video surveillance access control physical security resource center video surveillance access control physical security resource center

Don't Go Into Services Half-Hearted

When asked about common mistakes break-fix VARs make when they transition to services, the biggest I can think of is going in half-hearted. What I’m referring to is not making the changes to your business that are necessary to do the model well. One area where some VAR-turned-MSPs lag is with the adoption and use of automation tools like a PSA and RMM.

More Articles


  • Best Channel Vendors 2015

    How were the Best Channel Vendors survey and special report generated? For a seventh consecutive year, we relied on the wisdom and experience of Penn State University to help ensure the survey’s statistical accuracy. Back in 2009, Penn State agreed with our philosophy of conducting a Web-based survey (as opposed to a phone-solicitation survey) of our subscribers to capture significant data from our most active resellers. The technology categories were determined by the Business Solutions magazine (BSM) editorial staff.

  • Best Channel Vendors 2015 - ECM Hardware, ECM Software, General Computing, Video Surveillance/Access Control, & VoIP

    Video surveillance and access control technologies continue to be great line-card additions for networking VARs looking for additional revenue streams. This year’s winners represent a good starting point for anyone interested in getting involved. Axis Communications and Honeywell are two well-known names in the physical security world, and Cisco’s enterprise networking experience is unquestionable.

More Articles


  • Top 5 Tech Trends Universities Use To Enhance Student Security
    Top 5 Tech Trends Universities Use To Enhance Student Security

    It is only fitting that institutions of higher learning, where innovation is encouraged, are leading the way in advancements related to confirming student identity and controlling access to campus buildings. While student identification (ID) cards have evolved over the years, some colleges and universities have truly gone high-tech in the ways students can prove who they are.

  • The Role Of Video In Your IT Clients’ Business Intelligence
    The Role Of Video In Your IT Clients’ Business Intelligence

    According to Cisco's recent Visual Networking Index Report, video is now the fastest growing type of data in the world.  The report estimates by 2019, nearly one million minutes of video content will cross the network every second. Of course, video generated by security and surveillance systems is included in these numbers. This represents an enormous amount of unstructured data – or Big Data – that can potentially be mined for business intelligence.  However, generating any kind of actionable information from endless amounts of video content can seem overwhelming, which is why surveillance video is often overlooked when it comes to Big Data and generating business intelligence.

  • The Top 5 Ways Universities Confirm Student Identity Through Access Control
    The Top 5 Ways Universities Confirm Student Identity Through Access Control

    As students return to school, packing lecture halls and moving into dorm rooms in the colleges and universities, officials behind the scenes look for ways to safeguard the students, faculty, and assets. To accomplish this feat, today’s higher education organizations look for a combination of policies and new technology solutions.

  • 2015:  The Year of Mobile
    2015: The Year of Mobile

    As you have probably heard, mid April of this year, Google made big changes to their search engine algorithm, giving priority to websites that are optimized for mobile devices. Over the past few months, many companies (our clients included) have started taking a closer look at their site traffic and refreshing their websites to make them mobile friendly.

  • How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems
    How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

More Executive Commentary


  • Shuttle Customizes Computers For ScholarChip Solution

    Knowing where students are at any given time is of vital importance for teachers and school administrators. Keeping track of attendance is an essential part of a school’s budget, including state and federal financial support, and in some cases, even teacher performance.

  • The Four T’s Of Marketing

    There are so many elements to modern day marketing. From direct mailers and blogs to newsletters and emails, the modern day marketeer has a lot of things to consider when developing a marketing strategy. While there’s no magic 8 ball with all of the answers to your marketing questions, there are ways to make the whole process easier.

More IP Security White Papers & Case Studies


ASIS September 28-October 1 Anaheim, CA
ISC East November 17-19 Javits Center North, NYC
ISV IQ Live! West February 24, 2016 Santa Ana, CA
ISV IQ Live! East October 6, 2016 Philadelphia



Access control & video surveillance includes physical security technologies such as access control devices, IP video cameras, video management software (VMS), and video storage devices and systems.

Access control usually refers to a device or system that restricts access to a place or other resources based on individual credentials. Individuals allowed to access the place or resource verify their authorization through human monitoring (such as a guard), physical keys, electronic login information, biometric identification, electronic keys, or a combination of methods. In the physical security world, access control is used to restrict access by unauthorized personnel to a property, building, or a room.

IP video cameras (Internet protocol cameras or IP cameras) are a type of digital video camera often used for surveillance. They differ from analog closed circuit television (CCTV) cameras by being able to send and receive data over a computer network or via the Internet. There are two types of IP cameras, centralized and decentralized. Centralized require a central Network Video Recorder (NVR) while decentralized do not. Decentralized IP cameras have built-in recording functionality and store video locally on flash memory, network attached storage (NAS), or hard disk drives.

Video management software (VMS) is a component of a video surveillance solution which consists of cameras, network infrastructure, storage, and the VMS. Unlike analog cameras, IP cameras operate over a standard computer Ethernet network such as LAN, WAN, or the Internet. Because of this a computer on the network must have video management software installed in order to handle recording and other functionality for all the cameras on the network. Some systems load video management software onto the cameras themselves, letting the user access and control cameras with only a smartphone or tablet app.

Video storage can be done in multiple ways, either with direct attached storage or detached storage. Direct attached storage is the most common solution for small to medium-sized installations, where the computer running the video management software stores video directly to its hard drive. Detached storage can consist of either network attached storage (NAS) or a storage area network (SAN). A NAS system is a single devices directly connected to a LAN that provides storage to the entire network. A SAN is a specialized network designed for storage and connected to a server, providing user access through the server and offering high scalability.


  • Bosch ReadykeyPRO Unlimited
    Bosch ReadykeyPRO Unlimited ReadykeyPRO Unlimited uses industry-leading technology effectively to create intelligent, innovative facility access control systems. ReadykeyPRO Unlimited simplifies an operator's responsibilities and lowers overall costs by integrating complex access management, alarm monitoring, ID badging and CCTV control through a single user interface.
  • SNT-EP104 4 Channel Stand Alone Basic Function Encoder
    SNT-EP104 4 Channel Stand Alone Basic Function Encoder The SNT-EP104 is a 4 Channel Stand Alone Basic function Encoder. The SNT-EP104 is the ideal choice when leveraging and migrating from an existing analog camera system to an IP-based monitoring system.
    ECOR4D DVR ECOR Series compact size DVRs are equipped with simple Graphical User Interface (GUI) for quick and easy menu configuration. MPEG4 and up to 240 FPS of real time recording & playback. Available in 4 or 8 channel, with or without DVD burner.
  • 3VR Searchable Surveillance For Financial Institutions
    3VR Searchable Surveillance For Financial Institutions 3VR products were designed from the ground up to help security buyers improve ROI, lower TCO, and gain buy-in from investigators and IT managers.
More Featured Products


More Multimedia