According to a survey conducted by Boon Edam, while more than 70 percent of respondents report they believe their organizations are vulnerable to security breaches as a result of “tailgating,” only 15 percent report that they are currently tracking these incidents — tailgating occurs when an authorized person holds a door open for another person who enters without successfully passing through access controls.
IP SECURITY MAGAZINE ARTICLES
Integrator Tasked With Challenging Video Surveillance Project
Successfully deploying an ad hoc wireless video network helped forge a long-term relationship with a major marathon.
Best Channel Vendors 2015
How were the Best Channel Vendors survey and special report generated? For a seventh consecutive year, we relied on the wisdom and experience of Penn State University to help ensure the survey’s statistical accuracy. Back in 2009, Penn State agreed with our philosophy of conducting a Web-based survey (as opposed to a phone-solicitation survey) of our subscribers to capture significant data from our most active resellers. The technology categories were determined by the Business Solutions magazine (BSM) editorial staff.
Best Channel Vendors 2015 - ECM Hardware, ECM Software, General Computing, Video Surveillance/Access Control, & VoIP
Video surveillance and access control technologies continue to be great line-card additions for networking VARs looking for additional revenue streams. This year’s winners represent a good starting point for anyone interested in getting involved. Axis Communications and Honeywell are two well-known names in the physical security world, and Cisco’s enterprise networking experience is unquestionable.
IP VIDEO & ACCESS CONTROL EXECUTIVE COMMENTARY
How To Quickly Integrate A New Salesperson Into Your IT Company, Part 1
I was asked by one of our peer group members to provide some advice as it related to the hiring and onboarding of a new salesperson. The potential hire did not have an IT industry background. So my advice to him was twofold, focusing around how to get the non-IT person up to speed and how to quickly integrate the new hire into their company.
How To Quickly Integrate A New Salesperson Into Your IT Company, Part 2
In the first part of this series, I shared some strategies around onboarding a salesperson into a new industry. This article will focus on the second question of how to immerse a new hire in your company culture and expectations.
How IT Solutions Providers Can Strategically Plan A Benefits Package
All IT companies are facing a shortage of qualified workers, and this is especially true for SMB owners. It seems as though the “big boys” have the competitive edge when it comes to compensation packages, perks, and benefits. In addition, the changes brought about via the Affordable Care Act have frustrated many employers, forcing them to reevaluate their benefit packages by dropping some benefits, adding additional benefits, or modifying the plans themselves.
Stuck On Your IT Services Business Strategic Plan? How A Coach Can Help Jump Start Progress
I heard Verne Harnish speak at a conference a few years ago. He said many great things but the most impactful (to me at least) observation he shared was around coaching. He shared how Tiger Woods, who at this point was at the pinnacle of his career, was impacted by a coach.
IT Solutions Providers: Which Lake Are You In?
When I was in college, I spent my summers working at a YMCA camp. I was responsible to keep all the trails, playing fields, and general areas mowed. I also did some general maintenance stuff around the camp as well. Occasionally, I would get to do some work down by the lake. It was here that I would witness hundreds of kids get in a canoe, many of them for the first time.
IP VIDEO & ACCESS CONTROL WHITE PAPERS & CASE STUDIES
Shuttle Customizes Computers For ScholarChip Solution
Knowing where students are at any given time is of vital importance for teachers and school administrators. Keeping track of attendance is an essential part of a school’s budget, including state and federal financial support, and in some cases, even teacher performance.
The Four T’s Of Marketing
There are so many elements to modern day marketing. From direct mailers and blogs to newsletters and emails, the modern day marketeer has a lot of things to consider when developing a marketing strategy. While there’s no magic 8 ball with all of the answers to your marketing questions, there are ways to make the whole process easier.
The Top 10 Myths About Sales
No matter what point that you look back to in history, you can always find a notable deal, trade, or sale that shaped our world to what it is today. Even with its notoriety, sales is an industry that mystifies most of the general public. Is it about relationship building? Closing no matter what? Tricking someone into doing what you want?
PHYSICAL SECURITY EVENTS
ABOUT ACCESS CONTROL & VIDEO SURVEILLANCE
Access control & video surveillance includes physical security technologies such as access control devices, IP video cameras, video management software (VMS), and video storage devices and systems.
