Viakoo Blog

Failed Cameras Hamper Brooklyn Subway Shooting Investigation

When video evidence is not available immediately after a tragedy or terrorist incident it leads to danger, confusion, and higher likelihood of further attacks. This morning was yet another example of how failed or missing video evidence puts us all at risk.

How To Hack The Kremlin? Cameras, Of Course.

Hackers have many types of attack vectors at their disposal when launching a cyberwar; there are...

Cybernews Interview With Viakoo CEO Bud Broomhead

This interview originally appeared in CyberNews

The Wave of Open Source Vulnerabilities  (That Becomes a Tsunami of Remediation)

Vulnerabilities tied to open source components have been increasing over the few years and...

New Website Reflects an Evolving Viakoo

While this blog typically addresses industry-level topics such as extending Zero Trust to IoT...

Log4j and IoT Need for Urgent Action

The recently discovered cyber vulnerability in Apache Log4j, a widely used open source Java...

Cybersecurity First

As National Cybersecurity Awareness Month comes to an end, the last of the weekly themes is...

Explore. Experience. Share.

This week of Cybersecurity Awareness Month is focused on “Explore. Experience. Share.”. As cyber...

To Fight The Phish Focus on Firmware

We’re in week 2 of Cybersecurity Awareness Month, and the theme this week is “Fight the Phish”....

October is Cybersecurity Month

Viakoo is proud to be a Champion of this year’s Cybersecurity Awareness Month, a global effort...

How Remediation Deficits Can Lead to Disaster

Cyber criminals and cybersecurity professionals have been at war for many years; battles are hard...

ThroughTek, Round 2:  Need for Automated Remediation

Today’s news I had to read twice – devices using a ThroughTek chipset contain a significant...

ThroughTek P2P Vulnerability Puts Spotlight on IoT Remediation

This past week a significant vulnerability was found in several different makes and models of IP...

Are You Sisyphus or Proteus?

This week I came across two quotes that reinforced why keeping up with firmware patches is both...

Colonial Pipeline Cyberattack – Will This One Spur Action?

The ransomware attack and subsequent shutdown of the Colonial Pipeline system on the U.S. East...

NDAA 889: You Need Automation To Be Successful

If you were informed that certain brands of footwear had unacceptable amounts of radiation coming...

Breaking the Cyber Kill Chain

Many cyber security professionals rely on process and methodology to ensure they are as effective...

What’s Your IoT Security Quadrant?

Knowing where you are positioned is a good starting point to take action to improve that position....

Why Manually Updating IoT Firmware is >10X Harder Than IT Firmware

A recent quote from cyber expert Chris Roberts highlights the immediate threat from unpatched and...

Why Urgency Around Unmanaged and IoT Security Hit This Week

In several corporate boardrooms (perhaps yours), this was the week where the risk and scale of...

Viakoo Comments on Solarwinds Breach

Summary Viakoo was not affected by the SolarWinds breach. Viakoo does not share technologies nor...

IoT and Security: What CISOs Must Know

Ubiquitous in nature and expansive in scope, IoT is vulnerable on many levels In the ever-expanding...

IoT and Security: Foundational Knowledge for CISOs

Foundational knowledge in how CISOs must view corporate security is a major threat presented by IoT...

The Digital Connection for Contactless Security Maintenance

The last few months have made maintaining and managing physical security IoT systems difficult –...

Good Advice – Wash Your Cyber Hands!  Even Better – Do It Remotely!!

We are on the verge of a crisis in Cyber Hygiene. Not only are millions of IoT devices (like...

Enterprises Sit on a Time Bomb

The Security Industry Association's Primer: Minimize Risk by Protecting Privacy is an important...

Getting Serious About Remote Problem Resolution

In talking with several end users and security integrators this week, one thing is clear: we are...

Edge Data Centers Drive Changes in Physical Security

According to a recent report from the research firm IDC entitled Data Age 2025, more than 33...

Benefits of Assuring Access Control

Access control is one of the most prevalent physical security technologies deployed, and not...

