video surveillance access control physical security resource center video surveillance access control physical security resource center

Managed Services, Backup and Disaster Recovery, Video Surveillance, And Networking News
Managed Services, Backup and Disaster Recovery, Video Surveillance, And Networking News

Ingram Micro and Tianjin Tianhai Investment Company announced that they have entered into a definitive merger agreement under which Tianjin Tianhai will acquire Ingram Micro for $38.90 per share in an all-cash transaction with an equity value of approximately $6 billion. Upon close of the merger, Ingram Micro will become a part of HNA Group, a Hainan-based Fortune Global 500 enterprise group focused on aviation, tourism, and logistics. In 2015, HNA Group had revenue of $29 billion and nearly 180,000 employees worldwide.

More Articles

IP SECURITY MAGAZINE ARTICLES

  • 30-Year Anniversary: A Look Back
    30-Year Anniversary: A Look Back

    Business Solutions magazine began as Business Electronics magazine in May 1986. In the 30 years since, the magazine and focus have undergone some significant changes. Originally, the magazine was dedicated to office automation dealers. Looking over those first few issues, you can’t help but smile at some of the topics.

  • “A Magazine For An Industry That’s Arrived”

    The above headline was used 30 years ago for the “From The Editor” in the first issue of Business Electronics magazine. In Robert Mueller’s article, the editor and associate publisher wrote that the office automation industry had experienced many changes, with many more to be expected.

  • Inside A $10 Million IP Video Install

    An IT integrator lands a 20+ casino upgrade involving thousands of IP cameras.

More Articles

IP VIDEO & ACCESS CONTROL EXECUTIVE COMMENTARY

  • Bridging The Gap: Driving New Levels Of Intelligence And Risk Mitigation
    Bridging The Gap: Driving New Levels Of Intelligence And Risk Mitigation

    Today, security and risk are large business issues, reaching high into the C-suite. Executive leadership teams recognize the potential of costly and damaging disruptions if risk is not appropriately controlled. As a result, IT, physical, and cyber security teams must collaborate to best manage and address risk.

  • Is The Analog-To-IP Video Transition Complete?
    Is The Analog-To-IP Video Transition Complete?

    In short, the answer to this question is: no. In fact, the transition from analog to IP cameras isn’t over by a long shot. While the video surveillance market within the security industry as a whole has done an excellent job in marketing new IP solutions to replace old analog cameras, there is still a long way to go until the majority of end users have fully deployed IP cameras across all industry segments.

  • Arlin's Suggested Reading List
    Arlin's Suggested Reading List

    These are the ten books I recommend as the foundation of a strong business library. While the Bible may seem like a strange first choice, I find that spending time in that book of wisdom each morning grounds me in truth and helps focus me on the things that matter. The other nine are important books that provide a broad base from which to build a strong business mindset.

  • 6 Video Surveillance Trends VARs Need To Watch
    6 Video Surveillance Trends VARs Need To Watch

    The security industry is constantly changing, and trends come and go. But for Value-Added Resellers (VARs), the challenge lies in simply keeping up with the latest and greatest offerings from a seemingly endless supply of manufacturers. For the video surveillance market in particular, the sheer amount of growth expected to take place is enough to make VARs take pause and think about what they would truly like to offer end users. According to research firm IHS, the global surveillance market is expected to reach $23.6 billion by 2018, and with this in mind, the world is the VAR market’s proverbial oyster.

  • 10 Access Control Trends That Could Mean Increased Revenue For Integrators
    10 Access Control Trends That Could Mean Increased Revenue For Integrators

    How is the physical security industry changing and how do these changes affect integrators? The following 10 items highlight upcoming technologies and how they will affect not only end users, but their security integrators as well.

