SourceSecurity.com RSS - Expert Commentary SourceSecurity.com RSS - Expert Commentary from SourceSecurity.com http://www.sourcesecurity.com/news/industry-news.html Copyright (C) SourceSecurity.com 2017 Expert Commentary Wed, 18 Oct 2017 08:00:00 GMT Wed, 18 Oct 2017 08:00:00 GMT Smart home trends: Combining professional security with the DIY approachhttp://www.sourcesecurity.com/news/articles/smart-home-automation-professional-security-providers-co-6591-ga-co-14183-ga-co-12304-ga-co-10901-ga.23901.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/smart-home-automation-professional-security-providers-co-6591-ga-co-14183-ga-co-12304-ga-co-10901-ga.23901.htmlExpert CommentaryWed, 18 Oct 2017 08:00:00 GMT<p><strong>The smart home market has seen significant growth since 2010. Specifically, less than 0.5% of homes in the American region had connected home devices such as thermostats, lighting, security and entertainment in 2010; by the end of 2017, nearly 12% of households in the region will have connected home devices, an average of six devices per home.</strong></p> <p>The success of smart homes started with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically.</p> <h2>Smart home technology partnerships</h2> <p>A few recent examples include the relationship with Vivint and Best Buy and Vivint with Sprint. In most cases, Best Buy is a competitor to...Four ways the cloud improves your cyber security posturehttp://www.sourcesecurity.com/news/articles/ways-cloud-improves-cyber-security-posture-co-2566-ga.23370.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/ways-cloud-improves-cyber-security-posture-co-2566-ga.23370.htmlExpert CommentaryWed, 12 Jul 2017 08:00:00 GMT<p><strong>Adoption of the cloud is not slowing down. In fact, what&rsquo;s happening is quite the opposite. <a href="http://www.salesforce.com/assets/pdf/misc/IDC-salesforce-economy-study-2016.pdf">According to IDC</a>, worldwide spending on cloud computing is expected to reach $162 billion USD in 2020, growing at a compound annual rate of 19%. This isn&rsquo;t surprising when you consider that more organisations are looking outside their own environment for solutions that will help them become more agile, maximise resources and save money. Yet, while this study and countless others show that more companies are embracing the cloud and its benefits, many are still hesitant to make the move. One of the biggest reasons why is security. </strong></p> <p>Particularly in the physical security industry, there is a common misconception that on-premises systems on closed networks are more secure. Many still believe that connecting to a cloud-based application becomes a source of...Advanced threat detection: How video analytics is evolving to meet the need for speedhttp://www.sourcesecurity.com/news/articles/video-surveillance-technology-evolving-digital-age-co-2173-ga.23859.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/video-surveillance-technology-evolving-digital-age-co-2173-ga.23859.htmlExpert CommentaryWed, 11 Oct 2017 08:00:00 GMT<p><strong>In the digital age, speed has never been more critical. Customers expect an instant response to a query. Executives expect sales data on their tablets in front of them in real-time. A site manager at an oil refinery needs an instant alert about a defective valve. An IT manager expects to know about a phishing email before it hits his employees&rsquo; inboxes.</strong></p> <p>The 'need for speed' is impacting the physical security sector too. Customers increasingly expect their security systems to identify and act upon threats before they turn into real incidents. They expect to know right now if the fire or intruder alarm is false, and to take corrective action swiftly.</p> <p>Driven by this heightened customer demand for quicker information to make better decisions faster, innovation in video surveillance technology has accelerated in recent years.</p> <h2>Video analytics for fast threat detection</h2> <p>Video analytics enables site managers and security teams to...What challenges does Brexit pose for UK border security?http://www.sourcesecurity.com/news/articles/brexit-uk-border-security-terrorism-crime-co-5520-ga.23831.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/brexit-uk-border-security-terrorism-crime-co-5520-ga.23831.htmlExpert CommentaryWed, 04 Oct 2017 08:00:00 GMT<p><strong>The 2017 decision of the British electorate to leave the EU was a shock to many within and beyond the UK. It is one of the most significant decisions in the UK&rsquo;s history. It reflects a long-running uneasiness with the land mass across the Channel, not only because of geographical separation but also because of cultural disconnection.</strong></p> <p>The UK is one of few European countries not to have been occupied or oppressed since the Norman invasion of 1066, and hence has an independence of spirit which continues to flourish over any practical concerns. It is worth bearing in mind, however, that the UK is leaving (politically) the EU, not Europe.