Trends

Keep up with the latest trends. Have a look at the blogs below.

  • Top 5 trends for 2018

    Top 5 trends for 2018

    Global security evolves every year. Here's a look at what we think will be big in 2018.

    Continue reading...
  • 5 reasons retailers are moving to cloud-based surveillance

    5 reasons retailers are moving to cloud-based surveillance

    Have you ever seen a retail store without some form of video surveillance? Likely not. For most brick-and-mortar retailers, video surveillance systems are a must-have to protect staff, customers,...

    Continue reading...
  • A cloud-first approach to city security

    A cloud-first approach to city security

    Securing a city doesn't come without challenges. A city typically encompasses so many diverse organizations and businesses which all revolve around the people that live, work and play within its...

    Continue reading...
  • How retailers can do more with their security data

    How retailers can do more with their security data

    In many ways, retailers in e-commerce have it easy. While traditional brick and mortar stores work to gain insight into buying trends, customers’ habits, and growth opportunities, e-commerce often...

    Continue reading...
  • How to strengthen your cybersecurity posture with cloud services

    How to strengthen your cybersecurity posture with cloud services

    Cybersecurity is on all of our minds. Every other day, it seems like there’s news of another attack. As more organizations struggle to keep up with the onslaught of new threats, many are asking:...

    Continue reading...
  • Access control beyond the door

    Access control beyond the door

    Happy and rested employees create a great office culture. And doesn’t every organization want that? It’s why many companies (like ours) are turning to their access control system to make life...

    Continue reading...
  • Read about the latest technology trends

    Click here
  • ×

    Receive our weekly blog posts directly in your inbox!

    First Name
    Last Name
    Company
    Industry
    Subscribe to Genetec
    Thank you!
    Error - something went wrong!
  • Using access control to ensure compliance in healthcare

    Using access control to ensure compliance in healthcare

    Have you ever used the sticky end of a Post-It® to clean crumbs from your keyboard? Or clipped a trouser hanger to a cookbook and suspended it from a pantry knob for easy reading? Finding other...

    Continue reading...
  • The role of the IoT in security

    The role of the IoT in security

    The Internet of Things (IoT) seems to be on everyone’s mind these days. You have probably noticed that hardly a week goes by before there’s another story about it in the news. Unfortunately, a...

    Continue reading...
  • Where do drones fit in with security?

    Where do drones fit in with security?

    It is estimated that a million drones enter the world’s airspace each month. In addition to serving a variety of military applications, these unmanned aerial vehicles (UAVs) are also used to...

    Continue reading...
  • Finding people of interest with license plate recognition

    Finding people of interest with license plate recognition

    In a previous blog on automatic license plate recognition (ALPR), we explored how license plates can now be added as access control credentials to secure parking lots. Cities can benefit in...

    Continue reading...
  • New ways of using ALPR

    New ways of using ALPR

    Continue reading...
  • Trends and topics in 2017

    Trends and topics in 2017

    Continue reading...
  • How the cloud helps you centralize multi-site monitoring

    How the cloud helps you centralize multi-site monitoring

    Managing the security of multiple independent sites is usually an expensive proposition. Organizations will invest in a security system for each site, and then use operational capital to fund...

    Continue reading...
  • Are your cameras secured?

    Are your cameras secured?

    Continue reading...
  • What we know about the Security of our Security

    What we know about the Security of our Security

    As we’ve seen in our blog series on the subject, the security of security systems (access control, video, and so on) is a major concern for organizations of every size.

    Continue reading...
  • 3 most common questions about unifying access control and VMS - Question 3

    3 most common questions about unifying access control and VMS - Question 3

    “Is there a right time to unify my video surveillance and access control systems?” The short answer is no. Ways to merge disparate video and access control have been around for years and will...

    Continue reading...
  • Want to read our most popular blogs?

    Click here
  • A closer look at authorization

    A closer look at authorization

    When Apple and the FBI squared off this year over the unlocking of a smart phone, ordinary citizens became aware of an issue that those of us in the security industry have been dealing with for a...

    Continue reading...
  • How does authentication work?

    How does authentication work?

    Continue reading...
  • 3 most common questions about unifying access control and VMS - Question 1

    3 most common questions about unifying access control and VMS - Question 1

    “How Much Will It Cost?”— It’s the one question that is top of mind for customers looking to integrate video surveillance and access control systems, and often the most difficult to answer. An...

    Continue reading...
  • What is encryption and how important is it?

    What is encryption and how important is it?

    In our first post of this 6-part series about Security-of-Security, we suggested that you think about the importance of the data in your physical security system, specifically about the kind of...

    Continue reading...
  • loading
    Loading More...