<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pages on Verkada Microsoite</title><link>https://info.verkada.com/pages/</link><description>Recent content in Pages on Verkada Microsoite</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 11 Nov 2025 09:37:00 +0000</lastBuildDate><atom:link href="https://info.verkada.com/pages/index.xml" rel="self" type="application/rss+xml"/><item><title/><link>https://info.verkada.com/industry-solutions/martyn's-law/</link><pubDate>Tue, 11 Nov 2025 09:37:00 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/martyn's-law/</guid><description>Introduction to Martyn&amp;rsquo;s Law Earlier this year, The Terrorism (Protection of Premises) Act – also known as Martyn’s Law – received Royal Assent. The legislation was born out of the tireless campaigning of Figgen Murray, whose son Martyn Hett was one of the twenty-two victims of the 2017 Manchester Arena bombing. The Act aims to improve the security of public spaces by providing qualifying organisations with guidelines/requirements for protecting their environments from terrorist attacks.</description></item><item><title/><link>https://info.verkada.com/compare/wired-wifi-wireless-security-cameras/</link><pubDate>Fri, 27 Jun 2025 09:37:00 +0000</pubDate><guid>https://info.verkada.com/compare/wired-wifi-wireless-security-cameras/</guid><description>Comparing Wired vs Wireless Cameras When selecting a security camera system, understanding the difference between wired and wireless options is crucial. Security cameras require both power and connectivity to function properly. Wired security cameras typically provide both power and data through a single wired connection, ensuring stable and high-quality performance. On the other hand, wireless cameras generally use a wired connection for power, while data is transmitted through a Wi-Fi, cellular, or other wireless signal.</description></item><item><title/><link>https://info.verkada.com/security-infrastructure/commercial-security-system/</link><pubDate>Thu, 12 Jun 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security-infrastructure/commercial-security-system/</guid><description>Whether protecting a large enterprise or small business, the right security system is crucial for maintaining safety, preventing loss, and ensuring smooth operations. The best security systems are no longer disparate on-premise systems that operate in isolation. Modern cloud physical security systems integrate cloud security cameras, access control, alarms, and more in a fully unified cloud-managed platform.
Verkada&amp;rsquo;s cloud-managed security system makes it ultra simple to monitor, get real-time alerts, make fast data-driven decisions, and easily scale from 1-10,000+ devices.</description></item><item><title/><link>https://info.verkada.com/security-cameras/camera-mounts/</link><pubDate>Wed, 23 Apr 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security-cameras/camera-mounts/</guid><description>Camera Mount Guide Camera Series Compatibility Verkada mounts are designed to work seamlessly with our complete camera lineup:
Dome Series - Indoor/outdoor dome cameras with versatile mounting options Bullet Series - Targeted surveillance with specialized mounting solutions Mini Series - Compact cameras with discrete mounting options Fisheye Series - 360° coverage with specialized mounting brackets PTZ Series - Dynamic positioning with robust mounting support Multisensor Series - Multi-directional coverage with specialized mounts Find Compatible Mounts for Your Camera</description></item><item><title/><link>https://info.verkada.com/surveillance-features/ai-video-analytics/</link><pubDate>Wed, 09 Apr 2025 04:47:00 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/ai-video-analytics/</guid><description>What is AI Video Analytics? AI video analytics leverages advanced machine learning algorithms to turn raw video surveillance footage into actionable intelligence. By enabling intelligent search, real-time monitoring, and automated incident detection, AI video analytics significantly reduces the manual workload associated with traditional video surveillance systems.
Designed to be ultra simple to use, secure, and scalable, Verkada is a leader in cloud AI security cameras. From advanced person analytics, license plate recognition, and cloud remote management, to AI-powered analytics, Verkada offers over 48 security cameras to choose from.</description></item><item><title/><link>https://info.verkada.com/security-cameras/outdoor-surveillance/</link><pubDate>Wed, 19 Mar 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security-cameras/outdoor-surveillance/</guid><description>Outdoor security cameras can be helpful in many areas where indoor cameras don’t have the right weatherproofing, night vision, zoom capability, or vandal resistance.
There are many different types of use cases for outdoor security cameras. Parking lots, light poles, garages, entrances/exits of buildings, and perimeter fence lines are just some of the use cases involving the need for outdoor-rated security cameras. In most use cases, outdoor cameras are found in the form of standard domes, bullet-style, PTZ, multisensor, fisheye, and mini cameras.</description></item><item><title/><link>https://info.verkada.com/alarms/alarm-systems/</link><pubDate>Fri, 28 Feb 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/alarms/alarm-systems/</guid><description>Whether you need to protect your property against burglars, respond to emergencies, or proactively respond to natural hazards, alarm systems are the critical infrastructure behind threat detection and prevention. A good alarm system provides peace of mind and faster emergency response when it matters most. Types of Alarm Systems All alarm systems have one thing in common: they must detect hazards and alert all relevant parties quickly. In emergency situations, time is of the essence, and so the effectiveness of any alarm system is directly proportional to the speed and magnitude of its response.</description></item><item><title/><link>https://info.verkada.com/alarms/wired-vs-wireless-alarm-systems/</link><pubDate>Tue, 18 Feb 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/alarms/wired-vs-wireless-alarm-systems/</guid><description>According to the National Bureau of Standards, premises protected by alarm systems show 6x higher intruder apprehension rates compared to unprotected locations. Moreover, businesses with alarm systems consistently report significantly lower financial losses from security incidents. For enterprise IT and security leaders, choosing between wired and wireless alarm systems is a critical decision that impacts long-term security success. This comprehensive guide breaks down the key differences to help you choose the best alarm for your organization.</description></item><item><title/><link>https://info.verkada.com/security/physical-security/</link><pubDate>Mon, 27 Jan 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security/physical-security/</guid><description>The security industry has developed rapidly in recent decades, with an increase in the importance of cybersecurity, network protection, data privacy, and more. However, one of the oldest and most enduring forms of security remains as relevant today as ever: physical security. Despite advancements in our digital landscape, the need to protect physical assets, facilities, data hardware, and personnel is as essential as ever, especially as IoT and cyber-physical threats blur the line between our digital and physical environments.</description></item><item><title/><link>https://info.verkada.com/security-cameras/video-surveillance/</link><pubDate>Tue, 07 Jan 2025 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security-cameras/video-surveillance/</guid><description>Also known as closed-circuit television (CCTV) or security cameras, video surveillance systems capture live footage, monitor, and record activity to boost safety and security. From legacy CCTV systems to modern, cloud-managed video security systems, learn how various video surveillance systems work, the pros and cons, and how to choose the best surveillance cameras for your use case. You can also see how Verkada&amp;rsquo;s leading cloud video security platform works for ultra simple, modern, AI-powered surveillance works in action.</description></item><item><title/><link>https://info.verkada.com/security-cameras/cctv/</link><pubDate>Tue, 17 Dec 2024 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security-cameras/cctv/</guid><description>What is CCTV? CCTV (Closed-Circuit Television) is a video surveillance system designed to monitor and record activity within a specific area. Unlike public broadcast systems, CCTV transmits video signals through a closed, private network, ensuring that footage is only accessible to authorized users.
Although video surveillance technology has largely advanced beyond these closed-circuit systems, the term “CCTV” is still commonly used in reference to any type of video surveillance system. These systems are widely used in businesses, schools, municipalities, and residential properties to enhance security, deter crime, and provide video evidence for investigations.</description></item><item><title/><link>https://info.verkada.com/visitor-management-systems/healthcare/</link><pubDate>Mon, 02 Dec 2024 12:45:00 +0000</pubDate><guid>https://info.verkada.com/visitor-management-systems/healthcare/</guid><description>What is a Healthcare Visitor Management System? A hospital visitor management system is a software-based technology that helps hospitals and healthcare offices track, manage, and monitor visitors to their facilities. Visitor management software can range from a simple sign-in app to sophisticated, fully integrated security systems that streamline check-in and check-out processes, identify certain individuals, alert appropriate personnel, and even work alongside existing security and access control systems.
Learn how to choose the best visitor management system for your hospital, the top features to look for, and how to find a solution that ensures security, efficiency, and a smooth visitor experience.</description></item><item><title/><link>https://info.verkada.com/visitor-management-systems/office/</link><pubDate>Thu, 28 Nov 2024 00:00:00 +0000</pubDate><guid>https://info.verkada.com/visitor-management-systems/office/</guid><description>What is an Office Visitor Management System? An Office Visitor Management System is a software-driven solution that enables businesses to efficiently check-in, track, monitor, and manage visitors to their office premises. These systems can range from simple digital sign-in kiosks to advanced, fully integrated hardware and software platforms that streamline the check-in and check-out process, enhance security, and improve overall office operations and efficiency.