</p> <h2>Effect of Brexit on UK security</h2> <p>The effect of departing the EU on 29 March 2019 &ndash; irrespective of any transitional period &ndash; will be long lasting and profound. In security terms, the UK will have still to contend with international terrorism, transnational crime and the global movement of...Cyber security myths and how they are damaging your businesshttp://www.sourcesecurity.com/news/articles/myths-surrounding-cyber-security-digital-age.23828.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/myths-surrounding-cyber-security-digital-age.23828.htmlExpert CommentaryWed, 04 Oct 2017 08:00:00 GMT<p><strong>There has been a significant shift in the methodology used by cyber criminals over the past couple of years, in particular. Whilst traditional &lsquo;hacking&rsquo; and malware are still prevalent, there has been a boom in other types of attack, in particular Ransomware and Social Engineering. So, why has this happened?</strong></p> <h2>Most profitable types of cyber attack</h2> <p>There is an old saying, &ldquo;follow the money&rdquo;, and nowhere is this more pertinent when considering cyber-crimes against UK business. Look at the number of cyber-attacks over the past 12 months from the Beaming Breaches Report in May 2017 - the usual cyber-attacks still feature highly:</p> <ol> <li><strong>Phishing</strong> - 1.3m businesses affected</li> <li><strong>Viruses</strong> - 1.28m businesses affected</li> <li><strong>Hacking</strong> - 1m businesses affected</li> </ol> <p>However, to understand why these emerging threats are becoming so popular, we need to look at the...Going digital: New technologies for emergency managementhttp://www.sourcesecurity.com/news/articles/digital-emergency-management-21st-century-co-15083-ga.23712.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/digital-emergency-management-21st-century-co-15083-ga.23712.htmlExpert CommentaryThu, 14 Sep 2017 08:00:00 GMT<p><strong>In recent years, organisations have transformed the way we prepare, respond to and manage emergency situations globally. Through the rapid uptake of new technologies, organisations can accurately account for their individuals in the event of an emergency and maintain the safety of their employees and visitors.</strong></p> <p>In the event of an emergency in an organisation, an efficient and rapid evacuation is of the utmost importance, as hundreds or thousands of people need to be evacuated as quickly as possible. The objective of the building evacuation is an efficient relocation of people from a hazardous building under imminent danger to safe areas through safe and rapid evacuation routes.</p> <h2>Smart building technology</h2> <p>While we cannot prevent some situations, organisations can take steps to mitigate risks against their personnel to ensure that their workplace safety comes from a properly designed emergency evacuation plan. To minimise...How to use video analytics and metadata to prevent terrorist attackshttp://www.sourcesecurity.com/news/articles/video-analytics-metadata-prevent-terrorist-attacks-co-6163-ga.23645.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/video-analytics-metadata-prevent-terrorist-attacks-co-6163-ga.23645.htmlExpert CommentaryThu, 31 Aug 2017 08:00:00 GMT<p><strong>Today &lsquo;terrorism&rsquo; has become a word we use and hear every day. The goal of terrorism is a media product - information delivered to nearly every house in the world. So, the weapon of terrorism is information.</strong></p> <p>Therefore, the way we defend and prevent terrorism must also be based on intelligent processing of information - and an early awareness of potential threats and effective preventive action may eliminate most attacks. Video analytics, automated surveillance and AI decision-making are going to change the rules of the struggle between civilians and terrorists by making attempted attacks predictable, senseless and silent. In this article, we will evaluate to what extent technology can investigate and prevent terror crimes considering the latest technology innovations.</p> <h2>Civilian feedback helps terrorists to accomplish mission</h2> <p>In order to achieve their main goal - loud media response - terrorists and those who order the attacks...Are your surveillance monitors prepared for the latest video technology developments?http://www.sourcesecurity.com/news/articles/predictions-future-cctv-monitor-high-resolution-technology-co-14952-ga.23796.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/predictions-future-cctv-monitor-high-resolution-technology-co-14952-ga.23796.htmlExpert CommentaryThu, 28 Sep 2017 08:00:00 GMT<p><strong>Everybody has been hooked on the discussions about Analogue HD or IP systems, but shouldn&rsquo;t we really be thinking about WiFi and 5G connectivity, removing the need for expensive cabling? Are wireless networks secure enough? What is the potential range? Even the basic question about whether or not the network is capable of transferring the huge (and growing) amount of data required for High Res Video, which will soon be quadrupled with the advent of 4K and higher resolutions. </strong></p> <p><span class="blue_bold">The future of video surveillance monitors</span></p> <p>We have seen a massive uptake in 4K monitors in the security industry. While they have been relatively common in the consumer market, they are only now beginning to really take off in the CCTV market, and the advances in Analogue HD and IP technology mean that 4K is no longer the limited application technology it was just a few years ago.