Maglock Selection Guide
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range,...
This report requires an IPVM Research Service subscription. Learn more.
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
This report requires an IPVM Research Service subscription. Learn more.
By Ethan Ace, John Honovich, and Rob Kilpatrick - about 5 years ago
Outdoor camera installation can be fraught with problems. Creating a sturdy and weather tight mount is key for camera performance and longevity,...
How do integrators ensure the profitability of their projects? As part of our profitability study, 100+ integrators answered the following...
It is often necessary to suspend a camera from a high open ceiling. This is commonplace in retail, warehouse, industrial sites, hangars, and other...
Installing cables through firewalls is a critical installation issue. Failing to properly seal a penetration can cause smoke and fire to spread,...
Mounting cameras outdoors can be challenging, requiring understanding different types of equipment and methods. In this guide, we teach this...
This report requires an IPVM Research Service subscription. Learn more.
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stopping...
This report requires an IPVM Research Service subscription. Learn more.
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
This report requires an IPVM Research Service subscription. Learn more.
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
By Brian Rhodes - over 5 years ago
Inaccurate time can lead to missing or inadmissible video, yet this topic is often overlooked, with cameras and servers left defaulted,...
By IPVM Team - over 5 years ago
The arrival of the GDPR on May 25, 2018, brought fears the law would spark a massive increase in privacy complaints about security camera use....
Each year, IPVM summarizes the main advances and changes for video surveillance cameras, based on our industry-leading testing and...
By IPVM Team - over 5 years ago
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
HID is widely used. However, figuring out all the different configurations of features for a final credential or reader part number can be a real...
Axis is bad at marketing. Recall last month - Axis: "No One Wants To Buy A Camera" and, more generally their 2018 production introductions. But...
By John Honovich - over 5 years ago
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
By IPVM Team - over 5 years ago
Back to Top