Access control usually refers to a device or system that restricts access to a place or other resources based on individual credentials. Individuals allowed to access the place or resource verify their authorization through human monitoring (such as a guard), physical keys, electronic login information, biometric identification, electronic keys, or a combination of methods. In the physical security world, access control is used to restrict access by unauthorized personnel to a property, building, or a room.
IP video cameras (Internet protocol cameras or IP cameras) are a type of digital video camera often used for surveillance. They differ from analog closed circuit television (CCTV) cameras by being able to send and receive data over a computer network or via the Internet. There are two types of IP cameras, centralized and decentralized. Centralized require a central Network Video Recorder (NVR) while decentralized do not. Decentralized IP cameras have built-in recording functionality and store video locally on flash memory, network attached storage (NAS), or hard disk drives.
Video management software (VMS) is a component of a video surveillance solution which consists of cameras, network infrastructure, storage, and the VMS. Unlike analog cameras, IP cameras operate over a standard computer Ethernet network such as LAN, WAN, or the Internet. Because of this a computer on the network must have video management software installed in order to handle recording and other functionality for all the cameras on the network. Some systems load video management software onto the cameras themselves, letting the user access and control cameras with only a smartphone or tablet app.
Video storage can be done in multiple ways, either with direct attached storage or detached storage. Direct attached storage is the most common solution for small to medium-sized installations, where the computer running the video management software stores video directly to its hard drive. Detached storage can consist of either network attached storage (NAS) or a storage area network (SAN). A NAS system is a single devices directly connected to a LAN that provides storage to the entire network. A SAN is a specialized network designed for storage and connected to a server, providing user access through the server and offering high scalability.
PHYSICAL SECURITY HEADLINES
RECENT PHYSICAL SECURITY NEWSLETTERS
FEATURED IP VIDEO & ACCESS CONTROL PRODUCTS
Security Center Unified Security Platform The Security Center blends Genetec’s IP license plate recognition (LPR), video surveillance, and access control systems, AutoVu, Omnicast, and Synergis, within a single innovative solution.
Keyscan CA 200 Access Control Unit Keyscan door control units are built for longevity, durability and reliability. Engineered by Keyscan, all 2, 4, and 8 door control units are designed for fast and efficient performance with standard features like dual on-board processors and heavy duty relays. Keyscan controllers are built for maximum flexibility and limitless expandability. And they're all backed with Keyscan's legendary customer service and technical support.
TimeLOG Data Collection Software TimeLOG is a comprehensive data collection software that streamlines work flow in your organization by handling employees' activities, such as: time & attendance and absence balance.
3VR P-Series SmartRecorder 3VR’s P-Series SmartRecorder™ is the most powerful, versatile, reliable, and supportable hybrid DVR/NVR on the market today. The P-Series provides the enterprise features you expect with the simplicity of a hybrid appliance for ease of installation and network manageability in a system that lets you connect to and leverage your existing security infrastructure.
IP VIDEO & ACCESS CONTROL MULTIMEDIA
Mercury Discusses Recurring Revenue At Channel Transitions West
For Business Solutions magazine readers who couldn’t attend Channel Transitions West on April 29, 2014 in Santa Ana, CA, Jake West, who manages Mercury’s business development team, shares in this video what he discussed with conference attendees, including finding recurring revenue streams for your business.
GFI MAX Discusses Tools For MSPs At Channel Transitions West
Todd Haugland, lead sales engineer for GFI MAX, discussed tools for managed services providers with conference attendees at Channel Transitions West on April 29, 2014 in Santa Ana, CA.
F-Secure Meets SaaS Channel Members At Channel Transitions West
Michael Wong, systems engineer at F-Secure, summarizes what he discussed with conference attendees at Channel Transitions West on April 29, 2014 in Santa Ana, CA.
AIM Meets Bar Code, Mobility Channel Members At Channel Transitions West
For Business Solutions magazine readers who couldn’t attend Channel Transitions West on April 29, 2014 in Santa Ana, CA, Doug Hall, business development director of AIM, the Association for Automatic Identification and Mobility, shares on video what he discussed with attendees at the conference.