How to Get Physical with Cybersecurity

Earlier this summer the Center for Cyber and Homeland Security (CCHS) at Auburn University in...

The Need for Compliance as a Service for Physical Security

Physical security systems can be managed and operated in a variety of ways – some methods lead to...

What is Your Mean Time to Innocence

If you’re responsible for physical security, then you might be familiar with the concept of “mean...

Viakoo Solutions Harden and Support Cloud-Based Physical Security Services

Many organizations are implementing, or have already implemented, cloud-based physical security...

What I Learned at Campus Safety Conference

This past week I was fortunate to attend the Campus Safety Conference in Las Vegas as a sponsor,...

How Viakoo Can Make Elections Secure Again

This past Thursday evening Viakoo participated in a great event hosted by CapitolSec 2020 in...

Digital Twins – Secure Enough For Security?

Because they model a part of the real world, “digital twins” are quickly becoming important...

How Available is Your Security?

All too often a massive amount of effort is put into specifying, negotiating, and installing a...

Convergence is Back with a Vengeance

A few years ago at physical security industry conferences the word I heard the most was...

How Service Assurance Can Help Meet GDPR Goals

The European General Data Protection Regulations (GDPR) have been in effect for some time now –...

Automating Lifecycle Management of IP-Based Physical Security Systems

As the physical security industry has transitioned from analog to IP-based systems, several...

Are You Automating Camera Firmware Updates? You Should.

The now infamous Target data breach was transacted by malware being placed on the HVAC system...

Implementing Service Assurance to Improve Operations

There’s a popular business quote that goes something like, “if you can’t measure it, you can’t...

Tips for Avoiding Physical Security IoT Issues

Do you think IoT devices as part of a physical security network are a blessing or a curse?

How to Recover from a Physical Security System Failure

It’s happened: you had a major failure of one (or all) parts of your physical security system....

Opportunity Knocks:  Service Assurance from Integrators

Every security integrator faces this issue. Your customers purchase new physical security systems...

Physical Security, As Told by Numbers

To sense the scale and magnitude of changes happening in physical security it helps to put numbers...

AI Really Will Change Physical Security

Everybody is talking about it, and more and more people are using it. From self-driving cars to...

Why New Grads Are Drawn to Physical Security

Physical Security competes with other industries for talent, and there is (right now) a giant...

2018: Critical Year for Integrators at ISC West

ISC West (International Security Conference & Exhibition) is the largest security industry trade...

Data Gravity and Viakoo

There are ideas and concepts that you come across that you realize immediately were not developed...

Securing The Physical Security Network with a Single Pane of Glass

As with most things in life that develop at a rapid pace, the Internet of Things (IoT) may have...

Why Things Are Getting Spicy at Viakoo

As time marches on in physical security, sometimes there are clear markers along the way that...

What Your Board Needs To See From Physical Security

In many organizations, security is still considered an independent issue that is restricted to the...

Why Preventing Disaster Can’t Be Siloed

In any business, security duties and responsibilities may be spread between different departments...

Physical Security IoT – is there an iota of assurance?

An article I saw recently started with this compelling question:

Looking Ahead: 2018 Trends for Security Systems

As 2017 is headed to a close we can already see trends that will shape the security landscape in...

Guest Blog: Things have changed a lot since 1897. Customers are the key.

NOTE: This is a guest blog from one of our business partners, Kenton Brothers for Security....

How to Be More Efficient on Your Next Service Call

Who wants more time spent on service calls? Don’t be shy…

Guest Post: How Big Data is Changing Surveillance for Good

With the advent of the Internet of Things (IoT), more and more of our devices are connected to the...

Don't Be A Victim Of Missing Video Evidence

For years, the security industry has relied on a ‘reactive’ model for maintenance on surveillance...

The Importance of Benchmarking vs. Peers for Surveillance

Benchmarking has been an important part of business operations for as long as there’s been...

5 Hints You May Need More Storage Space on Your Surveillance System

The storage demands on surveillance systems keep getting bigger. As higher performing and more...

What To See at ASIS 2017

The ASIS Annual Seminar and Exhibition is one of the world’s premiere events for security...

