Trends

Keep up with the latest trends. Have a look at the blogs below.

  • Top 5 trends for 2018

    Top 5 trends for 2018

    Global security evolves every year. Here's a look at what we think will be big in 2018.

    Continue reading...
  • 5 reasons retailers are moving to cloud-based surveillance

    5 reasons retailers are moving to cloud-based surveillance

    Have you ever seen a retail store without some form of video surveillance? Likely not. For most brick-and-mortar retailers, video surveillance systems are a must-have to protect staff, customers,...

    Continue reading...
  • A cloud-first approach to city security

    A cloud-first approach to city security

    Securing a city doesn't come without challenges. Find out how moving to the cloud can help.

    Continue reading...
  • How retailers can do more with their security data

    How retailers can do more with their security data

    How can you tap into information to increase profit and improve operations?

    Continue reading...
  • How to strengthen your cybersecurity posture with cloud services

    How to strengthen your cybersecurity posture with cloud services

    Cybersecurity is on all of our minds. Every other day, it seems like there’s news of another attack. As more organizations struggle to keep up with the onslaught of new threats, many are asking:...

    Continue reading...
  • Access control beyond the door

    Access control beyond the door

    Happy and rested employees create a great office culture. And doesn’t every organization want that? It’s why many companies (like ours) are turning to their access control system to make life...

    Continue reading...
  • Read about the latest technology trends

    Click here
  • ×

    Receive our weekly blog posts directly in your inbox!

    Company
    Country
    I accept to receive product news and other updates from Genetec via email.
    I understand and agree to the privacy policy.
    First Name
    Last Name
    Industry
    Thank you!
    Error - something went wrong!
  • Using access control to ensure compliance in healthcare

    Using access control to ensure compliance in healthcare

    Have you ever used the sticky end of a Post-It® to clean crumbs from your keyboard? Or clipped a trouser hanger to a cookbook and suspended it from a pantry knob for easy reading? Finding other...

    Continue reading...
  • The role of the IoT in security

    The role of the IoT in security

    The Internet of Things (IoT) seems to be on everyone’s mind these days. You have probably noticed that hardly a week goes by before there’s another story about it in the news. Unfortunately, a...

    Continue reading...
  • Where do drones fit in with security?

    Where do drones fit in with security?

    It is estimated that a million drones enter the world’s airspace each month. In addition to serving a variety of military applications, these unmanned aerial vehicles (UAVs) are also used to...

    Continue reading...
  • Finding people of interest with license plate recognition

    Finding people of interest with license plate recognition

    In a previous blog on automatic license plate recognition (ALPR), we explored how license plates can now be added as access control credentials to secure parking lots. Cities can benefit in...

    Continue reading...
  • New ways of using ALPR

    New ways of using ALPR

    Continue reading...
  • Trends and topics in 2017

    Trends and topics in 2017

    Continue reading...
  • How the cloud helps you centralize multi-site monitoring

    How the cloud helps you centralize multi-site monitoring

    Managing the security of multiple independent sites is usually an expensive proposition. Organizations will invest in a security system for each site, and then use operational capital to fund...

    Continue reading...
  • Are your cameras secured?

    Are your cameras secured?

    Continue reading...
  • What we know about the Security of our Security

    What we know about the Security of our Security

    As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size.

    Continue reading...
  • A closer look at authorization

    A closer look at authorization

    When Apple and the FBI squared off this year over the unlocking of a smart phone, ordinary citizens became aware of an issue that those of us in the security industry have been dealing with for a...

    Continue reading...
  • Want to read our most popular blogs?

    Click here
  • How does authentication work?

    How does authentication work?

    Continue reading...
  • The cost of integrating video and access control

    The cost of integrating video and access control

    “How Much Will It Cost?”— It’s the one question that is top of mind for customers looking to integrate video surveillance and access control systems, and often the most difficult to answer. An...

    Continue reading...
  • What is encryption and how important is it?

    What is encryption and how important is it?

    In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of...

    Continue reading...
  • 3 most common questions about unifying access control and VMS

    3 most common questions about unifying access control and VMS

    It’s an all-too-familiar scene; operators jumping from one monitor to another, navigating through different video surveillance and access control applications to investigate an incident, or more...

    Continue reading...
  • loading
    Loading More...