Guide (306)

Displaying 'Guide' tags 1 - 25 of 306 in total

Camera Field of View (FoV) Guide

(PRO Only)

Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem self-explanatory. However, when analyzing images, comparing cameras or projecting quality, subtletie...

By IPVM Team - about 14 hours ago

Wireless / WiFi Access Lock Guide

(PRO Only)

For some access openings, running wires can add thousands in cost, and wireless alternatives that avoid it becomes appealing. But using wireless and WiFi locks can have drawbacks over hardwired alternatives. In this guide, we examine key aspec...

By Brian Rhodes - 1 day ago

Biggest Low Light Problems 2019

(PRO Only)

Over 150 integrators responded to our survey question: "What are the biggest problems you face getting good low-light images?" Inside, we share integrators' comments and analyze the most common problems, including: Limited IR Range Uneven I...

By Ethan Ace - 6 days ago

Tailgating: Access Control Tutorial

(PRO Only)

Nearly all access control systems are vulnerable to an easy exploit called 'tailgating'. Indeed, a friendly gesture in holding doors for others often compromises access security. In this note, we take a look at 'tailgating', the most common cau...

By Brian Rhodes - 14 days ago

Lock Status Monitoring Tutorial

(PRO Only)

Just because access doors are closed does not mean they are locked. Unless access systems are using lock status monitoring, the doors and areas they protect could be left insecure. How can you tell when doors are locked? Lock status monitoring...

By Brian Rhodes - 17 days ago

Covert Elevator Face Recognition

(PRO Only)

Covert elevator facial recognition has the potential to solve the cost and complexity of elevator surveillance while engendering immense privacy concerns. This month, in Caixin China's reporting, this issue blew up as reports of such a deployme...

By John Honovich and Charles Rollet - 21 days ago

Access Control Door Controllers Guide

(PRO Only)

Door controllers are at the center of physical access control systems connecting software, readers, and locks. Despite being buried inside enclosures or hidden inside ceilings, they are a complex component that ties everything else together. ...

By Brian Rhodes - 23 days ago

Securing Access Control Installations Tutorial

(PRO Only)

The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be circumvented or shut down by an adversary. In most cases, if done correctly, adding layers of securi...

By Brian Rhodes - 28 days ago

IPVM Camera Calculator User Manual / Guide

Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The guide below includes instructions, images, gifs, and videos demonstrating and explaining the Calculator's features. It will be updated periodically and you can ask question...

By IPVM Team - 29 days ago

Camera Focusing Tutorial

(PRO Only)

Camera focus is fundamental to quality imaging. Mistakes can significantly reduce details, making cameras less effective. In this guide, we explain focus issues and proper procedure, covering: Fixed vs. Varifocal Cameras Auto vs. Manual Foc...

By IPVM Team - about 1 month ago

Last Chance - Register Now - October 2019 IP Networking Course

Last Chance - Register Now - Fall 2019 IP Networking Course. The course starts next week. This is the only networking course designed specifically for video surveillance professionals. Lots of network training exists but none of it really expl...

By John Scanlan - about 1 month ago

Camera Cable Whip Guide

(PRO Only)

Cable whips are one of integrator's least favorite camera features but seem to be unavoidable, now commonplace on dome, turret, and bullet cameras from low end to high. In this report we look at the four key reasons cable whips are so disliked ...

By John Scanlan - about 1 month ago

Wide Dynamic Range (WDR) Guide

(PRO Only)

Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any manufacturer can claim WDR, and many do even if actual performance is weak, causing confusion for eve...

By Ethan Ace - about 1 month ago

Access Control Mustering Guide

(PRO Only)

In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for reporting employee locations, also called 'mustering'. In this guide, we examine the strengths, weakn...

By Brian Rhodes - about 1 month ago

Access Control Mantraps Guide

(PRO Only)

One of access's primary goals is keeping people out of places they should not be, but slipping through open doors (ie: Tailgating) is often easy. For high security locations, strict access controls often require the physical opening itself to h...

By Brian Rhodes - about 2 months ago

Access Control Time & Attendance Guide

(PRO Only)

Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees too. In this guide, we examine how access can also be used for 'Time & Attendance' including: How ...

By Brian Rhodes - about 2 months ago

Open Access Controller Guide (Axis, HID, Isonas, Mercury)

(PRO Only)

In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently, Axis released a 3rd party-only controller and Isonas joined 'Openness' ranks, while HID purchased Me...

By Brian Rhodes - about 2 months ago

Installation Course - Last Chance - Register Now

(PRO Only)

Last Chance - Register Now - September 2019 Video Surveillance Install Course. Thursday, September 12th is your last chance to register for the September 2019 Video Surveillance Installation Course. This is a unique installation course in a ma...

By John Scanlan - 2 months ago

Fingerprints for Access Control Guide

(PRO Only)

Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one of the most trusted credentials used for access. However, the biometric has limitations, often is ...

By Brian Rhodes - 2 months ago

Mobotix First CNPP CCTV Cybersecurity Certification Examined

(PRO Only)

Mobotix recently became the first video surveillance manufacturer to receive the CNPP cybsersecurity certification for its cameras, in which they originally declared a "guarantee of IT and electronic resistance to cyber-attacks." But who is CNP...

By Charles Rollet - 2 months ago

Mobile Access Control Guide

(PRO Only)

One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this work? Based on our mobile access control shootout, in this guide, we examine: BLE vs NFC vs Apps comparison...

By Brian Rhodes - 3 months ago

UK Facewatch GDPR Compliance Questioned

Even as the GDPR strictly regulates biometrics, a UK company called Facewatch is selling anti-shoplifter facial recognition systems to hundreds of retailers. Facewatch even keeps a database of suspects, only deleting profiles after two years "if y...

By IPVM Team - 3 months ago

Biometrics Usage Statistics 2019

(PRO Only)

Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics, when, and why. Inside this report, we examine the trends and the key reasons for and against them.

By Brian Rhodes - 3 months ago

Milestone "GDPR-ready" Certification Claim Critiqued

(PRO Only)

Milestone is touting that its latest XProtect VMS is "GDPR-ready" with a 'European Privacy Seal'. However, our investigation raises significant concerns over the applicability and suitability of this. In this post, we examine Milestone's "GDPR ...

By Charles Rollet - 3 months ago

Displaying 'Guide' tags 1 - 25 of 306 in total