Security

Latest

Project

All Security Content

IP Endpoints: 10 Features on Integrators’ Wish List

Whether you work in education, healthcare, retail or another industry, effective mass notification has become a critical requirement.

Facial Recognition

The Pros and Cons of Facial Recognition Technology in AV

Certainly, there are places and reasons why facial recognition can help but do we really need it in sports arenas, donut shops and even shopping malls?

Logic Bombs, Audiovisual Control Systems

Danger! Logic Bombs in Audiovisual Control Systems

So-called Logic Bombs haven’t quite found their way into audiovisual control systems yet, but just wait…The unprepared will suffer.

Axis Communications- Inc.-03

Axis’ 2N LTE Verso Won a 2019 CI BEST Award: Here’s Why

A rundown of reasons why Axis’ 2N LTE Verso earned a CI Best Award for access control.

IP video cameras, IP video surveillance

7 Reasons Why Now’s the Time to Migrate Customers to IP Video Cameras

Decreasing costs, wider options, the ability to leverage advanced analytics and more give IP video cameras an advantage over analog.

Total Tech Summit, AV integration

Mid-Year State of the AV Integration Industry Update: Second Half 8.7% Growth Predicted

Total Tech Summit mid-year state of the AV integration industry update shows 7.5 percent growth in first half of 2019 for typical commercial AV firms.

best AV products, a v products, 2019 BEST Awards, audio visual products

2019 BEST Awards: The 46 Winning AV Products in Every Category

The Commercial Integrator 2019 BEST Awards highlight the most impressive commercial tech & AV products of the year. See the slideshow for the results.

Premium+ PDU

Middle Atlantic Launches Premium+ PDU with RackLink Power Distribution Solution at InfoComm 2019

Middle Atlantic Premium+ PDU with RackLink features individual outlet power monitoring, environmental monitoring and control and security.

networked AV security

The 3-Tiered Approach to Networked AV Security

How should the industry provide a whole culture of networked AV security? It could start with these three steps, says Paul Konikowski.