CCTV monitors - Expert commentary

5 advantages of using a malware sandbox as part of your cyber security strategy
5 advantages of using a malware sandbox as part of your cyber security strategy

The number of cyber attacks around the world has been steadily increasing year after year; for example, in 2022, the weekly rate of attacks on corporate networks was 38% higher tha...

How to prepare your security for a rapidly changing world
How to prepare your security for a rapidly changing world

You’re no psychic. You probably don’t have the power of clairvoyance. But guess what? When it comes to your security, none of that matters. You can still create futur...

OPINION: School safety – it’s time to accelerate the adoption of security tech
OPINION: School safety – it’s time to accelerate the adoption of security tech

We must leverage existing technologies like social media monitoring, gunshot and weapons detection, and real-time watchlist alerting. We owe it to our children. The recent news o...

Latest Vicon Industries news

Vicon becomes security institute corporate partner
Vicon becomes security institute corporate partner

Vicon Industries is proud to announce its new corporate partnership with The Security Institute, the largest professional membership body for security professionals in the UK. As...

IPVideo Corporation announces integration of HALO smart sensor with Vicon VMS
IPVideo Corporation announces integration of HALO smart sensor with Vicon VMS

IPVideo Corporation is excited to announce the integration of its award-winning HALO Smart Sensor with Vicon’s Valerus Enterprise Video Management System (VMS). HALO Smart s...

Is analogue dead, or how is it viable in today’s security systems?
Is analogue dead, or how is it viable in today’s security systems?

Analogue video cameras are still used in a variety of applications, primarily because yesterday’s robust and flexible technology is still functioning today, although it has b...

Related white papers

Connected video technology for safe cities

Monitoring traffic flow: Everywhere, all the time

Ensuring cybersecurity of video