Guide (297)

Displaying 'Guide' tags 1 - 25 of 297 in total

Open Access Controller Guide (Axis, HID, Isonas, Mercury)

(PRO Only)

In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently, Axis released a 3rd party-only controller and Isonas joined 'Openness' ranks, while HID purchased Me...

By Brian Rhodes - 1 day ago

Installation Course - Last Chance - Register Now

(PRO Only)

Last Chance - Register Now - September 2019 Video Surveillance Install Course. Thursday, September 12th is your last chance to register for the September 2019 Video Surveillance Installation Course. This is a unique installation course in a ma...

By John Scanlan - 8 days ago

Fingerprints for Access Control Guide

(PRO Only)

Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one of the most trusted credentials used for access. However, the biometric has limitations, often is ...

By Brian Rhodes - 11 days ago

Mobotix First CNPP CCTV Cybersecurity Certification Examined

(PRO Only)

Mobotix recently became the first video surveillance manufacturer to receive the CNPP cybsersecurity certification for its cameras, in which they originally declared a "guarantee of IT and electronic resistance to cyber-attacks." But who is CNP...

By Charles Rollet - 15 days ago

Register Now - October 2019 IP Networking Course

Register now for the Fall 2019 IP Networking Course. This is the only networking course designed specifically for video surveillance professionals. Lots of network training exists but none of it really explains how it relates to actual video s...

By John Scanlan - 23 days ago

Mobile Access Control Guide

(PRO Only)

One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this work? Based on our mobile access control shootout, in this guide, we examine: BLE vs NFC vs Apps comparison...

By Brian Rhodes - 23 days ago

UK Facewatch GDPR Compliance Questioned

Even as the GDPR strictly regulates biometrics, a UK company called Facewatch is selling anti-shoplifter facial recognition systems to hundreds of retailers. Facewatch even keeps a database of suspects, only deleting profiles after two years "if y...

By IPVM Team - 24 days ago

Biometrics Usage Statistics 2019

(PRO Only)

Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics, when, and why. Inside this report, we examine the trends and the key reasons for and against them.

By Brian Rhodes - about 1 month ago

Milestone "GDPR-ready" Certification Claim Critiqued

(PRO Only)

Milestone is touting that its latest XProtect VMS is "GDPR-ready" with a 'European Privacy Seal'. However, our investigation raises significant concerns over the applicability and suitability of this. In this post, we examine Milestone's "GDPR ...

By Charles Rollet - about 1 month ago

Responsibility Split Selecting Locks - Statistics

(PRO Only)

A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often struggle getting locks to work when others supply them. So we asked integrators 'What percentage of you...

By Brian Rhodes - 2 months ago

History of Video Surveillance

The video surveillance market has changed significantly since 2000, going from VCRs to ab emerging AI cloud era.  The goal of this history is to help professionals newer to the industry understand the important business and technology shifts th...

By John Honovich - 2 months ago

New GDPR Guidelines for Video Surveillance Examined

(PRO Only)

The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in effect for more than a year, how it applies to video surveillance has often been unclear, as we explaine...

By Charles Rollet - 2 months ago

HD Analog vs IP Guide

(PRO Only)

For years, HD resolution and single cable signal/power were IP camera advantages, with analog cameras limited to much lower resolution and requiring separate power and video cables. However, in new HD analog cameras, AHD, CVI, and TVI have made si...

By IPVM Team - 2 months ago

Lens Focal Length Tutorial

(PRO Only)

3mm, 6mm, 2.8 - 9mm, 5 - 50mm, etc. Camera specifications often list lens lengths but what do they mean? These metrics are important in determining the correct camera coverage and Field of View (FoV). In this tutorial, we look at: What lens...

By IPVM Team - 2 months ago

Poor OSDP Usage Statistics 2019

(PRO Only)

OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even in new readers, is extremely low. Inside this report, we examine the trends and the key reasons ...

By Brian Rhodes - 2 months ago

First Video Surveillance GDPR Fine In France

(PRO Only)

The French government has imposed a sizeable fine on a small business for violating the GDPR after it constantly filmed employees without informing them and kept poor encryption practices. It marks the first ever GDPR video surveillance fine ever ...

By Charles Rollet - 2 months ago

2019 Mid-Year Video Surveillance Guide

(PRO Only)

IPVM's new 400+ page Mid-Year Industry Guide brings all of these issues and events together in a single resource to read and review. It can be requested inside. All chapters come from reports published on IPVM. Below is a list of those reports,...

By IPVM Team - 3 months ago

Farpointe Data Conekt Mobile Access Reader Tested

(PRO Only)

California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX, Keri, and Sielox, and recently announced mobile credentials and readers. So how well does the produ...

By Brian Rhodes - 3 months ago

Manufacturer Favorability Guide 2019

(PRO Only)

The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual manufacturer favorability coverage. Download the 2019 Security Manufacturer Favorability Guide PDF Note...

By IPVM Team - 3 months ago

OSDP Access Control Guide

(PRO Only)

Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major problems of Wiegand. In particular, OSDP's benefits: Bidirectional Communication, Including reader...

By Brian Rhodes - 4 months ago

China Jaywalking Facial Recognition Guide

(PRO Only)

News reports touting the PRC's AI prowess often showcase facial recognition cameras being used to automatically catch and fine jaywalkers. In this report, we explain how the technology works and examine how common/effective the systems actuall...

By Charles Rollet - 4 months ago

Average Frame Rate Video Surveillance 2019

(PRO Only)

What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in our 2016 statistics. Now, in 2019, the average has increased significantly to 15fps. Inside this repo...

By IPVM Team - 4 months ago

Access Control Job Walk Guide

(PRO Only)

Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting interested parties onsite for pre-bid job walks, many of the site conditions inadequately described in...

By Brian Rhodes - 4 months ago

Maglock Selection Guide

(PRO Only)

One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround their proper use. Many access control designers avoid using them altogether, but should they? In ...

By Brian Rhodes - 4 months ago

Subnetting for Video Surveillance

(PRO Only)

This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range, borrowing bits, and the role of the subnet mask. Inside this report we provide information on: Ho...

By John Scanlan - 5 months ago

Displaying 'Guide' tags 1 - 25 of 297 in total