Security

The De-Centralized Central Station

The De-Centralized Central Station

Mar 29, 2023

This blog discusses the sustainability of central alarm stations hiring remote workers and the pros and cons that come with remote vs. in-person work.

» Read Article

Rethinking Business Security for the New Normal

Rethinking Business Security for the New Normal

Mar 06, 2023

A new security study found that physical security incidents keep growing year over year, and businesses are struggling to keep up and stay secure.

» Read Article

Emerging Technologies for System Integrators in 2023

Emerging Technologies for System Integrators in 2023

Feb 16, 2023

With a new year ramping up, now is a good time to look at the emerging technologies from 2022 that are primed to take 2023 by storm.

» Read Article

A Look to The Future: What Does 2023 Hold for the Security Provider

A Look to The Future: What Does 2023 Hold for the Security Provider

Jan 09, 2023

The past few years shook things up in the world - especially the security industry. Here is a look ahead to possible changes coming in 2023.

» Read Article

Face as the Key: Understanding Facial Authentication

Face as the Key: Understanding Facial Authentication

Nov 28, 2022

This article discusses facial authentication technology, its legal concerns, and its future.

» Read Article

Robots, the Cloud, and Perimeter Hardening – Reflections on GSX 2022

Robots, the Cloud, and Perimeter Hardening – Reflections on GSX 2022

Oct 06, 2022

Will the future of security technology rely on artificial intelligence? These are our biggest takeaways from the 2022 Global Security Exchange (GSX) event.

» Read Article

From Here to There – Insights on Alarm Monitoring Communications

From Here to There – Insights on Alarm Monitoring Communications

Oct 06, 2022

This article discusses the pros and cons of every major alarm monitoring system - and what to expect in the future.

» Read Article

The Retail Market’s Biggest Threat

The Retail Market’s Biggest Threat

Aug 30, 2022

One of the biggest threats facing retailers are cyber security attacks. While not completely avoidable, security solutions are available to help limit the damage.

» Read Article

The Value of the Security Assessment

The Value of the Security Assessment

Jul 25, 2022

These are three types of security risk assessments that you should be discussing with your customers to help them meet their goals and save money.

» Read Article

Creating Pathways to Mobile Credentials

Creating Pathways to Mobile Credentials

Jul 06, 2022

The path to mobile credentials is being paved at a fast pace for everyone in the industry, but what does the technology really look like? Read on to find out.

» Read Article

The Rebirth of Analog Video Surveillance

The Rebirth of Analog Video Surveillance

Jun 01, 2022

We're currently experiencing a resurgence of analog surveillance systems. Here's where analog systems can work better than internet protocol (IP) ones!

» Read Article

Detecting the Weapons of War

Detecting the Weapons of War

May 05, 2022

Gunshot detection systems cannot prevent a gun from firing, but they can buy vital time to alert authorities and save lives. Read about some of the current technology behind gun detection systems in this latest blog.

» Read Article

The Benefits of Cameras for Public Safety

The Benefits of Cameras for Public Safety

Oct 01, 2020

Today there are cameras in many residences, almost every business, in a multitude of cities, and now even on some human bodies. The camera serves as the eye to the world when physical eyes cannot be present. The camera doesn’t sleep. The camera is a reactive piece of technology consisting of a lens, a processor, and an image sensor, and a way to output the captured image. The camera was designed initially to take an input and save that data to a storage device for review and / or to view real-time by a staff of operators who could then direct a response.

» Read Article

The Cloud Has Changed Everything... Even Security

The Cloud Has Changed Everything... Even Security

Sep 09, 2020

What does Microsoft Office365, Dropbox, Apple iCloud, and the future of electronic security systems have in common? Two simple words… “The Cloud”. What is the cloud? The answer to this question has eluded many, because there is no one simple answer. Talk to 10 different cloud providers, and you will get 10 different answers. It is not a puffy white thing in the sky where are dreams are held. The Cloud is a simply someone else’s data center. The cloud is someone else’s problem. It can be configured to hold different forms of digital media and data virtually. The data can be held in silos or combined. Storage and data can be added very quickly and extremely cost effective. 80% of the cloud is held by five companies, with Microsoft Azure and Amazon Web Services (AWS) holding the majority.

» Read Article

Why the Security Integrator is the Right Solution

Why the Security Integrator is the Right Solution

Aug 05, 2020

We live in a world where everyone wants to hit the easy button, and generally, the cheap button. During COVID-19, pictures of home improvement stores being overrun were normal. Online retailers marked record months. Today, the world has moved to ordering everything online and has embraced the Do-It-Yourself (DIY) mentality. Even commercial and industrial companies are doing more in-house work and cutting traditional trades in an effort to control quality and save money.

» Read Article

Best Practices for Security Installers

Best Practices for Security Installers

Jun 30, 2020

Spend any time on Facebook or LinkedIn in a security integrator group and you can find pictures tagged with #cctvfail. While some are funny, and others cause you to scratch your head, the real truth is that someone was paid to install that camera. Their work is a reflection on the installer, which makes these installers look bad. The work also reflects on the integrator’s brand. Poorly installed equipment becomes an eyesore with the Integrator’s name attached. Poorly installed systems also tend to create service nightmares. For recurring revenue, security installation companies should be selling maintenance contracts, but these contracts should be more of an insurance policy. If a poorly installed system results in a large number of service visits, the customer will eventually get fed up and find another installer. Repeated truck rolls also cut any recurring revenue and can lead to a loss of revenue.

» Read Article

Five Home Security System Improvements

Five Home Security System Improvements

May 01, 2019

While JADE Learning offers continuing education classes on the intricacies of alarm systems, there is often opportunity to improve upon these existing systems. These improvements could be by covering some previously missed access points to the home or by adding life safety features to improve not only security...

» Read Article