By Amanda Reed,
SDM Staff Editor
Eagle Eye Networks, a provider of cloud video surveillance, released a best practices guide, “Analog Video to Cloud,” for business owners who are interested in economical ways to upgrade legacy analog video surveillance cameras to a modern, digital cloud system, and how existing cameras can be reused in the process. This report details the advantages of managing analog camera video in the cloud, outlines video-to-cloud upgrade options and provides readers with actionable information to successfully transition analog camera video to the cloud without having to rip and replace the entire system. Visit the Eagle Eye website to download the guide.
Infosec, a cybersecurity education provider, is providing online, role-based cyber education with Infosec IQ and Infosec Skills. Infosec’s SaaS-based cyber education platforms feature training for the entire enterprise — from the accounting department to the security operations center (SOC). Both platforms leverage adult learning best practices like micro-learning and experiential, hands-on training proven to maximize knowledge retention and deepen engagement. Learn more about Infosec’s online security education opportunities on their site.
This whitepaper from Calipsa focuses on intelligent, event-driven video monitoring. The whitepaper explains how to use event-driven monitoring hand-in-hand with the intelligent technology in order to cut through the noise of false alarms; how to get the maximum value out of infrastructure currently in place; and how to transform surveillance infrastructure into a remote guarding tool that can be used to proactively prevent crime and provide actionable video intelligence. Download the whitepaper online.
Zenitel, a supplier of intelligent and interoperable communication solutions, announced the release of its Cybersecurity Hardening Guide. The Zenitel Cybersecurity Hardening Guide follows controls outlined by the Center for Internet Security (CIS) SecureSuite, of which Zenitel has been a member for many years. CIS harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. The Zenitel Cybersecurity Hardening Guide begins with information about the CIS controls, and then follows with steps that a company should take, including assessing risk and security levels, managing credentials and passwords and more. A cybersecurity checklist outlines specific tasks and expectations linked to relevant CIS controls that a company should follow and implement to ensure its networked IP intercom devices are cybersecure. Read the guide online.
AlarmHive has launched Alarm Buzz, a podcast dedicated to the alarm industry to discuss tips, tricks, ideas, stories and more. Every week, a new episode will launch with guests from all areas of the alarm industry — dealers, integrators, central stations, associations and hardware and software suppliers. To listen to the episodes, visit www.alarmhive.com/alarm-buzz.
Features
Columns
Departments