More Executive Commentary

IP VIDEO & ACCESS CONTROL WHITE PAPERS & CASE STUDIES

  • The Trends And Benefits Of Smart Cards And Biometric Security Devices
    The Trends And Benefits Of Smart Cards And Biometric Security Devices

    Everyone is concerned with digital data security today, in one way or another. For every digital advancement, there seems to be a counter development to breach its security. The trust and etiquette that once governed the use of the old telephone party lines would serve us well today, but we cannot count on such protocol for today’s data and communication devices. Additional protection is needed.

More IP Security White Papers & Case Studies

PHYSICAL SECURITY EVENTS

ISV IQ Live! West February 24, 2016 Santa Ana, CA
RSA
February 29-March 4
San Francisco
ISC West
April 6-8
Las Vegas
ISV IQ Live! East October 6, 2016 Philadelphia

 

ABOUT ACCESS CONTROL & VIDEO SURVEILLANCE

Access control & video surveillance includes physical security technologies such as access control devices, IP video cameras, video management software (VMS), and video storage devices and systems.

Access control usually refers to a device or system that restricts access to a place or other resources based on individual credentials. Individuals allowed to access the place or resource verify their authorization through human monitoring (such as a guard), physical keys, electronic login information, biometric identification, electronic keys, or a combination of methods. In the physical security world, access control is used to restrict access by unauthorized personnel to a property, building, or a room.

IP video cameras (Internet protocol cameras or IP cameras) are a type of digital video camera often used for surveillance. They differ from analog closed circuit television (CCTV) cameras by being able to send and receive data over a computer network or via the Internet. There are two types of IP cameras, centralized and decentralized. Centralized require a central Network Video Recorder (NVR) while decentralized do not. Decentralized IP cameras have built-in recording functionality and store video locally on flash memory, network attached storage (NAS), or hard disk drives.

Video management software (VMS) is a component of a video surveillance solution which consists of cameras, network infrastructure, storage, and the VMS. Unlike analog cameras, IP cameras operate over a standard computer Ethernet network such as LAN, WAN, or the Internet. Because of this a computer on the network must have video management software installed in order to handle recording and other functionality for all the cameras on the network. Some systems load video management software onto the cameras themselves, letting the user access and control cameras with only a smartphone or tablet app.

Video storage can be done in multiple ways, either with direct attached storage or detached storage. Direct attached storage is the most common solution for small to medium-sized installations, where the computer running the video management software stores video directly to its hard drive. Detached storage can consist of either network attached storage (NAS) or a storage area network (SAN). A NAS system is a single devices directly connected to a LAN that provides storage to the entire network. A SAN is a specialized network designed for storage and connected to a server, providing user access through the server and offering high scalability.

FEATURED IP VIDEO & ACCESS CONTROL PRODUCTS

  • Falcon PRO Access Control Software
    Falcon PRO Access Control Software The Falcon PRO access control software is a powerful tool, enabling complete access control over both your employees and workplace.
  • Keyscan CA 200 Access Control Unit
    Keyscan CA 200 Access Control Unit Keyscan door control units are built for longevity, durability and reliability. Engineered by Keyscan, all 2, 4, and 8 door control units are designed for fast and efficient performance with standard features like dual on-board processors and heavy duty relays. Keyscan controllers are built for maximum flexibility and limitless expandability. And they're all backed with Keyscan's legendary customer service and technical support.
  • PAYmate Terminal
    PAYmate Terminal

    PAYmate — Advanced, user-friendly time and attendance terminal, featuring Ethernet connectivity and power-over-Ethernet.

  • AWID Prox -Linc PW - Proximity Wafer
    AWID Prox -Linc PW - Proximity Wafer AWID Prox -Linc PW - Proximity Wafer, Transform any Credential (Laminated ID Badge, Magnetic Stripe Card, Bar Coded ID Card, Wiegand Swipe Card, Barium Ferrite Card, Drivers License) into an AWID compatible Prox Card instantly!
More Featured Products

IP VIDEO & ACCESS CONTROL MULTIMEDIA

More Multimedia