</p> <p>Relatively easy and inexpensive access to huge...Five emerging terrorism trends security professionals must anticipatehttp://www.sourcesecurity.com/news/articles/factors-driving-modern-terrorist-attacks-co-14307-ga.23756.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/factors-driving-modern-terrorist-attacks-co-14307-ga.23756.htmlExpert CommentarySun, 24 Sep 2017 08:00:00 GMT<p><strong>What drives terrorism? It's a question asked by governments, individuals, militaries and businesses. Terrorist tactics and tradecraft constantly evolve to respond to external forces that enable, constrain and otherwise shape them. </strong></p> <p>Tracking the influential forces that shape terrorism is crucial to understanding how attacks are conducted and placing an attack in context. But most importantly, understanding the drivers of terrorism helps security professionals anticipate terrorism trends so they can train their teams and deploy assets accordingly. With this in mind, I want to briefly discuss the main drivers I track to forecast terrorist dynamics and then discuss five terrorism trends I believe will arise in the next few years because of these factors.</p> <h2>Five main drivers of terrorism</h2> <p><strong>1. Past Attacks</strong>: The tactics used in past attacks and the security force response to them have long driven terrorist trends. Perhaps this has...Six best practices of sales management in the security industryhttp://www.sourcesecurity.com/news/articles/effectively-manage-sales-team-security-market-co-14253-ga.23725.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/effectively-manage-sales-team-security-market-co-14253-ga.23725.htmlExpert CommentaryMon, 18 Sep 2017 08:00:00 GMT<p><strong>A childhood friend of mine has made a nice career in coaching college football. As with most coaching careers, he&rsquo;s had to make several moves over the years. He was the Linebackers Coach at a national powerhouse FBS school for a few years before getting promoted to Special Teams Coordinator. From there, he moved into a Defensive Coordinator at another FBS school. Not a national powerhouse, but he was the D.C. &ndash; a huge promotion. Although I&rsquo;ve kept up with his progress, and have been proud of his accomplishments, we lost touch with other shortly after high school. Until recently.</strong></p> <p>A few years ago, my friend took a job as the Head Football Coach at a Division II college. It was then that I started hearing from him. First, asking me to like their Facebook page. Then, reaching out to me to donate to his organisation to help them buy new helmets. Yes, new helmets. He&rsquo;s the Head Football Coach, and he&rsquo;s reaching out personally to...Download: Is your access control system as secure as you think?http://www.sourcesecurity.com/news/articles/download-access-control-system-secure-hid-global-co-823-ga.23824.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/download-access-control-system-secure-hid-global-co-823-ga.23824.htmlExpert CommentaryTue, 03 Oct 2017 08:00:00 GMT<p><strong>Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system.</strong></p> <p>In this&nbsp;<strong>HID Global</strong>&nbsp;white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users.&nbsp;</p> <p><strong>Find out more about:</strong></p> <ul class="bullet_blue_circle"> <li>Access control new opportunities</li> <li>Main objections to access control systems</li> <li>Is your system as secure as you think?</li> <li>Ineffective access control policies</li> <li>Why upgrading can benefit enterprises</li> <li>Conclusion</li> </ul> <table style="width: 100%;" cellspacing="8"> <tbody> <tr> <td><a href="https://hubs.ly/H08Nvg70"><img...Critical Network of Things: Why you must rethink your IoT security strategyhttp://www.sourcesecurity.com/news/articles/critical-network-rethink-iot-security-strategy-co-15102-ga.23781.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/critical-network-rethink-iot-security-strategy-co-15102-ga.23781.htmlExpert CommentaryTue, 26 Sep 2017 08:00:00 GMT<p><strong>In a world where hacking and denial of service are everyday threats, many feel that it is about time for the world of the Internet of Things (IoT) to undergo a reality check over its strategy and promotion before disaster strikes, reputations are lost and investors pull up stakes and run for the hills.&nbsp;&nbsp; &nbsp;</strong></p> <h2>What is new about IoT?</h2> <p>Having made, lost and then re-made my fortune in and around the industry over the past 20-plus years, I cannot help but smile over the level of hype &mdash; and, as a certain US President would call it, &ldquo;fake news&rdquo; &mdash; surrounding the current world of IoT.</p> <p>In spite of what the media and investors would like to think, IoT is not new. I can recall building all sorts of systems including AMR (Automatic Meter Reading/ Smart Metering) networks covering whole cities, pharmaceutical storage monitoring, on-line pest/rodent trap systems, trucks and trailer tracking, foodstuff refrigeration...Checklist to protect empty schools from arson, theft and vandalismhttp://www.sourcesecurity.com/news/articles/important-checklist-protect-empty-schools-security-co-3767-ga.23692.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/important-checklist-protect-empty-schools-security-co-3767-ga.23692.htmlExpert CommentaryTue, 12 Sep 2017 08:00:00 GMT<p><strong>After a lot of studying and getting ready for what seems like an endless stream of exams, teachers and students alike will enjoy having some much-needed time off &mdash; whether it&rsquo;s just for a weekend, a break during the school year or the long summer holidays.</strong></p> <p>Schools that are left empty for a sustained amount of time obviously increases the risk of arson attacks, thefts and vandalism. Staff members at an establishment should therefore work through this checklist before they leave the classroom on the last day of term &mdash; as well as throughout the new school year heading into weekends:</p> <h2>Checks around the school&rsquo;s perimeter</h2> <p>Before looking at the school itself, there are a few aspects that should be checked around the perimeter of the education establishment. Report any large or overgrown trees or shrubbery both inside the school grounds and around the perimeter. These can make access to the grounds easier, as well as lead...How IT will help you exceed your video surveillance goalshttp://www.sourcesecurity.com/news/articles/information-technology-changing-security-market-co-2803-ga.23767.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/information-technology-changing-security-market-co-2803-ga.23767.htmlExpert CommentaryMon, 25 Sep 2017 08:00:00 GMT<p><strong>If I asked you today how your video surveillance environment has changed over the past few years, how would you respond? I bet the answer could include the following options:</strong></p> <ul> <li>An increase in the number of cameras</li> <li>The addition of more advanced technologies such as high-definition video, video analytics, 360-degree video devices, cloud-based services and more IT innovations.</li> <li>Demand for more video data to drive business, IT and security initiatives.<br /><br /></li> </ul> <h2>Modern video surveillance</h2> <p>The modernisation of today&rsquo;s video surveillance technology has changed the way video is being used and enhances the value it brings to an organisation. Now, stakeholders look for ways to glean new business or operational values from security technologies. Such uses include marketing, customer service, operational monitoring and employee training &mdash; all of which help show better return on investment. <br /> <br />...Six advantages of an effective PSIM solutionhttp://www.sourcesecurity.com/news/articles/essential-features-good-psim-solution-co-6026-ga.23668.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/essential-features-good-psim-solution-co-6026-ga.23668.htmlExpert CommentaryWed, 06 Sep 2017 08:00:00 GMT<p><strong>PSIMs have had a bad rap in the pro security industry for a multitude of reasons; ranging from suppliers overpromising on integration and control capabilities to complexity of implementation and use. However, there is a silver lining to this story. </strong></p> <p>Today, advanced PSIM solutions are being successfully deployed in commercial applications with the ability to integrate previously disparate professional access, video, notification, building operations and more onto a unified control and management platform. Equally important, these new PSIM solutions are easy to operate, allowing faster and more efficient implementation and use.</p> <p>To help organisations sort through the many available PSIM options, here are six key attributes to look for in a best-in-breed solution.</p> <h2>Simplifying workflow</h2> <p>Fast and effective response is vital when an incident occurs, and standard operating procedures are critical to achieving this goal. However, even the...The future of healthcare security: Violence response and emergency preparednesshttp://www.sourcesecurity.com/news/articles/future-healthcare-security-terror-active-shooters-co-177-ga.23654.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/future-healthcare-security-terror-active-shooters-co-177-ga.23654.htmlExpert CommentaryThu, 31 Aug 2017 08:00:00 GMT<p><strong>There have been many changes in the healthcare environment over the past decade. The Affordable Care Act has been established, severe weather events are on the rise, violence along with active shootings continue to increase, behavioural health patients present treatment challenges and hospitals continue to consolidate to increase purchasing and service capabilities. Over the next decade, healthcare will continue to transform. Emphasis will be on financial reform, violence response, emergency preparedness, the proper care and handling of behavioural health patients and service efficiencies. </strong></p> <h2>Current issues affecting healthcare security</h2> <p>Violence in healthcare continues to pose the greatest risk to hospital staff. Several key healthcare organisations have published information to assist security directors in the reduction of violent incidents.</p> <p>The International Association for Healthcare Security and Safety (IAHSS) publishes security and...How growing data sources are changing the surveillance industryhttp://www.sourcesecurity.com/news/articles/growing-data-sources-changing-surveillance-industry-co-12344-ga-co-7870-ga.23611.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/growing-data-sources-changing-surveillance-industry-co-12344-ga-co-7870-ga.23611.htmlExpert CommentaryWed, 23 Aug 2017 08:00:00 GMT<p><strong>To say the surveillance industry has changed over the last quarter of a century is an understatement. From high-definition cameras and TVs to high flying drones and video analytics &ndash; the surveillance industry has shifted in ways we never expected to see in such a short space of time. What&rsquo;s more, with such advancements in both quality and choice that&rsquo;s now available in the market, it&rsquo;s no wonder that revenue in the video surveillance market is set to double to $75.64 billion by the end of 2022.</strong></p> <p>Overall, some of the biggest opportunities in the surveillance industry will be through adopting new technological practices, particularly around the Internet of Things (IoT), cloud storage and artificial intelligence (AI) such as machine learning. The main question however is exactly how these trends will shape the surveillance industry of the future?</p> <p><span class="blue_bold">Growing data needs in the IoT era</span></p> <p>Recently,...How intelligent IP cameras enhance predictive analyticshttp://www.sourcesecurity.com/news/articles/intelligent-ip-cameras-enhance-predictive-analytics-co-1286-ga.23569.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/intelligent-ip-cameras-enhance-predictive-analytics-co-1286-ga.23569.htmlExpert CommentaryWed, 16 Aug 2017 08:00:00 GMT<p><strong>For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today&rsquo;s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts &ndash; an important component of predictive analysis. </strong></p> <p><span class="blue_bold">What is predictive analysis?</span></p> <p>With this greater number and variety of data points available to security professionals, the trend toward integrated solutions is fuelling growth in the evolving science of predictive analysis. Differing from standard alert triggers, predictive analysis uses information gathered from a wide range of data sources including surveillance, access control, visitor management, incident management...Intelligent fire detection: Releasing the potential of remote monitoringhttp://www.sourcesecurity.com/news/articles/digital-challenges-remote-monitoring-predictive-maintenance-co-11156-ga.23436.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/digital-challenges-remote-monitoring-predictive-maintenance-co-11156-ga.23436.htmlExpert CommentaryThu, 03 Aug 2017 08:00:00 GMT<p><strong>A new study reveals that intelligent fire detection systems have the potential to unlock more than 30 percent cost-savings on routine maintenance checks through real-time, data-driven remote monitoring. Kevin Mears, Product Manager for Kentec Electronics, describes how remote monitoring and predictive maintenance can meet the competitive challenges of the digital age.</strong></p> <p>Leading economists have identified the convergence and synergies delivered by The Internet of Things &ndash; the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data &ndash; as a powerful force to create entirely new business models for system developers and integrators, by releasing the potential of remote interrogation.</p> <p><span class="blue_bold">Remote diagnostics: A cost-efficient approach</span></p> <p>For the fire systems sector the definition of remote diagnostics is instructive: &ldquo;<em>Improving the...Download: Innovative edge storage solutions for the video surveillance industryhttp://www.sourcesecurity.com/news/articles/download-micron-edge-storage-solutions-video-surveillance-industry-co-2948-ga.23670.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/download-micron-edge-storage-solutions-video-surveillance-industry-co-2948-ga.23670.htmlExpert CommentaryThu, 05 Oct 2017 08:00:00 GMT<p><strong>Edge storage technology - the recording of video and storing it at the camera or on a directly attached storage device instead of in a centralised recording facility across the network - is quickly gaining acceptance and is being more broadly adopted into IP video surveillance applications.</strong></p> <p>The use of edge storage in an IP camera enables video surveillance solution developers more flexibility and cost benefits in system design. By leveraging local microSD card-based storage, system integrators can optimise the design for IP network load/capacity availability, recording redundancy and mobile access.</p> <p>This brief from&nbsp;<strong>Micron</strong>&nbsp;will guide video surveillance professionals on selecting the right edge storage solutions for their designs to help deliver the benefits of edge storage.</p> <h2>Find out more about edge storage:</h2> <ul class="bullet_blue_circle"> <li>How does edge storage work?</li> <li>Edge storage...