Guest Blog: Things have changed a lot since 1897. Customers are the key.

    [fa icon="calendar'] Nov 2, 2017 8:08:00 AM / by Gina Stuelke posted in Blog

    [fa icon="comment"] 0 Comments

    NOTE: This is a guest blog from one of our business partners, Kenton Brothers for Security.  Viakoo's take is that this blog really hits the nail on the head when it comes to how the security integration business has changed, and how leaders like Kenton Brothers have managed their business along with those changes. 

    It’s an interesting experience carrying forward a century old organization in today’s technology driven business environment. Think about the speed at which things move and change today compared to even as little as five years ago. Then compare that back to over 120 years ago when KB was founded…really, almost everything has changed since 1897.

    Read More [fa icon="long-arrow-right"]

    How to Be More Efficient on Your Next Service Call

    [fa icon="calendar'] Oct 31, 2017 12:57:52 PM / by John Gallagher posted in service calls

    [fa icon="comment"] 0 Comments

    Who wants more time spent on service calls? Don’t be shy…

    Read More [fa icon="long-arrow-right"]

    Guest Post: How Big Data is Changing Surveillance for Good

    [fa icon="calendar'] Oct 19, 2017 5:00:06 PM / by Jason Spielfogel posted in surveillance, big data

    [fa icon="comment"] 0 Comments

    With the advent of the Internet of Things (IoT), more and more of our devices are connected to the network, making it possible to amass data and analyze it for patterns and trends. In this way big data is becoming more of a resource for virtually every industry including security, where video captured by cameras can now be more easily stored and analyzed by software. However, this new technology has taken hold so quickly that some organizations are now sitting with immense quantities of raw data without the knowledge of how to best use it. Since big data is only going to get bigger, security professionals need to understand the best ways that they can put it to use.

    Read More [fa icon="long-arrow-right"]

    How Proactive Reporting Expands the Value of Your Surveillance System

    [fa icon="calendar'] Oct 17, 2017 6:03:07 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    For years, the security industry has relied on a ‘reactive’ model for maintenance on surveillance systems. Older, analog systems, working in concert with security officers, guard dogs, and physical barriers, required less maintenance and management than today’s high-technology IP-based systems. When they failed, people knew because there was no image on a screen.  Security systems today are more capable, more powerful, more “virtual”, and more secure—but also more complex, requiring more detailed inspection to ensure their consistent function. Seeing an image on a screen does not mean with IP-based surveillance that video is recording as it should – that’s why so many security teams have faced the “missing video” problem when they go to retrieve video evidence and it is not there.  Because there are more things that can go wrong, and go wrong “silently” without someone knowing a failure has happened, most physical security teams are in the rut of reactive maintenance.  No one knows when the failure happened.  To figure out root cause, a technician is sent to inspect the system.  Then fixes are tried, sometimes iteratively, until it looks like it’s working again. 

    Read More [fa icon="long-arrow-right"]

    The Importance of Benchmarking vs. Peers for Surveillance

    [fa icon="calendar'] Sep 14, 2017 10:05:12 AM / by John Gallagher posted in benchmarking

    [fa icon="comment"] 1 Comment

    Benchmarking has been an important part of business operations for as long as there’s been business—one can easily imagine a prehistoric hunter-gatherer comparing the plants they’ve collected to their neighbor for color, taste, and medicinal effectiveness—and then asking the neighbor where they found better plants. Comparing your operations to your competitors is an extremely helpful tool to help you optimize your activities and increase your own ROI. By benchmarking your security system, you can learn how to improve operations, reduce costs, and create a more efficient system.

    Read More [fa icon="long-arrow-right"]

    5 Hints You May Need More Storage Space on Your Surveillance System

    [fa icon="calendar'] Sep 13, 2017 4:41:17 PM / by John Gallagher posted in surveillance

    [fa icon="comment"] 0 Comments

    The storage demands on surveillance systems keep getting bigger. As higher performing and more complex surveillance technology is developed by the industry, storage needs are also becoming more complex and demanding. You may not realize just how much storage your surveillance system truly needs. Here are five hints that the storage your business needs to keep its surveillance system running smoothly might be more than you think:

    Read More [fa icon="long-arrow-right"]

    What To See at ASIS 2017

    [fa icon="calendar'] Sep 8, 2017 3:11:42 PM / by John Gallagher posted in ASIS

    [fa icon="comment"] 0 Comments

    The ASIS Annual Seminar and Exhibition is one of the world’s premiere events for security professionals and industry leaders, allowing those in the security industry to make connections, present new products and services, and provide education on the latest security trends and opportunities. ASIS attendees expand knowledge-sharing and connect with security peers to enhance security solutions and opportunities across the industry. Participating in trade events like these connects and improves the entire industry, which is why Viakoo is so excited to be attending ASIS 2017.

    Read More [fa icon="long-arrow-right"]

    How A Digital Twin Protects Your Security Network

    [fa icon="calendar'] Aug 23, 2017 2:36:00 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    As the Internet of Things grows, adding devices in myriad industries onto IP networks, the ability to leverage a digital twin to maintain these devices becomes a more and more attractive option--simpler to use and more cost-effective to implement. But a digital twin is relatively new technology, and many don’t understand how to use it or what benefits it can provide.

    Read More [fa icon="long-arrow-right"]

    Every Technician Needs a Sidekick

    [fa icon="calendar'] Aug 22, 2017 3:27:30 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    For several years the move to IP-based physical security has been underway, but if you are responsible for maintaining and servicing these systems the reality is your work life has not improved as expected.  That is about to change, and quickly, as the combination of artificial intelligence, mobility, and analytics makes the old way of performing service on physical security systems seem antiquated and ineffective.  In other words, the transition to IP-based physical security has been hard (and expensive), but massive payoffs are about to emerge from that effort and the first recipients will be project managers and service technicians in the form of an “AI Sidekick”. 

    Read More [fa icon="long-arrow-right"]

    Third-Party Cybersecurity Matters

    [fa icon="calendar'] Aug 15, 2017 3:33:19 PM / by Joel Rakow posted in Blog

    [fa icon="comment"] 0 Comments

    Conventional wisdom suggests employee access is the weakest link in enterprise cyber security. Now, there are good reasons to believe that the cybersecurity hygiene of your third-party vendors may be at least as weak as employee access.  Third-party cybersecurity matters now more than it ever has before.

    Read More [fa icon="long-arrow-right"]