco Integrated Security
By: Cisco     Published Date: Mar 10, 2011
All-in-one video surveillance solution helps Skye Dental improve office security and deliver superior patient experience.
Tags : cisco, business phone system, voip, video surveillance, security, voice and data communication
     Cisco
By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
     HPE Intel
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics