On server or edge? How to choose the right video analytics
Diving into the pros and cons of each.
Continue reading
Diving into the pros and cons of each.
Continue reading
How can businesses and cities effectively use video technology while appeasing operators’ and the public’s concerns?
Continue reading
Multiple teams, many systems, one shared view.
Continue reading
Continue reading
Managing the security of multiple independent sites is usually an expensive proposition. Organizations will invest in a security system for each site, and then use operational capital to fund...
Continue reading
Learn about potential vulnerabilities and how to mitigate your risk.
Continue reading
How do we balance security and privacy? Learn more about authorization.
Continue reading
Check out the latest Genetec blogs to stay up-to-date on industry trends
Read our blogAuthentication should be a key component of your cybersecurity strategy. Learn more.
Continue reading
In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of...
Continue reading
Hacking an IP security system can take any number of forms. Let's have a look at brute force, man-in-the-middle attacks and see how you can mitigate your risks.
Continue reading
With an increase in cyber attacks, having a comprehensive cybersecurity strategy is imperative. How does your organization measure up?
Continue reading
When the story broke in the news a few weeks ago of a teenager in California that had jumped the perimeter fence at Mineta San Jose Airport and climbed into the wheel well of a Hawaii-bound...
Continue reading
Exploring the role that security technology plays in securing large masses of people
Continue reading
When it comes to video surveillance applications, there are usually two methods in which video is commonly streamed over a network, from the camera to its destination: unicast or multicast...
Continue reading