A comprehensive VMS can identify visitors, alert the relevant personnel, and seamlessly integrate with existing security cameras and access control systems to ensure a smooth and secure office environment.</description></item><item><title/><link>https://info.verkada.com/visitor-management-systems/manufacturing/</link><pubDate>Tue, 26 Nov 2024 00:00:00 +0000</pubDate><guid>https://info.verkada.com/visitor-management-systems/manufacturing/</guid><description>In today’s manufacturing world, security, operational efficiency, and compliance are top priorities. One key solution that addresses these concerns is a Visitor Management System. Also known as Visitor Management Software or VMS for short, visitor management systems help manufacturers streamline their visitor check-in processes, strengthen manufacturing security, and improve overall operational flow—while also ensuring compliance with industry regulations.
What is a Manufacturing Visitor Management System? A Visitor Management System is a software-based solution designed to track, monitor, and manage visitors entering a facility.</description></item><item><title/><link>https://info.verkada.com/security-cameras/optical-zoom-vs-digital-zoom/</link><pubDate>Tue, 20 Aug 2024 22:19:08 +0000</pubDate><guid>https://info.verkada.com/security-cameras/optical-zoom-vs-digital-zoom/</guid><description>Optical Zoom versus Digital Zoom By Joel Kelley, Global Enterprise Solutions Engineer Zooming in is a common feature in camera systems, involving magnifying a specific area within a larger field of view for closer inspection. Cameras typically employ two methods for this: optical zoom and digital zoom. The key difference between optical and digital zoom is primarily the timing of the zoom process, as well as how the magnification is accomplished.</description></item><item><title/><link>https://info.verkada.com/security/soc-reports/</link><pubDate>Tue, 20 Aug 2024 22:19:07 +0000</pubDate><guid>https://info.verkada.com/security/soc-reports/</guid><description>What is a SOC report? By Nima Emrani, Global Enterprise Solutions Engineer Service Organization Control (SOC) reports are independent audits based on the American Institute of Certified Public Accountants (AICPA) that assess an organization’s security posture and best practices for protecting clients’ data. Organizations that obtain a SOC report demonstrate that they’ve undergone a rigorous assessment process by a third party that points out any weaknesses and flaws.
There are three types of SOC reports: SOC 1 (Detailed Report - Usually Requires an NDA): SaaS Organizations that handle, process, store, or transmit financial information, or information that can impact the financial statements of their customers, need a SOC 1 audit.</description></item><item><title/><link>https://info.verkada.com/security-cameras/wide-dynamic-range/</link><pubDate>Tue, 20 Aug 2024 22:19:06 +0000</pubDate><guid>https://info.verkada.com/security-cameras/wide-dynamic-range/</guid><description>How does Wide Dynamic Range (WDR) work? Security cameras need to be able to produce clear images across a variety of lighting conditions, especially outdoors, in order to be effective. Dynamic range refers to the sensitivity of a device to detect a certain value of something, in this case light. The higher the dynamic range, the better a device will be able to perform in a span of conditions. This value is measured in decibels (dB), which expresses the ratio between the smallest and largest values able to be detected.</description></item><item><title/><link>https://info.verkada.com/security-cameras/setup-ip-cameras-with-coax-cables/</link><pubDate>Tue, 20 Aug 2024 22:19:05 +0000</pubDate><guid>https://info.verkada.com/security-cameras/setup-ip-cameras-with-coax-cables/</guid><description>Setup IP Cameras Using Existing Coax Cables For many years, building security cameras utilized coaxial cable, or coax, to connect back to a recording device. These types of cables, known as RG-6, RG-11, or RG-59, saw widespread use in the earlier days of video because they were good at transmitting the analog signal used in those applications.
Today, the world is connected digitally. With that change came a change in the preferred type of cable we use to connect our devices.</description></item><item><title/><link>https://info.verkada.com/security-cameras/focal-length/</link><pubDate>Tue, 20 Aug 2024 22:19:04 +0000</pubDate><guid>https://info.verkada.com/security-cameras/focal-length/</guid><description>Introduction: Camera Basics Before delving into the specifics of what focal length is, it&amp;rsquo;s essential to understand the basic components common to all digital cameras, from smartphones to professional sporting event cameras, security cameras, and even telescopes peering into the cosmos. These components include a lens that gathers light, a shutter that controls light exposure, and a sensor that captures the light which ultimately leads to the image or video data.</description></item><item><title/><link>https://info.verkada.com/security/protecting-security-cameras-from-vandalism/</link><pubDate>Tue, 09 Jan 2024 19:03:05 +0000</pubDate><guid>https://info.verkada.com/security/protecting-security-cameras-from-vandalism/</guid><description>Video surveillance systems offer a critical layer of protection for your property. When designing a surveillance system, a lot of thought goes into optimizing the protection of your property. But you also want to consider how you are protecting the cameras themselves and understand ways to prevent vandalism in your security system.
To protect against security camera vandalism, you should prepare for it on two levels:
System design: while not focused primarily on vandalism, a properly designed video surveillance system is well-protected for just about anything.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/security-camera-mounts/</link><pubDate>Fri, 08 Dec 2023 16:08:02 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/security-camera-mounts/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
When purchasing a security camera, there are many factors to consider, from speeds and feeds to features and functionalities. But one thing often overlooked is the mount that best fits the environment where the camera will be placed. And although, in most cases, a mount is not required, without it you can expect a degraded viewing experience or higher maintenance costs.
Let’s delve deeper into the most common mounts, and where they best fit:</description></item><item><title/><link>https://info.verkada.com/compare/fail-safe-vs-fail-secure/</link><pubDate>Thu, 07 Dec 2023 16:19:42 +0000</pubDate><guid>https://info.verkada.com/compare/fail-safe-vs-fail-secure/</guid><description>By Derek Gunny, Solutions Engineer
Fail safe vs fail secure Fail safe refers to electronic door lock behavior where a door is unlocked upon loss of power, prioritizing safety by ensuring ease of egress. Fail secure refers to door behavior where a door remains locked when power is lost, usually prioritizing security over ease of passage. Guaranteeing desired fail behavior requires proper electronic lock selection as well as careful integration with an access control unit (ACU).</description></item><item><title/><link>https://info.verkada.com/security/what-is-onvif/</link><pubDate>Mon, 04 Dec 2023 19:14:35 +0000</pubDate><guid>https://info.verkada.com/security/what-is-onvif/</guid><description>Open Network Video Interface Forum(ONVIF) ONVIF (Open Network Video Interface Forum) is an organization composed of multiple physical security manufacturers, to produce standards for interoperability between IP-based security cameras and physical security products. It dates back to 2008 and was founded by Axis Communications, Bosch Security Systems, and Sony. They cover not only security camera functionality, but also access control.
Benefits of ONVIF ONVIF standardizes the communication between security devices and the software produced by various manufacturers, so that a customer can mix and match different products.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/asymmetric-and-symmetric-encryption/</link><pubDate>Mon, 27 Nov 2023 17:04:42 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/asymmetric-and-symmetric-encryption/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
Overview For communication of potentially sensitive information, encryption methods are crucial for protecting confidentiality.
Today, most encryption is done on the devices we use each day, made possible because of advances in hardware and software. At its core, encryption is achieved by scrambling data using a cryptographic key, only known by the sender and the receiver. A third party would be aware of the conversation, but not able to interpret it.</description></item><item><title/><link>https://info.verkada.com/security/calculating-poe-budget/</link><pubDate>Mon, 27 Nov 2023 00:49:59 +0000</pubDate><guid>https://info.verkada.com/security/calculating-poe-budget/</guid><description>By Marcus Orciuch, Solutions Engineer
Overview Power over Ethernet (PoE) is an electrical technology used to transmit both power and data over a single ethernet cable. Defined by the Institute of Electrical and Electronics Engineers (IEEE) as 802.3af, 802.3at, and 802.3bt, PoE simplifies the installation and maintenance of IoT devices by requiring a single cable to deliver both power and network capabilities to powered devices.
Additionally, an organization adopting PoE wherever possible can centrally manage DC power to a multitude of devices, as opposed to managing an individual AC power supply for every device.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/the-exposure-triangle/</link><pubDate>Mon, 27 Nov 2023 00:12:29 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/the-exposure-triangle/</guid><description>By Dan Molenhouse, Solutions Engineer
Overview In photography and videography, exposure is the amount of light that reaches the film or digital sensor. The process of creating an image must be precisely controlled to allow the correct amount of light to reach the imaging sensor. Three critical elements control the exposure of an image: ISO, Shutter Speed, and Aperture.
ISO is a standard for measuring sensitivity to light and dictates how much light the sensor needs to get a correctly exposed image.</description></item><item><title/><link>https://info.verkada.com/alarms/avs-01/</link><pubDate>Wed, 15 Nov 2023 20:49:59 +0000</pubDate><guid>https://info.verkada.com/alarms/avs-01/</guid><description>The vast majority of intrusion alarms reported to police in the United States are false. Coupled with unprecedented labor shortages, it’s not surprising that many police departments are being more judicious with their limited resources and have started requiring that an alarm is verified before they will respond.
