Some people see security system, some see attack surface

    [fa icon="calendar'] Jul 10, 2017 5:22:47 PM / by John Gallagher

    [fa icon="comment"] 0 Comments

    On a Tuesday morning in 2001, it became very clear that many of our fundamental perceptions about how to conduct business would have to change, especially with regard to security. Since that day the development of new security technologies has accelerated at a rapid pace along with our expectations that people, property and assets will be protected.   Lagging behind that added protection is the security of the security systems themselves; more than ever they offer cyber-criminals opportunities to compromise an organization. 

    Read More [fa icon="long-arrow-right"]

    Verification and Diagnostic Solutions Create New Business Opportunities for Integrators

    [fa icon="calendar'] Jun 29, 2017 3:53:23 PM / by John Gallagher

    [fa icon="comment"] 0 Comments

    Security integrators looking to grow their recurring monthly revenue (RMR) can achieve this with solutions to automatically verify and diagnose failures in physical security systems. Such solutions are already providing new avenues of business growth and profitability for many integrators.

    Read More [fa icon="long-arrow-right"]

    Data Governance and Physical Security

    [fa icon="calendar'] Jun 28, 2017 8:37:39 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    Data protection has been in the news a lot recently; not only the issues around hacking and malware, but perhaps more importantly on the issues of how data is handled within (and across) organizations. In 2018 the EU will have the General Data Protection Regulation (GDPR) go into effect, covering millions of people’s personal information. As shown in this chart from DLA Piper, much of the world today is covered by either “heavy” or “robust” data protection. To pull one number out of many to make the point, the State of California alone has over 25 data privacy and governance laws.

    Read More [fa icon="long-arrow-right"]

    Rethinking Service Models to Generate New Sources of RMR

    [fa icon="calendar'] Jun 9, 2017 3:36:36 PM / by John Gallagher

    [fa icon="comment"] 0 Comments

    RMR is the new lifeblood for security integration companies. Adding services to an equipment or system installation ensures consistent, predictable income well beyond the hardware’s deployment.

    Read More [fa icon="long-arrow-right"]

    Isn’t It Time to Stop Console Madness?

    [fa icon="calendar'] May 3, 2017 8:34:21 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    Even if you’ve never played “Whack-A-Mole” you’ve probably heard it used as a metaphor for a repetitious and futile task.  In maintaining and servicing physical security systems there are a number of manual operations that fall in that category that are better done with automation; checking that default passwords aren’t being used, verifying operational status across multiple sites and/or device vendors, and maintaining an inventory of devices on the physical security network just to name a few.  Since there are more than one “Whack-A-Mole” situations our industry deals with I’ll be more specific – the topic of this blog is a situation Viakoo calls “Console Madness”.  If you want to stop reading and just see our new infographic on Console Madness please click here – otherwise continue on to see the Madness I’m referring to.

    Read More [fa icon="long-arrow-right"]

    Viakoo Showcases OnPremises Automated Data Verification Solution for Surveillance and Access at ISC West

    [fa icon="calendar'] Apr 4, 2017 1:51:12 PM / by Viakoo posted in Press Releases

    [fa icon="comment"] 0 Comments

    Designed for Deployment Onsite within an Organization’s Firewall

    Read More [fa icon="long-arrow-right"]

    New Password Checker IP Camera Vulnerability Solution Introduced by Viakoo at ISC West

    [fa icon="calendar'] Apr 4, 2017 1:49:54 PM / by Viakoo posted in Press Releases

    [fa icon="comment"] 0 Comments

    Beta Tester Privileges Offered to Select Organizations

    Read More [fa icon="long-arrow-right"]

    Solving Compliance Challenges with Automation

    [fa icon="calendar'] Mar 29, 2017 3:05:38 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    Fact: Organizations across many industries are subject to government and other regulations and must demonstrate physical security compliance on a regular basis.

    Read More [fa icon="long-arrow-right"]

    Tradeoffs That Should Never Impact Security: Cloud vs. On-Premises

    [fa icon="calendar'] Mar 7, 2017 3:44:17 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    Every organization has differences in how they accomplish their job, which can be thought of as tradeoffs. Restaurant A might choose to open early for breakfast, trading off the additional employee expenses for ability to gain higher revenues and profits. Restaurant B, considering whether to serve breakfast may decide against it because while it might be profitable it goes against their brand image as the “dinner” place. No one would accuse either restaurant of a bad decision, just a difference in how they decide to run their business and the tradeoffs they make.

    Read More [fa icon="long-arrow-right"]

    Viakoo OnPremises Delivers Automated Surveillance and Access Data Verification within the Firewall

    [fa icon="calendar'] Mar 6, 2017 4:47:22 PM / by Viakoo posted in Press Releases

    [fa icon="comment"] 0 Comments

    Expands Options for Companies to Enable Proactive Service

    Read More [fa icon="long-arrow-right"]