How A Digital Twin Protects Your Security Network

As the Internet of Things grows, adding devices in myriad industries onto IP networks, the ability...

Every Technician Needs a Sidekick

For several years the move to IP-based physical security has been underway, but if you are...

Third-Party Cybersecurity Matters

Conventional wisdom suggests employee access is the weakest link in enterprise cyber security. Now,...

CSOs Ensure Surveillance System Integrity with Automated Verification

CSOs count on video surveillance systems to keep an eye on all areas of their facility, employees,...

Devil’s Ivy, Auditors, and “60 Minutes” – Why They (and You) Are Connected

Almost daily there is a new cyber-threat announced, and increasingly they target physical security....

Some people see security system, some see attack surface

On a Tuesday morning in 2001, it became very clear that many of our fundamental perceptions about...

Verification and Diagnostic Solutions Create New Business Opportunities for Integrators

Security integrators looking to grow their recurring monthly revenue (RMR) can achieve this with...

Data Governance and Physical Security

Data protection has been in the news a lot recently; not only the issues around hacking and...

Rethinking Service Models to Generate New Sources of RMR

RMR is the new lifeblood for security integration companies. Adding services to an equipment or...

Isn’t It Time to Stop Console Madness?

Even if you’ve never played “Whack-A-Mole” you’ve probably heard it used as a metaphor for a...

Viakoo Showcases OnPremises Automated Data Verification Solution for Surveillance and Access at ISC West

Designed for Deployment Onsite within an Organization’s Firewall

New Password Checker IP Camera Vulnerability Solution Introduced by Viakoo at ISC West

Beta Tester Privileges Offered to Select Organizations

Solving Compliance Challenges with Automation

Fact: Organizations across many industries are subject to government and other regulations and must...

Tradeoffs That Should Never Impact Security: Cloud vs. On-Premises

Every organization has differences in how they accomplish their job, which can be thought of as...

Viakoo OnPremises Delivers Automated Surveillance and Access Data Verification within the Firewall

Expands Options for Companies to Enable Proactive Service

The Proactive Revolution

Join the revolution! Everyone’s doing it!

Viakoo’s Automated Surveillance and Access Data Verification Solution Delivers RMR for Integrators

Proactive Service Boosts Integrators’ Bottom Line While Ensuring Maximum Efficiency

Navigating the new compliance landscape for video surveillance and access control

Some industries, such as nuclear energy and securities trading, are long accustomed to regulation,...

Why data verification matters for video surveillance and access control

By now, virtually every organization has recognized the need to invest in video surveillance and...

Viakoo Awarded US Patent for Validating Retention Times of Surveillance Data

Enables Tracking of Video Retention Compliance (VRC) as Key Performance Metric

Viakoo Enables 100 Million Hours of Proactive Service for Physical Security

Mountain View, CA (December 6, 2016) – Viakoo, the leader in automated verification of physical...

Viakoo’s Automated Solution Verifies Surveillance and Access Control System Performance

Proactive Solution Provides Documentation of System Performance for Continuous Compliance

SERVICE AND MAINTENANCE AUTOMATION for Physical Security - It’s Time Has Come!

Today’s physical security environments are complex. It is common to find a mix of analog and IP...

The Need For Automation: Why Having Traditional Physical Security Is Not Enough

Note: Today's blog is contributed by Ralph Goodman from the Lock Blog. Viakoo is honored to have...

IHS Markit Puts Focus on Physical Security Service Costs

Every now and then you read an article, and its only days later that the real implications of it...

Important Elements of Campus Safety

As an incoming college student, I’m about to immerse myself in an unfamiliar environment and...

Reassessing Physical Security Maintenance

Over the last couple years I have seen many examples of physical security systems that don’t work...

Arecont Vision® Technology Partner Program Expands Actionable Intelligence with Viakoo

IACLEA Expo2016

Join Viakoo in Phoenix June 24 & 25 at the IACLEA Expo2016.

ISC West 2016

[av_three_fourth first min_height='' vertical_alignment='' space='' custom_margin='' margin='0px'...

Civics Lesson at the BART Board Meeting

I don’t know about you but I don’t often go to city council meetings, county planning boards, or...

Video surveillance should answer questions not raise them

This past week had an issue that anyone involved in video surveillance should be concerned about:...

Video Surveillance Trends for 2016

A recent article on where the video surveillance market is headed had significant “head nodding”...

Imperial Capital Security Investor Conference

Viakoo is honored to be an invited presenter at the Imperial Capital Security Investor Conference...

Redefining Service: Physical Security Service and Support – the Old Way versus the New Way

In my 10 years of working with physical security organizations, their concern with physical...

In Nobel Company

As the Nobel Prizes were awarded this past week there was some excitement at the Viakoo...

G4S Announces Embedding Viakoo Operational Intelligence Capabilities into G4S Security Management Platform

G4S and Viakoo Close Security Risk Gap, Minimizing Physical Security Threats by Embedding...

PCI: Pushing Physical and Cyber-Security Closer Together With Standards

As retailers well know, security standards like PCI must evolve (sometimes quickly) to address new...

What School Safety, IoT, and Pennies Have in Common

Just as summer usually means hotter weather, baseball, and getaways, it also is the season for...

Shouldn’t Everyone Have a Surveillance Camera Commissioner?

With the wide-spread and growing use of video surveillance cameras in many parts of society, the...

Idesco Partners With Viakoo To Offer Reliable Video Monitoring and Reduce Downtime

Leading security systems integrator partners with video surveillance network management company to...

Viakoo at IoT World

Next week IoT World kicks off in San Francisco (May 12-13) at Moscone Center, and we hope you can...

Orphaned Video System in Philadelphia?

My recent trip to Philadelphia was enlightening. It has been widely reported that only 40% of the...

Viakoo and Video Insight Integrate Solutions to Optimize Capabilities

Viakoo and Video Insight Integrate Solutions to Optimize Capabilities Partnership Enables...

Viakoo Wins MVP Award for "Best Video App" at 2015 SAMMY Awards

Las Vegas, NV. (April 16, 2015) – Viakoo, a leader in video surveillance network management,...

Viakoo Teams with Arecont Vision® to Optimize Network Platform

Viakoo Teams with Arecont Vision® to Optimize Network Platform Companies Working Together for...

SanDisk Partners with N2NSecure and Viakoo to Certify Breakthrough Capabilities of InfiniFlash™ All-Flash Storage System

Demonstration at ISC West Shows Massive Capacity, Economic Advantage, and Assured Uptime for Video...

Viakoo Joins the Lyteship Group to Drive Best Practices for Security Video

Viakoo Joins the Lyteship Group to Drive Best Practices for Security Video Industry Association...

Viakoo Eliminates Missing Video; Reduces Surveillance Downtime

Innovative SaaS Technology Aids Transition from Analog to IP

Three Peas in a (Demo) Pod: Viakoo, SanDisk, and N2NSecure

As we heading into ISC West this week a key dialogue at the conference is on the convergence of...

What Makes a Solution Different Than a Tool

In the world of physical security there has been a lot of dialogue around how the lines are blurred...

Can Retailers (or Anyone) Define and Meet Security Video SLAs?

A service-level agreement, or SLA, is a contract between a service provider and a customer that...

What is Your Uptime Number? (And Why It Matters)

While customers, integrators and designers rightfully focus on the cost of a new IP video system...

Hacker Here: This is Your Wakeup Call

Why worry about the security of your physical security systems, especially your video surveillance...

The Timing Is Perfect

Week one of the “End of Missing Video” Tour was met with enthusiasm, interest and new trial...

The Tour Begins! First stop New York...

Tired of missing video, video downtime and having no executive oversight of your infrastructure?...

On Tour: Roadies Welcome!

This is an exciting time, so I am taking a minute to write about it. Next week I embark on my “The...

Why Do You Accept 30% Failure Rates?

In the June 2014 issue of Security Magazine there was an amazing fact: at any given time 30% of IP...

What We Learned at Secured Cities Conference

It was fascinating to hear a Viakoo “Black Belt” customer present his view of how the service...