Earlier this year, The Monitoring Association released TMA AVS-01, an alarm verification scoring standard that provides consistent criteria to help emergency services prioritize incidents.</description></item><item><title/><link>https://info.verkada.com/security/Securing-Camera-Access-Ports/</link><pubDate>Tue, 14 Nov 2023 19:11:44 +0000</pubDate><guid>https://info.verkada.com/security/Securing-Camera-Access-Ports/</guid><description>By Ciaran Gillespie, Solutions Engineer
Each wired network device, such as PCs, Switches, IP Phones, and Cameras will be wired back to a type of network switch commonly known as the ‘Access Switch’. These switches are at the inner edges of the network, acting as the interface between the end devices and the corporate network. Due to the nature of these switch ports being physically accessible to end-users and bad actors, this can pose a threat to your network security.</description></item><item><title/><link>https://info.verkada.com/video-storage/Interframe-vs-Intraframe-Compression/</link><pubDate>Tue, 14 Nov 2023 16:36:29 +0000</pubDate><guid>https://info.verkada.com/video-storage/Interframe-vs-Intraframe-Compression/</guid><description>By Dan Molenhouse, Solutions Engineer
Overview Modern video compression algorithms (video codecs) utilize two primary techniques, intraframe and interframe compression, to achieve file size reduction.
Intraframe compression (also called spatial compression) reduces the size of each individual frame independently by reducing redundant information within the frame, similar to how JPEG compression works for still images. This compression technique reduces file size while maintaining high image quality.
Interframe compression (also called temporal compression) reduces file size across multiple frames by creating a starting point and then only saving the changes in subsequent frames.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/lens-distortion-correction/</link><pubDate>Mon, 13 Nov 2023 19:27:17 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/lens-distortion-correction/</guid><description>By Marcus Orciuch, Solutions Engineer
Lens Distortion Correction (LDC) is a digital image processing technique used for rectifying the distortions introduced by the inherent optical properties of camera lenses. Correcting these distortions is critical for accurate representations of objects and improving the reliability of computer vision applications like facial recognition. LDC profiles are often built specifically for a lens based on known distortion characteristics and patterns, and then applied after the image is captured.</description></item><item><title/><link>https://info.verkada.com/security-cameras/varifocal-vs-fixed-lenses/</link><pubDate>Wed, 01 Nov 2023 22:19:04 +0000</pubDate><guid>https://info.verkada.com/security-cameras/varifocal-vs-fixed-lenses/</guid><description>By Dan Molenhouse, Solutions Engineer
The key distinction between fixed and varifocal lenses lies in their ability to modify the focal length, enabling optical zoom adjustments and dynamic alterations to the field of view. Fixed lenses, also referred to as “prime lenses”, have a static focal length and are therefore optimized for a specific distance or scene. Varifocal lenses have adjustable focal length, allowing the field of view and optical zoom to change in order to cover a broader range of distances and scenes.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/wet-vs-dry-contacts/</link><pubDate>Wed, 01 Nov 2023 00:01:06 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/wet-vs-dry-contacts/</guid><description>By Derek Gunny, Solutions Engineer
In the context of access control, wet contacts are relay outputs that provide power, whereas dry contacts are relay outputs that do not provide power. A wet contact is typically used for access and power control of hardware along the same circuit, while a dry contact is often used for interfacing with other power control systems.
Background Electronic door locks require a power supply to operate.</description></item><item><title/><link>https://info.verkada.com/security/security-service-edge-sse/</link><pubDate>Tue, 31 Oct 2023 18:44:42 +0000</pubDate><guid>https://info.verkada.com/security/security-service-edge-sse/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
In a previous article (Next generation WAN), we discussed the changes in the way employees and businesses utilize computer networks, and how the increase in traffic and adoption of cloud based applications (especially real time multimedia ones) pushed the redesign of the WAN. Moving away from a rigid hub &amp;amp; spoke architecture, based on expensive private lines, and embracing the Internet, the next generation SD-WAN networks are utilizing a mix of wired and wireless public connections to route traffic based on company policies, protecting and prioritizing business critical applications.</description></item><item><title/><link>https://info.verkada.com/video-storage/redundancy-and-security-systems/</link><pubDate>Tue, 31 Oct 2023 17:35:31 +0000</pubDate><guid>https://info.verkada.com/video-storage/redundancy-and-security-systems/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
Planning redundancy when it comes to your security systems is paramount, as any gaps become vulnerabilities, and can be exploited by an attacker. Consider a regular home camera system, used by the owners to keep an eye on the property while away. At any point, an intruder can cut the power, bringing down with it not only the network infrastructure, but also the devices themselves.</description></item><item><title/><link>https://info.verkada.com/video-storage/common-computer-network-components/</link><pubDate>Tue, 31 Oct 2023 16:48:35 +0000</pubDate><guid>https://info.verkada.com/video-storage/common-computer-network-components/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
With IT and facilities converging, it is essential for any security professional to understand, on a high level, the way the LAN (Local Area Network) works. This will allow them to plan and secure their deployments in a more redundant manner, working alongside their IT colleagues and technical integrators in order to improve the overall system.
In this article, I will list the most common elements making up the LAN, the infrastructure that not only allows employees to work, but also connects all IT systems, including the security devices (e.</description></item><item><title/><link>https://info.verkada.com/video-storage/firewalls/</link><pubDate>Tue, 31 Oct 2023 16:04:24 +0000</pubDate><guid>https://info.verkada.com/video-storage/firewalls/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
You have probably heard the phrase ‘punch a hole through the firewall’ and, if you are not an IT professional, wondered what that might exactly mean. In this article, we will provide a brief overview of this essential piece of equipment that keeps your networks safe.
First of all, if you are new to networking, I would recommend you read this article here, detailing a few important devices that, linked together, create the networks we all rely to work when using our computers and phones.</description></item><item><title/><link>https://info.verkada.com/video-storage/crimping-tools-reviews/</link><pubDate>Mon, 30 Oct 2023 20:13:06 +0000</pubDate><guid>https://info.verkada.com/video-storage/crimping-tools-reviews/</guid><description>By Ciaran Gillespie, Solutions Engineer
An RJ45 crimper is a very important device within a security installer&amp;rsquo;s toolkit. Whether you are a hobbyist, DIY installer, or a seasoned professional, choosing the right tool for your needs will eliminate any headache when it comes to terminating Cat5/6 cabling.
There are many types of crimping tools available to suit all budgets and skill levels. For example, if you’re a DIYer, only crimping a few connections, you could comfortably use the cheaper tools that are readily available online.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/access-control-components/</link><pubDate>Thu, 26 Oct 2023 17:41:41 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/access-control-components/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
When deploying access control, there are several additional components you need to consider aside from the access controller (the brains of the system). If they are missing or not in good working condition, it could result in a significant increase in the cost of the overall project.
Besides the controller, an access control system has two mandatory components (lock and reader) and two optional components (DPI and REX).</description></item><item><title/><link>https://info.verkada.com/surveillance-features/lpr-advanced-analytics-best-practices/</link><pubDate>Thu, 26 Oct 2023 17:09:42 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/lpr-advanced-analytics-best-practices/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
Most enterprise-grade CCTV systems allow for advanced analysis of the footage, such as people or vehicle characteristics, face search, or license plate recognition. Although each vendor offers different capabilities and may require different hardware and software licenses, they all have similar requirements when it comes to camera positioning.
In a nutshell, the positioning and proximity of an LPR camera to the subject or object are critical and differ from a deployment intended for holistic CCTV coverage.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/symmetric-vs-aysmmetric-bandwidth/</link><pubDate>Tue, 24 Oct 2023 21:40:06 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/symmetric-vs-aysmmetric-bandwidth/</guid><description>By Ciaran Gillespie, Solutions Engineer
What is Bandwidth? Before jumping into the differences between symmetric and asymmetric bandwidth let&amp;rsquo;s go back to the basics and review the question - what is bandwidth?
Simply put, in networking, bandwidth is a measure of how much data can be transmitted down a particular medium, for example, copper, fiber, and wireless links in a given amount of time, usually measured in seconds. The standard unit for measuring network communications is Bits per second (Bps) or Kbps (Kilobits per second) and Mbps (Megabits per second).</description></item><item><title/><link>https://info.verkada.com/surveillance-features/ppf-explained/</link><pubDate>Tue, 24 Oct 2023 20:55:26 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/ppf-explained/</guid><description>By Dimi Sandu, Head of Solutions Engineering (EMEA)
A question often asked by people purchasing CCTV is, &amp;ldquo;How far can this camera see?&amp;rdquo; Similar to the human eye, the cameras can see as far as the horizon (in an open space), but the further away certain objects are, the harder it is to clearly distinguish their details. This is where the concept of Pixels Per Foot (PPF) comes into play, as it is a way to quantify the quality of the recorded footage and the people or objects contained in it.</description></item><item><title/><link>https://info.verkada.com/iot-smart-sensors/grant-writing-tips/</link><pubDate>Mon, 23 Oct 2023 14:51:54 +0000</pubDate><guid>https://info.verkada.com/iot-smart-sensors/grant-writing-tips/</guid><description>Grants are a great way for schools to fund safety initiatives and equipment. Here’s how to ensure your application gets the attention of grant reviewers.
