• Realizing the benefits of virtual patient observation

    Hospitals regularly assign staff members to visually observe high-risk patients. See how facilities can take advantage of a virtual patient solution that lower staff costs without compromising patient safety.

    Whitepaper • October 15th, 2013

  • Cloud Computing from a CFO's Perspective

    Cloud computing, like the emergence of the Internet, has the potential to radically change the IT and business landscape. While CIOs have become well-versed in the concept, it is still an area that mystifies the business community and the CFO.

    Whitepaper • October 15th, 2013

  • Leveraging video analytics to stop copper theft

    Surveillance plays a key role in the fight against copper theft for most utilities. Learn how video analytics-based systems differ from motion detection by minimizing false alarms and alerting security personnel.

    Whitepaper • October 15th, 2013

  • What Decision Makers Need to Know About IP Surveillance

    The emergence of IP video also means surveillance management is becoming a shared function of facilities, operations and IT. The question is not whether IP offers the best solution, but how to build a solution that best meets the organization's needs.

    Whitepaper • October 15th, 2013

  • A Safe and Integrated City

    How can city leaders and managers stay current with the latest technologies and integrate them into existing city security systems, with limited budgets? Learn more by downloading this informational white paper, A Safe and Integrated City.

    Whitepaper • October 9th, 2013

  • A Systematic Approach to Security Information Convergence

    How to extract meaningful insight from continuous data streams

    Whitepaper • August 29th, 2013

  • How lens selection can make or break your video surveillance installation

    Case studies demonstrate the vital role lenses play in determining a project’s success or failure

    Whitepaper • June 17th, 2013

  • Stopping school threats at the door

    Examining access control technologies that can keep faculty and students safe.

    Whitepaper • May 15th, 2013

  • When Does A Solar Electric System Make Sense for Remote Power?

    Solar electric power is a valuable technology that provides continuous, reliable and cost-effective power when used in proper applications in remote locations with no access to utility power.

    Whitepaper • March 10th, 2013

  • Improving Image Resolution with Wide Angle Lenses

    Despite inflammatory media accounts proclaiming the end of the megapixel race in the security industry, recent conversations with camera OEMs suggest otherwise.

    Whitepaper • December 17th, 2012

  • Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards

    Fraud and theft are constant threats to any organization, and the protections put in place against malicious activities must constantly evolve. To solve this challenge, businesses are deploying multiple levels of security, of which access cards are a...

    Whitepaper • August 16th, 2012

  • The value of quality dealer training programs

    Download 'A Lifetime of Learning' which covers the importance of ongoing training and what to look for in a comprehensive training program to continue business growth.

    Whitepaper • July 10th, 2012

  • The Case for Security Information and Event Management (SIEM) in Proactive Network Defense

    It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis, but this technology also plays a significant role in...

    Whitepaper • June 4th, 2012

  • Life Safety Security & Operational Conflicts

    Our world is full of threats. The buildings and systems we interact with everyday are designed to limit our exposure to the risk of fire, bodily harm and other threats. We take many of these safety measures for granted, but they influence our daily...

    Whitepaper • June 4th, 2012

  • Metrics and Analysis in Security Management

    The use of metrics and analysis (MA) is a sophisticated practice in security management that takes advantage of data to produce usable, objective information and insights that guide decisions. In addition, MA provides chief security officers (CSOs) with...

    Whitepaper • May 1st, 2012