surveillance

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
Published By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : 
new technology, best practices, competitive advantage, smart campus
    
Avaya
Published By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
    
Aria Systems
Published By: Nokia     Published Date: Mar 03, 2016
This white paper reveals how extensive deployment of video surveillance places heavy demands on network resources. The mission-critical network must therefore be able to support the high-bandwidth required by video traffic efficiently, with multiple stringent QoS levels.
Tags : 
ip cctv, nokia, ip video cameras, video, video management, video management system, ip video traffic, ip cctv system architecture
    
Nokia
Published By: Venafi     Published Date: Mar 26, 2015
We rely on cryptographic keys and digital certificates for encryption and authentication. But certificates can, and do, expire, creating costly outages. Organizations need visibility, continuous surveillance, policy enforcement, and automation to eliminate outages caused by expired certificates and secure their keys and certificates.
Tags : 
outages, digital certificates, encryption, authentication, surveillance, automation
    
Venafi
Published By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc propose d'améliorer concrètement l'alimentation, le refroidissement, les baies, la sécurité physique, ainsi que la surveillance et l'éclairage. Il s'intéresse aux petites salles serveurs et succursales d'une charge informatique de 10 kW.
Tags : 
    
Schneider Electric
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Cisco     Published Date: Jan 21, 2015
Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.
Tags : 
cisco, surveillance, ip-enabled, devices, data, integration, iot, business
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
The latest version of the Medianet-enabled Video Surveillance Manager (VSM) now runs on the Cisco Unified Computing System. Scale and reliability are redefined as Intelligent Networked Surveillance has come of age. VSM 7 and MediaNet have completely changed how this is deployed and operated.
Tags : 
cisco, vsm, surveillance, manager, unified, computing, system, scale
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
Jimmy Ray takes to the whiteboard to explain how MediaNet has transformed deployment and operation of video surveillance and made it more accessible.
Tags : 
cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.
Tags : 
cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
Cisco
Published By: Iomega InfoCenter     Published Date: May 17, 2012
So, how do you know which solution is best suited for your business needs and IT requirements? Read this Buyer's Guide for five easy steps to help you determine which Iomega video surveillance solution is right for you.
Tags : 
surveillance, video surveillance, surveillance solutions, external hard drive, portable hard drive, network storage, multimedia, iomega
    
Iomega InfoCenter
Published By: SpectorSoft     Published Date: Aug 20, 2013
Quickly detect and be alerted to insider threats by monitoring employee activity with this free trial from Spector 360.
Tags : 
monitor employee, employee tracking, monitor computer activity, employee monitoring software, data loss protection, track web usage, detect fraud, insider threat
    
SpectorSoft
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
See how a video system can benefit your business by both preventing security risks and providing evidence if a safety event does occur.
Tags : 
video surveillance, exposure to liability
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : 
video surveillance, access control, business intelligence, security
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Workplace violence is a complex issue. Learn initial steps you can take to help protect your business from the serious disruptions that stem from violence in the workplace.
Tags : 
video surveillance, workplace violence
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Maximizing your security resources can be one rewarding way to extend your resources and visibility into your business.
Tags : 
security resources, security technology, video surveillance, security resources, security, knowledge management, human resource technology
    
Tyco Integrated Security
Published By: Cisco     Published Date: Mar 10, 2011
All-in-one video surveillance solution helps Skye Dental improve office security and deliver superior patient experience.
Tags : 
cisco, business phone system, voip, video surveillance, security, voice and data communication
    
Cisco
Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
Published By: Cambium Networks     Published Date: Oct 03, 2016
Download this white paper to learn more about how HCSO improved their capacity and speed for video surveillance with Cambium Networks.
Tags : 
video surveillance, public safety, crime watch, monitoring streets
    
Cambium Networks
Published By: Cambium Networks     Published Date: Oct 03, 2016
What’s the catalyst behind this astonishing growth? There’s little question that one of the prime drivers — perhaps the most important of all — is the meteoric rise of reliable, high quality, cost-efficient wireless broadband video surveillance networks.
Tags : 
video surveillance, security, wireless broadband, safety, video camera
    
Cambium Networks
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance is an incredibly dynamic industry that continues to grow at an exponential rate. According to IHS, the industry experienced 12 percent growth last year, and is projected to expand even more this year. Are you keeping up with the trends that are fueling this momentum? More importantly, are you capitalizing on the trends that can give you a profitable competitive advantage? This article will show you what to watch out for and provide some insight you can implement that will help you and your customers do just that.
Tags : 
video surveillance, ip network cameras, city surveillance, utilities, panoramic network cameras
    
Seagate Technology
Published By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance systems are evolving from being used primarily for security purposes to being used for analytics and improved ROI. With that in mind, it's important to consider many factors and how they affect the architecture of your surveillance system. This webinar will provide some of the top trends that may affect the outcome of your storage architecture.
Tags : 
surveillance, seagate, surveillance hdd, surveillance solutions
    
Seagate Technology
Published By: Seagate Technology     Published Date: Apr 14, 2015
Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.
Tags : 
surveillance, security system, virtual management software, cameras
    
Seagate Technology
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.