In the ongoing battle against youth vaping and the need for improved school safety, grants are a vital resource for schools and school districts.
Youth vaping is on the rise; since 2014, e-cigarettes and vapes have become the most popular tobacco products among youth in the United States.</description></item><item><title/><link>https://info.verkada.com/iot-smart-sensors/grant-funding-guide-vape-detectors-schools/</link><pubDate>Mon, 23 Oct 2023 14:14:57 +0000</pubDate><guid>https://info.verkada.com/iot-smart-sensors/grant-funding-guide-vape-detectors-schools/</guid><description>Youth vaping could soon reach epidemic proportions. The Verkada Vape Activity Index shows a 20% year-over-year (YoY) increase in teen vaping use in the 2022-2023 academic year. Research gathered by the American Lung Association points to a variety of health risks associated with vaping, from exposure to dangerous chemicals, to increased risk for lung and heart disease.
To combat these alarming trends, many schools install monitoring devices, vape detectors, and video security cameras.</description></item><item><title/><link>https://info.verkada.com/security/ik-ip-guide-for-security-cameras/</link><pubDate>Fri, 13 Oct 2023 14:44:45 +0000</pubDate><guid>https://info.verkada.com/security/ik-ip-guide-for-security-cameras/</guid><description>IP and IK ratings are crucial specifications for security cameras. These ratings indicate the level of protection provided against different factors. Typically, these standards help describe how &amp;ldquo;weather resistant&amp;rdquo; or &amp;ldquo;vandal resistant” a camera is.
IK Ratings IK ratings are defined by the International Electrotechnical Commission (IEC). IEC Standard #60529 describes “the degrees of protection provided by enclosures for electrical equipment against external mechanical impacts.”
The IK rating is a scale of 0 through 10 and each level of testing describes an increased level of physical impact testing.</description></item><item><title/><link>https://info.verkada.com/compare/h264-vs-h265/</link><pubDate>Thu, 12 Oct 2023 18:25:10 +0000</pubDate><guid>https://info.verkada.com/compare/h264-vs-h265/</guid><description>By Dan Molenhouse, Solutions Engineer
What is a Codec? A codec is a technology used to compress and decompress digital media to more efficiently transmit, store, and play it. During compression, the codec analyzes the data, identifies redundancies, and eliminates or represents them in a more compact form. The compressed data can then be stored or transmitted with greater efficiency.
During decompression, the codec reverses the compression process and reconstructs the video file for playback.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/alyssas-law/</link><pubDate>Fri, 06 Oct 2023 15:29:55 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/alyssas-law/</guid><description>The law seeks to remedy communication breakdowns that have historically hindered effective and timely responses during emergencies, ensuring that schools are better prepared to handle potential threats. By implementing these measures, Alyssa&amp;rsquo;s Law plays a crucial role in promoting a secure environment for students and staff alike.
Understanding Alyssa&amp;rsquo;s Law Alyssa&amp;rsquo;s Law is legislation designed to improve and accelerate law enforcement response time during emergencies at public elementary and secondary schools.</description></item><item><title/><link>https://info.verkada.com/security-cameras/how-to-clean-dome-security-camera/</link><pubDate>Wed, 04 Oct 2023 19:50:26 +0000</pubDate><guid>https://info.verkada.com/security-cameras/how-to-clean-dome-security-camera/</guid><description>Maintaining the cleanliness of a dome security camera is crucial for ensuring a high-quality video feed and effective surveillance. Things like dust, debris, fingerprints and moisture can drastically compromise image quality and lead to unreliable or unusable footage. The following is a comprehensive guide to cleaning and maintaining dome security cameras.
Jump to each section to learn more
• Tools needed to clean a dome camera
• Step-by-step guide to cleaning a dome camera</description></item><item><title/><link>https://info.verkada.com/surveillance-features/poe-overview/</link><pubDate>Thu, 28 Sep 2023 19:54:59 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/poe-overview/</guid><description>Power-over-Ethernet (PoE) has transformed the way we power and connect IP cameras. This technology enables the transmission of both electrical power and data signals over a single Ethernet cable, eliminating the need for separate power supplies and cables. PoE has seen widespread adoption among IP camera systems and security deployments due to its cost effectiveness, streamlined setup and reduced complexity.
In this guide, we provide an overview of how PoE cameras work, the technology behind PoE, when to use it, PoE standards, and practical considerations.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/pci-compliance/</link><pubDate>Wed, 27 Sep 2023 21:07:05 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/pci-compliance/</guid><description>PCI DSS compliance is a requirement for many merchants and organizations in the United States. Here&amp;rsquo;s a closer look at how security cameras can be part of an effective PCI compliance solution.
The Payment Card Industry Data Security Standards (PCI DSS, or simply PCI) is a schedule of information security standards that applies to any merchant or organization that handles payment card transactions. PCI compliance standards are designed to ensure the security of payment card information and reduce risks from payment card fraud, identity theft, and payment card hijacking.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/keep-schools-safe-with-visitor-management/</link><pubDate>Sun, 24 Sep 2023 01:18:39 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/keep-schools-safe-with-visitor-management/</guid><description>5 Ways School Visitor Management Systems Keep Students Safe Across the U.S., schools continue to invest in the safety of their students and faculty. The share of public schools that control access to their buildings increased to 97% in the past decade, according to data from the National Center for Education Statistics (NCES). The use of security cameras and badge/ID requirements increased to 91% and 77%, respectively.
As positive as these trends might be, other data remind us that the work is never done.</description></item><item><title/><link>https://info.verkada.com/compare/plenum-vs-riser-cables/</link><pubDate>Sun, 17 Sep 2023 15:33:43 +0000</pubDate><guid>https://info.verkada.com/compare/plenum-vs-riser-cables/</guid><description>Plenum vs. Riser Cabling Planning a networking infrastructure for a building requires a thoughtful approach to the choice of cabling. Understanding where to deploy fire-resistant cables such as Communication Multipurpose Plenum (CMP) and Communication Multipurpose Riser (CMR), will have a substantial impact on your building’s safety.
Unrated PVC-type cable jackets are flammable, potentially acting as conduits for fire to spread rapidly within a building. In oxygen-rich environments like plenum or ductwork spaces, the airflow can escalate a minor spark into a major spread.</description></item><item><title/><link>https://info.verkada.com/compare/stp-vs-utp/</link><pubDate>Sat, 16 Sep 2023 23:32:37 +0000</pubDate><guid>https://info.verkada.com/compare/stp-vs-utp/</guid><description>STP vs. UTP - What To Consider When Deciding When it comes to running cable for your video surveillance network, one decision to make is whether your cables require shielding. While Shielded Twisted Pairs (STP) provide additional protection against electromagnetic interference (EMI) and offer greater durability, it comes at a higher cost. On the other hand, Unshielded Twisted Pairs (UTP) can be used in many indoor environments and save you money if you do not require additional protection for your cables.</description></item><item><title/><link>https://info.verkada.com/video-storage/how-to-terminate-ethernet-cables/</link><pubDate>Wed, 23 Aug 2023 16:41:44 +0000</pubDate><guid>https://info.verkada.com/video-storage/how-to-terminate-ethernet-cables/</guid><description>Terminating Ethernet Cables CAT5/CAT6 Ethernet cables are commonly used for connecting your security hardware to a network device, and understanding how to properly terminate Ethernet cables is a crucial step for ensuring a proper connection without distortion or signal loss.
Termination involves attaching connectors to the cable ends, allowing them to be plugged into network devices like switches, routers, cameras, or computers. This physical connection is essential for data transfer between devices.</description></item><item><title/><link>https://info.verkada.com/compare/frame-rate-vs-shutter-speed/</link><pubDate>Thu, 17 Aug 2023 20:11:10 +0000</pubDate><guid>https://info.verkada.com/compare/frame-rate-vs-shutter-speed/</guid><description>Frame Rate vs Shutter Speed Understanding how frame rate and shutter rate impact video quality is key to deciding if a surveillance system will meet your intended needs. Additionally, it is important to understand the tradeoff between enhanced video quality and bandwidth/data storage limitations.
