Follow Orion Security Solutions on Facebook Follow OrionSSolutions on Twitter Orion Security Solutions on LinkedIn Orion Security Solutions on YouTube
Blog posts tagged in intrusion detection
26
Jan

Security Integrators: Not All Created Equal

Posted by on

Many people often hear about a company being referred to as a security integrator or security integration company. In my experience, that means different things to people depending on their backgrounds and former involvement with the technical security industry. Security integrators come in various sizes and often have different areas of expertise. The important thing to realize is that not all security integrators are created equal so each customer should research and carefully analyze the expertise of each security integration firm they are considering for specific projects.

Continue reading
Read: 10960
Rate this blog entry:
0
04
Aug

Intrusion Detection Systems

Posted by on

Intrusion detection systems, also called alarm systems, are a tremendous technical security asset. Like most technical security systems, intrusion detection systems are designed to either function as standalone systems or as part of a comprehensive security solution consisting of several security systems. Intrusion detection systems are a basic component of most security designs and provide many key attributes to a security solution.

Continue reading
Read: 19379
Rate this blog entry:
0
09
Jun

New Security Technologies

Posted by on

New security technologies over the years have greatly impacted different aspects of security solutions such as the image quality that can be captured and recorded by surveillance systems, accuracy and reliability of intrusion detection systems, validation and authorization methodologies used by access control systems and many other security solution features. These new security technologies tremendously influence security system designs across all industries. As new security technology emerges, it is critical that the security consultants, integrators, and end users understand the technology's attributes to properly incorporate new security technology into their solutions.

Continue reading
Read: 11100
Rate this blog entry: