Technews Publishing
Surveillance solutions take centre stage
CCTV Handbook 2012, Surveillance
Vendors promise high definition, megapixels, low light, amazing zoom capabilities, onboard storage and analytics, and other fantastic benefits to the buyer. We even have some vendors offering 14 or 20 megapixel systems, 360-degree views and more. But the camera is only one aspect of a surveillance solution, ignore the rest at the buyer’s peril.
Read more...
Low-cost IP options
CCTV Handbook 2012, Infrastructure
IP cameras have the reputation of being much more expensive than analogue, especially when it comes to low-end projects requiring around 20 cameras or less. Recently a number of companies have launched low-cost IP cameras into the market aimed at dealing with this low-end market.
Read more...
All about ROI
CCTV Handbook 2012, Surveillance
Just as you thought you had a handle on the complexities of managing a surveillance installation with the assistance of the latest in management software, they go and decide to incorporate everything else into the same platform.
Read more...
Power to the camera
CCTV Handbook 2012, Surveillance
While many companies and individuals are aware of the need to protect their IT system with UPS and clean power, security installations don’t often take the same care to keep their systems running when Eskom fails yet again.
Read more...
Keeping control, remotely
CCTV Handbook 2012, Surveillance
Remote monitoring allows fewer personnel to monitor a much wider area in less time, keeping them out of reach of South Africa’s notoriously violent criminals. But remote monitoring is not a simple solution as there are many aspects of the service customers must be able to rely on 24x7.
Read more...
Security begins with the basics
April 2012, Infrastructure, Information Security
Whether your infrastructure is designed to support data, security or anything else, IP technology is under attack and you need to ensure it is protected to facilitate streamlined business and security operations.
Read more...
The identity conundrum
April 2012, Access Control & Identity Management
There is currently a dangerous divide between identity management solutions and user authentication. The two issues have rarely been integrated and this has created a situation where advanced identity management solutions are reliant on outmoded user-authentication methods.
Read more...
Data security is not optional
April 2012, Information Security
Anyone who is not worried about the security of their data, be it personal information, contact databases or intellectual property, simply has not been paying attention.
Read more...
Securing your packets
April 2012, News & Events
Welcome to the April issue of Hi-Tech Security Solutions. At the time of writing, nearly 25% of the year is already gone and it feels like we only started a couple of weeks ago. We have a jam-packed issue ...
Read more...