What is Frame Rate in a Video? Video footage works by stitching together individual frames. Frame rate is usually expressed as “frames per second” (FPS) and defines how many frames are shown in a second.</description></item><item><title/><link>https://info.verkada.com/perimeter-security/physical-intrusion-detection-systems-pids/</link><pubDate>Tue, 21 Jun 2022 23:31:34 +0000</pubDate><guid>https://info.verkada.com/perimeter-security/physical-intrusion-detection-systems-pids/</guid><description>Physical Intrusion Detection Systems Controlling access to physical and digital spaces using authentication, credentials, and other measures is just one part of access control. Especially for larger organizations, with larger security footprints, the ability to spot potential threats and send alerts is critical in preventing, or at least mitigating, breaches.
What Are Physical Intrusion Detection Systems (PIDS)? To achieve this level of security, many organizations deploy an intrusion detection system (IDS) or intrusion prevention system of some form.</description></item><item><title/><link>https://info.verkada.com/smart-buildings/lockdown-scenario-planning/</link><pubDate>Sun, 03 Apr 2022 23:38:18 +0000</pubDate><guid>https://info.verkada.com/smart-buildings/lockdown-scenario-planning/</guid><description>Safety Measures for School Health and Safety According to the Everytown Research &amp;amp; Policy advocacy group, which has been tracking incidents of gunfire on school grounds since 2013, there have been 875 incidents of gunfire on school grounds since 2013, resulting in 594 injuries and 285 deaths nationally (source). In response, a range of policy and preparedness measures have been proposed from the creation of emergency response and mass notification procedures to crisis teams, metal detectors and even armed police on campus.</description></item><item><title/><link>https://info.verkada.com/iot-smart-sensors/osha-noise-level-monitoring/</link><pubDate>Tue, 22 Mar 2022 00:29:41 +0000</pubDate><guid>https://info.verkada.com/iot-smart-sensors/osha-noise-level-monitoring/</guid><description>In a workplace, educational, or housing environment, too much noise can be harmful. Apart from the more immediate physical effects of high-decibel environments, such as hearing loss, too much noise can distract workers, create anxiety, or even affect immune response. For these and other reasons, many organizations use sensors to monitor sound, noise, and decibel levels.
What industries benefit from noise monitoring sensors? While maintaining healthy sound levels is beneficial in any environment, there are a few industries in which noise monitoring devices are prevalent.</description></item><item><title/><link>https://info.verkada.com/compare/door-entry-methods-for-access-control/</link><pubDate>Wed, 07 Apr 2021 17:24:56 +0000</pubDate><guid>https://info.verkada.com/compare/door-entry-methods-for-access-control/</guid><description>Comparing Door Entry Methods for Access Control As a central part of broader security and surveillance programs, access control is today characterized by the emergence of new technologies, including mobile and cloud, artificial intelligence (AI), biometrics, and wearables, which have quickened the pace of innovation significantly.
In this article, we’ll compare the most common keyed, keyless, and touchless door entry methods for access control. What are the pros and cons of each solution?</description></item><item><title/><link>https://info.verkada.com/iot-smart-sensors/temperature-humidity-monitoring/</link><pubDate>Mon, 08 Mar 2021 19:18:40 +0000</pubDate><guid>https://info.verkada.com/iot-smart-sensors/temperature-humidity-monitoring/</guid><description>Climate Control with Humidity and Temperature Sensor Systems Environmental monitoring is now critical for many organizations in many different industries. Food manufacturers, agricultural companies, construction firms, and real estate owners all have specific use cases. Because so many companies today maintain servers and other sensitive tech equipment, monitoring temperature and humidity is becoming more and more universal.
But there is a big difference between clunky, outdated gauges and modern, smart solutions that can be easily integrated into a comprehensive building management system.</description></item><item><title/><link>https://info.verkada.com/compare/ptz-vs-fisheye-vs-multi-sensor-security-cameras/</link><pubDate>Mon, 08 Mar 2021 18:17:30 +0000</pubDate><guid>https://info.verkada.com/compare/ptz-vs-fisheye-vs-multi-sensor-security-cameras/</guid><description>PTZ vs. Fisheye vs. Multi-Sensor Cameras - What are the Differences? For the organizations and security teams evaluating video surveillance cameras, there has never been more variety. Despite the continued proliferation of new camera technologies, accessories, and capabilities, one thing remains fundamentally true: the right camera will depend on:
Location, placement, and field of view (FoV) requirements Integrations and video management system (VMS) support Options for live and retroactive incident response Footage and zoom quality Purchase, implementation, and maintenance costs Between pan-tilt-zoom (PTZ), fisheye, and multi-sensor cameras, there’s a lot to unpack in terms of similarities and differences, advantages, disadvantages, and cost.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/occupancy-management-contact-tracing/</link><pubDate>Fri, 15 Jan 2021 01:18:40 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/occupancy-management-contact-tracing/</guid><description>Security Camera Features: Occupancy Management &amp;amp; Contact Tracing As more and more businesses reopen their doors, they’ll need to take extra precautions in light of the COVID-19 outbreak. Apart from social distancing guidelines and occupancy limits, businesses need to implement proactive measures for limiting the spread of COVID-19, responding to outbreaks, and monitoring ongoing compliance. What follows is an introduction for the two primary ways for doing so: occupancy management and contact tracing.</description></item><item><title/><link>https://info.verkada.com/security-cameras/lpr-anpr-alpr-camera/</link><pubDate>Wed, 16 Dec 2020 18:43:51 +0000</pubDate><guid>https://info.verkada.com/security-cameras/lpr-anpr-alpr-camera/</guid><description>What is License Plate Recognition (LPR)? Video security has advanced significantly in recent years, with new technologies powered by machine learning and advanced artificial intelligence creating new capabilities. One of these features is License Plate Recognition (LPR). This increasingly in-demand feature is able to detect and read license plates to make it much easier for users, or the authorities, to quickly identify any vehicle on the scene.
Use Cases for Automatic License Plate Recognition The most common license plate recognition (LPR) use case comes during incident investigations, where officials have long struggled to analyze security camera footage for blurry or unreadable license plates.</description></item><item><title/><link>https://info.verkada.com/iot-smart-sensors/smoke-thc-vape-detectors/</link><pubDate>Tue, 17 Nov 2020 22:35:37 +0000</pubDate><guid>https://info.verkada.com/iot-smart-sensors/smoke-thc-vape-detectors/</guid><description>Smart Smoke and Vape Detection in Schools Beyond particulate matter and other harmful emissions, many air quality monitors also detect smoke and vapor emissions. Because indoor smoking bans are now the standard across most businesses and facilities in the United States, detection is an important part of protecting health and safety while remaining code compliant. Yet, smart sensors must also be able to detect marijuana and nicotine thanks to the widespread prevalence of vaping.</description></item><item><title/><link>https://info.verkada.com/iot-smart-sensors/indoor-air-quality-monitoring/</link><pubDate>Fri, 13 Nov 2020 22:01:45 +0000</pubDate><guid>https://info.verkada.com/iot-smart-sensors/indoor-air-quality-monitoring/</guid><description>Managing Indoor Air Quality with Smart Sensor Technology Monitoring security goes beyond access control and video surveillance. Many commercial, industrial, and manufacturing enterprises must also keep an eye on the indoor air quality at their facilities. This is important not only to ensure the safety, wellbeing, and comfort of building occupants, employees, and visitors, but also to adhere to air quality standards and compliance requirements.
While measuring and monitoring air quality can be complicated, modern smart building solutions include integrated environmental sensors that capture air quality data over time.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/total-cost-of-ownership-tco-and-maintenance/</link><pubDate>Wed, 04 Nov 2020 21:11:33 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/total-cost-of-ownership-tco-and-maintenance/</guid><description>What is Access Control TCO? When it comes to building access control systems, a lot goes into the purchase decision. Central to these considerations is total cost of ownership (TCO), which security and information technology (IT) decision makers use to compare and evaluate solutions. Both on-premise and cloud-based access systems have upfront and ongoing costs—some straightforward, others more unpredictable—that contribute to TCO.
A brief introduction to Door Access Systems and TCO TCO is a metric that organizations use to evaluate and compare solutions when looking to deploy, replace, upgrade, or augment their door access systems.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/cloud-based-access-control-software-solutions/</link><pubDate>Tue, 27 Oct 2020 01:27:09 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/cloud-based-access-control-software-solutions/</guid><description>What is Cloud-Based Access Control Software? Ask any IT, security, or operations professional and you’ll hear a common refrain: integrating disparate access control and video security systems under a central management platform is a must. Unfortunately, most traditional systems require separate management systems, which can make incident response, lockdowns, and investigation more cost- and resource-intensive. Access control software “brings it all together,” integrating all components of access control and video security into a single admin experience.</description></item><item><title/><link>https://info.verkada.com/smart-buildings/iot-smart-sensors/</link><pubDate>Fri, 23 Oct 2020 22:59:54 +0000</pubDate><guid>https://info.verkada.com/smart-buildings/iot-smart-sensors/</guid><description>Guide to Environmental Monitoring and Safety Air quality sensors can bring a whole new level of intelligence to your building. They are able to detect a wide range of events that could occur in any facility and seamlessly integrate with a wider access control and security camera system.
From motion and noise detection to humidity and air quality monitoring, you can easily equip your building with environmental sensors that transform facilities into true smart buildings.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/secure-entry-solutions/</link><pubDate>Fri, 23 Oct 2020 06:08:31 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/secure-entry-solutions/</guid><description>Securing Your Access Control Door Entry System Secure door entry is a core part of access control systems. Today, there are a variety of solutions for door access security, each with its own advantages and disadvantages. What follows is a detailed overview of the various methods for securing door entry. Use this guide to evaluate the most secure, cost-efficient solution for your own organization.
On its surface, door security might seem straightforward.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/rfid-vs-nfc-access-control-guide/</link><pubDate>Fri, 23 Oct 2020 05:52:47 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/rfid-vs-nfc-access-control-guide/</guid><description>What is RFID and NFC Access Control? In the context of door access control, radio frequency identification, or RFID, technology is used to enable the exchange of data between key cards and readers. Ideal for use in access control systems, RFID cards have a uniquely identifiable tag that can be detected by a reader up to a few feet away.
Near field communication, or NFC, technology is very similar to RFID, albeit more modern.</description></item><item><title/><link>https://info.verkada.com/smart-buildings/surveillance-and-security-camera-systems/</link><pubDate>Tue, 20 Oct 2020 18:47:55 +0000</pubDate><guid>https://info.verkada.com/smart-buildings/surveillance-and-security-camera-systems/</guid><description>What is an Integrated Security System? Modern organizations are increasingly moving toward an enterprise-wide view of almost everything they do. Rather than operating in silos with disparate systems, companies are now seeing the benefits of having one centralized platform to log into and manage all physical security needs.
Integrated security and surveillance has definitely become a part of this movement. Many top organizations today are working toward an integrated solution that combines key elements such as video surveillance cameras and door access control systems.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/integrated-solutions/</link><pubDate>Thu, 24 Sep 2020 08:04:45 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/integrated-solutions/</guid><description>What is an Integrated Physical Security System? The methods for securing access to digital and physical environments continue to evolve. Two traditionally distinct areas of physical security—door access and video surveillance—are not immune. They’re not only being moved away from strictly on-premise solutions, but are now being integrated to provide a modernized, scalable, and highly secure approach to safeguarding entryways.
Where Are Integrated Access and Video Surveillance Systems Used? Integrated access and video surveillance are common in a variety of familiar settings, large and small.</description></item><item><title/><link>https://info.verkada.com/smart-buildings/door-entry-and-access-systems/</link><pubDate>Tue, 01 Sep 2020 21:37:01 +0000</pubDate><guid>https://info.verkada.com/smart-buildings/door-entry-and-access-systems/</guid><description>What is Access Control? Every building requires an entry system. Traditionally, this constituted a door with a lock and key, but modern buildings now have smarter solutions to choose from. Today&amp;rsquo;s leading access control systems are highly advanced and include a range of different components that ensure security, offer remote access, and prioritize user experience. Few aspects are more important than door entry systems, which as the name suggests allow organizations to authorize admission to their entrances and exits.</description></item><item><title/><link>https://info.verkada.com/security-cameras/wifi-camera/</link><pubDate>Sat, 30 May 2020 22:18:17 +0000</pubDate><guid>https://info.verkada.com/security-cameras/wifi-camera/</guid><description>Note: Verkada does not currently sell wifi cameras, however, Verkada cameras can be operated with a cellular gateway like Cradlepoint, which takes a cellular signal and converts it to PoE.
WiFi security cameras have brought a new level of freedom and flexibility to the world of safety and surveillance. Because they can operate apart from a wired network, you have the ability to install them farther and wider than ever before.</description></item><item><title/><link>https://info.verkada.com/security/camera-firmware-app/</link><pubDate>Wed, 15 Apr 2020 17:34:48 +0000</pubDate><guid>https://info.verkada.com/security/camera-firmware-app/</guid><description>Securing Your Surveillance Camera Firmware &amp;amp; Application Most IT professionals are aware of how much effort goes into securing firmware for any tech system. It isn’t that firmware is necessarily that much more vulnerable than hardware or other aspects of a network system. But flaws do exist, and malicious actors are always looking for — and finding — new vulnerabilities to gain access.
Beyond the actual security camera firmware, there are also a host of threats — malware, spyware, ransomware, and more — that can infect your system and must constantly be safeguarded against.</description></item><item><title/><link>https://info.verkada.com/security/surveillance-network/</link><pubDate>Tue, 31 Mar 2020 23:10:29 +0000</pubDate><guid>https://info.verkada.com/security/surveillance-network/</guid><description>Securing Your Video Surveillance Network Network security is paramount for all organizations in this increasingly dangerous world. From servers and hardware to databases and software, there is a wide range of vulnerabilities that represent entry points for malicious actors.
Featured Content: How to Protect Your Security Camera System
As with all connected devices, IP video security cameras do present some risk. But they can be protected through strategies including secure transmission, firmware updates, and security patches.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/surveillance-for-manufacturers/</link><pubDate>Tue, 31 Mar 2020 01:27:49 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/surveillance-for-manufacturers/</guid><description>How Security Systems Are Used in the Manufacturing Industry Video surveillance is a powerful way to enhance the efficiency, safety, and effectiveness of manufacturing operations at plants, factories, or mills. With the expansion of the Internet of Things (IoT) in the production industry as a whole, the use cases for surveillance camera systems now extend far beyond security. Modern solutions integrate video security with door controllers and card readers to gate access, alongside IoT smart sensors that detect environmental changes.</description></item><item><title/><link>https://info.verkada.com/compare/bullet-vs-dome-camera/</link><pubDate>Tue, 17 Mar 2020 05:19:02 +0000</pubDate><guid>https://info.verkada.com/compare/bullet-vs-dome-camera/</guid><description>Bullet vs. Dome Camera The most noticeable difference between the bullet and dome camera is their shape, which impacts their angle of view, application, and utility. Details on their unique distinctions, durability, and use cases can be found below.
Jump to each section to learn more:
• Bullet Camera Differences, Advantages &amp;amp; Disadvantages
• Dome Camera Differences, Advantages &amp;amp; Disadvantages
• Which is Better, Bullet or Dome Camera?
Bullet Camera Pros, Cons, Differences: The bullet camera is named after its barrel-like design — its unique shape can be a benefit as well as a disadvantage.</description></item><item><title/><link>https://info.verkada.com/security/camera-hardware/</link><pubDate>Fri, 13 Mar 2020 21:07:08 +0000</pubDate><guid>https://info.verkada.com/security/camera-hardware/</guid><description>Protecting Your Security Camera Hardware Cameras are the main hardware components in any video surveillance system. They are the star of the show, and protecting your security cameras should be job one when it comes to safeguarding the tangible assets in your system. Both physical security and data security must be prioritized.
Because video cameras are often placed outside, they will always be vulnerable to vandalism, damage, and theft to some degree.</description></item><item><title/><link>https://info.verkada.com/compare/dvr-vs-nvr/</link><pubDate>Tue, 10 Mar 2020 20:58:42 +0000</pubDate><guid>https://info.verkada.com/compare/dvr-vs-nvr/</guid><description>DVR vs. NVR - What&amp;rsquo;s the Difference? The main difference between the network video recorder (NVR) and digital video recorder (DVR) is in how they process raw video data. A DVR converts analog footage into a digital format, while an NVR typically only works with digital footage. DVR systems process data at the recorder, while NVR systems encode and process data at the camera before transmitting it to the recorder for storage and remote viewing.</description></item><item><title/><link>https://info.verkada.com/security-cameras/ptz-camera/</link><pubDate>Wed, 04 Mar 2020 17:25:51 +0000</pubDate><guid>https://info.verkada.com/security-cameras/ptz-camera/</guid><description>What are PTZ and ePTZ Cameras? Pan-tilt-zoom (PTZ) cameras are built with mechanical parts that allow them to swivel left to right, tilt up and down, and zoom in and out of a scene. They’re typically used to monitor wide open areas requiring a 180- or 360-degree view, and deployed in guard stations where active personnel can operate them through a remote camera controller. Depending on the camera or software, they can also be set to automatically follow motion-triggered activity or adhere to a pre-set schedule.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/surveillance-for-retail/</link><pubDate>Tue, 25 Feb 2020 01:16:28 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/surveillance-for-retail/</guid><description>How Retail Stores &amp;amp; Malls Use Video Surveillance For malls and retail stores, loss prevention plays a key role in effectively maintaining profit margin. Consequently, implementing a retail surveillance system with remote access can be a powerful way to deter theft and catch shoplifting incidents in real-time. Outside of managing inventory, retail security systems can also increase employee productivity and optimize customer shopping experience. In this informational guide, explore the benefits, use cases, and real-life applications of video surveillance for retail security.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/surveillance-for-restaurants/</link><pubDate>Mon, 24 Feb 2020 22:49:39 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/surveillance-for-restaurants/</guid><description>Guide to Restaurant Security Camera Systems Restaurant camera systems are commonly deployed in the hospitality industry to prevent risk, liability, losses, and operational inefficiencies so that managers can run a more successful and profitable business. A report by Management Science revealed that restaurants increased their revenue by 7% and decreased identifiable theft by 22% after deploying a security camera system. This indicates that video security can serve as a motivator for employee productivity, a deterrent to latent theft, or both.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/security-camera-video-storage/</link><pubDate>Thu, 20 Feb 2020 17:59:28 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/security-camera-video-storage/</guid><description>How do you store security camera footage? Video security helps keep locations safe through two primary methods. First, there is real-time surveillance that enables employees or law enforcement officials to discover and monitor any threat in the moment. Then there is the archival footage record that can be reviewed if a crime or other issue is uncovered or suspected at a later time. In both cases, the recorded footage needs to be securely deposited and maintained for future access — making Video Storage an essential element of every video camera security system.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/total-cost-of-ownership/</link><pubDate>Mon, 17 Feb 2020 20:19:37 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/total-cost-of-ownership/</guid><description>What are the Hidden Costs of Video Surveillance Systems? When investing in a new surveillance system that will be in operation for years to come, the initial expenditure is only the tip of the iceberg. For the purposes of planning, budgeting, accounting, and projecting long-term impact, all aspects of managing and operating the project must be taken into account. This is what we mean when we refer to the Total Cost of Ownership (TCO).</description></item><item><title/><link>https://info.verkada.com/surveillance-features/bandwidth/</link><pubDate>Fri, 14 Feb 2020 21:53:31 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/bandwidth/</guid><description>How much bandwidth do security cameras use? Bandwidth availability is a primary concern for any network, and video security systems are no exception. While most people understand that video transmission can carry a significant load, many struggle to gauge the specifications and nuances that impact security cameras and bandwidth. A key development in recent years has been the introduction of modern devices, creative strategies, and optimized systems that help limit bandwidth consumption.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/security-camera-maintenance/</link><pubDate>Thu, 13 Feb 2020 17:53:28 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/security-camera-maintenance/</guid><description>How Do You Maintain Security Cameras? After setup and installation, every video camera security system will require ongoing maintenance to ensure that it continues to operate optimally. This demands a maintenance strategy that is typically executed by either the system provider or internal personnel. Either option can have benefits and drawbacks and different strategies may have different impacts on the total cost of ownership.
Regardless of the strategy employed, most end users view ease of maintenance as a key priority.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/video-data-security/</link><pubDate>Tue, 11 Feb 2020 00:09:51 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/video-data-security/</guid><description>How to Protect Your Security System from Vulnerabilities Compared to other modern devices, security cameras are old. By this, we mean that they have existed in some form since before the world adopted widespread network access and connectivity. So, unlike digital-native technology and even smartphones, they have been forced to evolve and adapt over time to this newer era full of cyberattacks, exploits, and vulnerabilities.
Featured Content: Security Best Practices for Surveillance Cameras</description></item><item><title/><link>https://info.verkada.com/surveillance-features/secure-remote-access/</link><pubDate>Wed, 05 Feb 2020 18:24:27 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/secure-remote-access/</guid><description>What is Secure Remote Access? With traditional video camera security, a company would typically set up, manage, and operate its entire surveillance system onsite. Today, these aspects are often handled remotely and secure remote access is the key to it all. Remote management is especially common among enterprises with multiple locations — and modern technology makes it easy to deploy such a system at scale.
There are some fundamental factors that must be addressed with remote surveillance, and security is by far the most important.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/video-management-software-vms/</link><pubDate>Wed, 29 Jan 2020 22:24:52 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/video-management-software-vms/</guid><description>Video Management Software (VMS) A security system&amp;rsquo;s video management software (VMS) is a critical component for camera operators to control the recording, storage, and management of security, surveillance, or other video surveillance footage. Traditional systems have historically relied on a centralized network video recorder (and NVR software) or digital video recorder (and DVR software) to store video footage. But some modern systems today feature cameras with internal recording capability that allows video to be routed directly into a centralized dashboard, that is easily, remotely managed with the VMS.</description></item><item><title/><link>https://info.verkada.com/security-cameras/4k-camera/</link><pubDate>Sun, 19 Jan 2020 23:18:56 +0000</pubDate><guid>https://info.verkada.com/security-cameras/4k-camera/</guid><description>4K security camera systems record footage using 8 megapixels (8MP) image sensors, allowing them to record footage with better contrast, color, and low-light performance than what was previously possible. With 2160p ultra-high-definition (UHD) image resolution, they produce videos that are four times sharper and higher in clarity than 1080p HD security cameras. Their high pixel density allows users to zoom in on distant objects without reducing image quality. When incidents do occur, they offer the best chance of capturing useful evidence.</description></item><item><title/><link>https://info.verkada.com/security-cameras/ip-camera/</link><pubDate>Thu, 19 Dec 2019 19:51:00 +0000</pubDate><guid>https://info.verkada.com/security-cameras/ip-camera/</guid><description>What is an IP Camera? Internet Protocol cameras, also called IP cameras or network security cameras, provide digital video surveillance by sending and receiving footage over the internet or local area network (LAN). Like their name suggests, IP cameras connect to a network through WiFi or a Power over Ethernet (PoE) cable. They’re often used with network video recorders (NVRs) and sometimes digital video recorders (DVRs, making them a common solution for enterprise video surveillance.</description></item><item><title/><link>https://info.verkada.com/video-storage/cloud-video-storage/</link><pubDate>Tue, 29 Oct 2019 16:40:11 +0000</pubDate><guid>https://info.verkada.com/video-storage/cloud-video-storage/</guid><description>Cloud Video Storage Cloud storage, as the name implies, is a method of storing surveillance footage in the cloud. Unlike traditional CCTV systems, modern surveillance systems that store footage in the cloud offer organizations a simple way to scale video storage to meet retention requirements. Without being restricted by limitations of on-premise recorders like NVRs and DVRs, cloud camera systems are quickly becoming a popular option among fast growing businesses.</description></item><item><title/><link>https://info.verkada.com/security-cameras/fisheye-camera/</link><pubDate>Mon, 28 Oct 2019 22:37:18 +0000</pubDate><guid>https://info.verkada.com/security-cameras/fisheye-camera/</guid><description>Fisheye security cameras, known for their ultra-wide-angle lens, are capable of providing video surveillance with dynamic viewing angles, including panoramic 180 degrees and 360 degrees. When using a wide-angle panoramic IP camera, images are typically warped, which creates the effect of a fisheye. In addition to the panoramic view, fisheye surveillance cameras are also capable of providing greater situational awareness to reduce potential blind spots with the ability to create split views in different directions to increase coverage without having to install additional cameras.</description></item><item><title/><link>https://info.verkada.com/security-cameras/bullet-camera/</link><pubDate>Mon, 28 Oct 2019 22:17:12 +0000</pubDate><guid>https://info.verkada.com/security-cameras/bullet-camera/</guid><description>What is a Bullet Camera? Bullet security cameras are known for their longer outside casing, giving these surveillance cameras a distinguished and noticeable presence. Due to this form factor, bullet surveillance cameras can typically house a larger lens, making them an excellent outdoor camera capable of providing higher levels of detail over greater distances. This also lends itself to extended night vision for larger outdoor areas such as parking lots and traffic intersections.</description></item><item><title/><link>https://info.verkada.com/video-storage/hybrid-cloud-video-storage/</link><pubDate>Mon, 28 Oct 2019 17:28:32 +0000</pubDate><guid>https://info.verkada.com/video-storage/hybrid-cloud-video-storage/</guid><description>Hybrid Cloud Video Storage Hybrid cloud security systems use a combination of onboard camera storage with a cloud data storage solution. These systems often provide a wealth of benefits over standard Internet protocol (IP) security camera offerings and give users a greater degree of flexibility than pure cloud cameras—which require a consistent Internet connection consuming large amounts of network bandwidth.
Jump to each section to learn more:
• What is a Hybrid Cloud Security System?</description></item><item><title/><link>https://info.verkada.com/video-storage/digital-video-recorder-dvr/</link><pubDate>Sun, 27 Oct 2019 16:40:11 +0000</pubDate><guid>https://info.verkada.com/video-storage/digital-video-recorder-dvr/</guid><description>Digital Video Recorders (DVRs) A digital video recorder (DVR) is a device that converts the signals from an analog camera into a viewable digital format that can be stored on a hard drive. It’s one of two local storage options for closed-circuit television (CCTV) security systems—the second being network video recorders (NVRs). DVR and NVR devices are similar in that they both have the ability to capture video footage. However, the devices differ in how they are set up, which cameras they are compatible with, and how they process raw video data.</description></item><item><title/><link>https://info.verkada.com/video-storage/network-video-recorder-nvr/</link><pubDate>Sat, 26 Oct 2019 01:50:39 +0000</pubDate><guid>https://info.verkada.com/video-storage/network-video-recorder-nvr/</guid><description>Network Video Recorders (NVRs) Network video recorders (NVRs) are one of two local storage options for closed-circuit television (CCTV) security systems—the other being digital video recorders (DVRs). The main similarity between NVR and DVR devices is that they both have the ability to capture video, however, the two devices are different in terms of how they are installed, their compatibility with enterprise grade cameras, and how they process raw data.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/surveillance-for-government/</link><pubDate>Fri, 25 Oct 2019 22:27:55 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/surveillance-for-government/</guid><description>Improving Public Safety in Cities with Surveillance Camera Systems Ensuring public safety requires a great deal of effort from law enforcement, local authorities, and citizens that reside within community. However, with security camera systems, it’s easier for towns and cities to monitor the security of public spaces to safeguard citizens from threats to their well-being.
Featured Video: What IT Looks for in a City Surveillance Camera System
From day-to-day incident resolution to emergency response and disaster management, surveillance can prevent or mitigate incidents that would otherwise alter the perception of safety in any town or city.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/surveillance-for-commercial-businesses/</link><pubDate>Fri, 25 Oct 2019 21:20:58 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/surveillance-for-commercial-businesses/</guid><description>Video Security for Commercial Businesses Security cameras are an effective way to gather insights about day-to-day activities, improve employee safety, and mitigate internal and external threats across all enterprise applications. While the implementation of video surveillance across business settings may vary depending on the size of the facility&amp;ndash;or specific needs of the organization&amp;ndash;it&amp;rsquo;s critical that key stakeholders prioritize safety for employees across workplace settings.
Jump to each section to learn more:</description></item><item><title/><link>https://info.verkada.com/industry-solutions/surveillance-for-banks/</link><pubDate>Fri, 25 Oct 2019 20:39:15 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/surveillance-for-banks/</guid><description>Video Security for Banks &amp;amp; Credit Unions Bank security systems are the digital cornerstones of teller and bank customer safety. At a fundamental level, installing security cameras gives safety and surveillance teams visibility into events that occur at a given ATM, bank, or credit union location.
Due to the large number of monetary transactions that occur on a daily basis in financial institutions, it&amp;rsquo;s imperative that security cameras cover all transaction areas.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/surveillance-for-education/</link><pubDate>Fri, 25 Oct 2019 18:26:46 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/surveillance-for-education/</guid><description>Using Video Security on School Campuses Prioritizing student safety, teacher safety, and facility safety is a must for schools looking to instill a safe learning environment. Given the prevalence of school violence today, education officials shouldn’t wait for an incident to occur before prioritizing school security and surveillance.
To better prepare themselves for any future situation, school safety and security teams turn to surveillance in schools as a way of reducing campus crime and enhancing visibility into day-to-day activities and operations.</description></item><item><title/><link>https://info.verkada.com/security-cameras/dome-camera/</link><pubDate>Fri, 11 Oct 2019 23:14:45 +0000</pubDate><guid>https://info.verkada.com/security-cameras/dome-camera/</guid><description>What is a Dome Camera? Dome security cameras are easily recognizable for their circular, dome encasing. Dome surveillance cameras are highly versatile and can be used in both indoor and outdoor settings, providing unparalleled coverage for nearly any use case. Most dome security cameras have a vandal-proof dome encasing, IR for night vision, and a sturdy metal base to protect it from vandalism or tampering, making it an ideal solution for reliable surveillance in rugged conditions.</description></item><item><title/><link>https://info.verkada.com/compare/</link><pubDate>Fri, 02 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/compare/</guid><description>Comparison Guide to Surveillance Solutions Whether you are evaluating vendors for your organization or researching cameras out of curiosity, delving into the state of modern surveillance technology is no small feat. From video storage to camera types, there are a plethora of security solutions available on the market today. Despite the breadth of work required to research features and compare options, this is perhaps the most important step in finding the right surveillance system to meet your current and future needs.</description></item><item><title/><link>https://info.verkada.com/perimeter-security/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/perimeter-security/</guid><description>What is Physical Perimeter Security? Physical perimeter security includes the systems and technologies that protect people, property, and assets within a facility by detecting and preventing unauthorized intrusions. There are 5 key principles behind 5D perimeter security design:
1. Deter The objective of perimeter security is to deter malicious actors from attempting the intrusion in the first place. With video surveillance technology integrated with perimeter alarms and access control, organizations have real-time visibility into unusual or suspicious activity, with can be verified remotely by professional monitoring or a virtual guard.</description></item><item><title/><link>https://info.verkada.com/surveillance-features/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/surveillance-features/</guid><description>Surveillance System Features With the modernization of video surveillance technology in recent years, security camera systems offer increasingly advanced features and cutting-edge capabilities.
A challenge in choosing the right surveillance system for your organization is knowing which security camera features to prioritize. There are seven factors that modern surveillance systems need in order to be secure, efficient, and scalable: intuitive video management system (VMS) software, remote accessibility, low bandwidth consumption, reliable video storage, data security, calculable total cost of ownership, and ease of maintenance.</description></item><item><title/><link>https://info.verkada.com/smart-buildings/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/smart-buildings/</guid><description>Creating a Smart Building Ecosystem As innovation in the Internet of Things (IoT) space continues to expand, so does the utilization of IoT data in the facility management of smart commercial buildings.
With integrated Smart Building technology you can improve asset, production, and facilities management, as well as enhance workplace safety solutions. Artificial Intelligence (AI), edge computing, and high resolution are already in the smart security systems for enterprises, and offer benefits like object classification, face recognition, body detection, environmental monitoring, automated access management, and people counting.</description></item><item><title/><link>https://info.verkada.com/industry-solutions/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/industry-solutions/</guid><description>Improves Physical Safety with Surveillance Technology When it comes to the protection of people, property, and assets, choosing to invest in a video surveillance solution is a wise decision across any enterprise application for incident resolution and mitigating security threats. While the specific usage of security cameras may vary across industry, any effective surveillance solution deters crime, identifies threats, and alerts teams of unwanted scenarios.
At the highest level, here are a few key benefits to having security cameras professionally installed across any indoor or outdoor location.</description></item><item><title/><link>https://info.verkada.com/video-storage/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/video-storage/</guid><description>Video Surveillance Storage With a number of security camera models and systems available on the market today, the first part of the buying decision is universal regardless of your camera must-haves: video storage.
There are three main types of security camera storage options to choose from—local, hybrid cloud, and cloud—and determining which method of video storage makes the most sense for your business can help you narrow down what type of security camera system best meets the needs of your organization.</description></item><item><title/><link>https://info.verkada.com/security/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security/</guid><description>Prevent Vulnerabilities with a Secure System Infrastructure Video surveillance plays a key role in protecting people and property, but what provisions are in place to protect your system from cyberthreats?
Physical and data security breaches are some of the top threats that organizations face. A web search for “security camera hacked” turns up 16.6 million results. To protect your system from vulnerabilities, having a thoughtfully designed security infrastructure is ground zero.</description></item><item><title/><link>https://info.verkada.com/security-cameras/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/security-cameras/</guid><description>The Increasing Importance of Security Cameras Surveillance plays a critical role in the protection of people, property and assets. In 2014, there were nearly 250 million professionally installed security cameras worldwide. Through 2021, security camera sales are expected to grow over 7% annually.
With physical safety as a top priority across all industries, Security and IT professionals are becoming increasingly reliant on security cameras and surveillance technologies to scale safety across locations.</description></item><item><title/><link>https://info.verkada.com/door-access-systems/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/door-access-systems/</guid><description>What is a Door Access System? Most modern buildings have at least one point of entry and exit, as well as a way to gate physical access to doorways. Whether it’s lock and key or a more sophisticated mode of verification, physical access control is a critical component of securing your facilities and protecting your assets.
From a high level, access control systems consist of two key parts: authentication and authorization.</description></item><item><title/><link>https://info.verkada.com/iot-smart-sensors/</link><pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate><guid>https://info.verkada.com/iot-smart-sensors/</guid><description>Guide to IoT Smart Sensor Technology The expansion of the Internet of Things (IoT) for smart building management has transformed the way that facilities are monitored and secured. IoT uses a centralized Internet Protocol (IP) to connect devices that include everything from sensors and door access controllers, to smartphones and security cameras. By 2025, the number of connected IoT devices is expected to reach 76 billion. Among these devices are IoT smart sensors that collect environmental data such as air quality index (AQI), temperature, humidity, particulate matter, volatile organic compounds, motion, noise, smoke and vapor levels.</description></item></channel></rss>