securitylinkindia

Gallagher Recognised for Innovation with Adaptive Thresholds Feature

Gallagher’s innovative Adaptive Thresholds Feature took home the Outstanding New Product of the Year award at the New Zealand Security Awards on 22 September. Developed to help customers operating in harsh environments, this highly intelligent feature enables sites to adapt dynamically to environmental changes, minimising false alarms whilst maximising the detection capabilities of Monitored Pulse Fences. Adaptive Thresholds allows a fence controller to dynamically adapt to the local conditions. It achieves this by adapting the alarm threshold at a percentage of the return voltage, so that when a gradual voltage drop occurs due to environmental conditions, the threshold will adapt with it so that it will not trigger an alarm. “The New Zealand Security Awards recognise excellence and outstanding service delivery provided by those who work within the security industry. We’re honoured to receive this award, which recognises that this feature solves real problems and adds significant value to businesses. We’re equally as thrilled to see our Channel Partners recognised for their hard work too” Brad Small Regional Manager, New Zealand & Pacific Islands “We’re so thrilled to see Adaptive Thresholds recognised by the New Zealand Security Association. This feature truly represents Gallagher’s ability to create innovative solutions to genuine security challenges,” said Dave Solly, Product Manager for Perimeter at Gallagher, “Businesses do not want to constantly respond to false alarms that are meaningless, as it costs money and can cause alarm fatigue – running the risk of operators not responding to real alarms when they should.” Gallagher has customers in more than 130 countries around the world, many of whom operate in some of the harshest environments. One example is a perimeter customer with a desalination and power plant in the Middle East, which is extremely close to the coastline. “This feature was developed in response to a site in the Middle East that was receiving regular false alarms due to current leakage. Due to the location of this site, the salt build-up on the fence line mixed with the high levels of humidity making insulating surfaces conductive, which leads to a loss of voltage on the monitored pulse fence, creating a false alarm. “Adaptive Thresholds is designed to seamlessly adapt to changing environmental conditions – allowing a site to change from a fixed alarm threshold to a dynamic threshold,” said Solly. Gallagher continuously assesses the market and responds to the needs of customers. Adaptive Thresholds is one example of how Gallagher is helping correctional facilities, critical infrastructure, and other high-risk sites, minimise environmental factors that impact the performance of their essential perimeter security, while remaining as sensitive as possible to tampering on the fence line. Understanding just how critical this feature is for organisations around the world, Gallagher has made Adaptive Thresholds available in Command Centre from version 8.40 onwards.  

Read More

Expand use of INTERPOL to Address Global Crime Threats – G7 Ministers

G7 Interior and Security Ministers have called for expanding the use of INTERPOL to respond to global crime threats and terrorism through increased sharing of information, expertise and operational support. During discussions on the current situation in Afghanistan, the importance of data sharing and having the right capabilities and processes to identify terrorists travelling into, or out of, the country were identified as priority areas. With more than 4,200 INTERPOL alerts related to subjects with either direct or indirect links to Afghanistan, as well as details of some 60,000 profiles of foreign terrorist fighters, Secretary General Jürgen Stock underlined the need to make this information as widely available as possible. Fingerprint match An example of this was the identification and arrest of an irregular migrant at the Schengen border in September 2020 after checks against INTERPOL’s databases revealed a fingerprint match to an improvised explosive device recovered years before in Afghanistan. Given this success, Secretary General Stock welcomed the G7 Ministers’ recognition of the need to increase the provision of biometric data particularly DNA and fingerprint information, where appropriate, as well as contributions to INTERPOL’s Crime Analysis Files. INTERPOL Secretary General Jürgen Stock said, “We can do more, and with the right support we will do more, because the global threat requires it. “Intelligence flows should mirror an increasingly interconnected world, which is why we must avoid creating regional silos or duplication of processes which prevent global information fusion. “A fully integrated global security architecture supported by INTERPOL can help more effectively address crime threats such as terrorists attempting to cross borders, child abusers exploiting their victims, or ransomware attacks against critical infrastructure.” “The leadership shown by the UK and especially the Home Secretary during this G7 Ministers meeting has provided a strong platform for real action, and I look forward to further strengthening our relationship to achieve positive results,” concluded Secretary General Stock. Identifying child abuse victims Reflecting the Ministerial support for INTERPOL, the ‘London Interior Commitments’ issued at the end of the meeting also identified the need to coordinate funding for INTERPOL’s core capabilities. Additionally, Ministers committed to the active promotion and use of the International Child Sexual Exploitation (ICSE) database. On average, the ICSE database helps identify seven child abuse victims every day, and in total has assisted in the identification of more than 26,000 victims worldwide, and more than 12,000 offenders. Tackling money laundering and illicit finance, which along with corruption, was also highlighted in the London Interior Commitments as a crucial element in disrupting serious and organized crime networks, an increasing priority through the COVID-19 pandemic. INTERPOL’s work with the International Anti-Corruption Coordination Centre in London facilitates secure operational communications. To date, nearly 1,600 INTERPOL alerts have been issued by 99 countries against suspects involved in alleged corruption and bribery offences. In this respect, the G7 Ministerial support for strengthening INTERPOL’s mechanisms to maintain the integrity of its system of notices and diffusions was also welcomed by Secretary General Stock.  

Read More

How to Choose a PoE Switch

But when choosing a PoE switch, you’ll want to consider things like your expected organizational growth and device use so you can be sure to select the right switch. In this article, we’ll share the most essential considerations to help you choose the right PoE switch. If you’re new to PoE, you’ll want to read our review of PoE technology. If you’re an Integrator or Network Administrator, you’ll want to jump down to the section on choosing a PoE Switch. A Review of PoE Technology Power over ethernet (PoE) enables wired Ethernet cables to carry electrical current and operate network appliances and devices. Unshielded twisted pair (UTP) cabling, such as Category 5 cable, is typically used to deliver direct current power. PoE eliminates the need to use power cords, power supplies, and outlets. By 1999, PoE was standardized to certify uniform operations for powered network hardware and appliances on ethernet connectivity. Since then, PoE standards have advanced, resulting in interoperability with network appliances and devices not supported by PoE, increased power for network appliances and devices, and improvements to the standard Category 5 cable to deliver increased power. Thirty-watt PoE, referred to as IEEE802.3af or PoE+ PoE, was designed to support a wide variety of network appliances and devices. The current and maximum PoE devices have a power rating of 90 watts, also referred to as IEEE802.3bt Type 4 or PoE++. A 90-watt Type 4 PoE++ can power network appliances and devices such as motion sensors, security video cameras and monitors, and even refrigerators. Category 5 network cable is the minimum requirement for Type 3 and 4 PoE. Improved cabling requirements, including Category 8 network cables, are available and interoperable with both Type 3 and Type 4 PoE. PoE products include copper to fiber optic media converters, fiber optic media converters, and Ethernet switches. PoE media converters make it possible to interconnect systems using copper-based cables and systems using fiber optic cables or allow fiber-to-fiber conversion. PoE switches group digital data – including raw data or payload, metadata such as an IP address, and routing information – together in a packet and transfers them to designated destinations. Choosing a PoE Switch Advanced planning for organizational growth and device uses is important when choosing the right PoE switch. Important factors to evaluate before choosing a PoE switch include the existing network system and bandwidth, existing network appliances and IoT, locations of network appliances and fringe devices and IoT, the facility’s power configurations, and desired upgrades and additions to the network system. These factors will determine the PoE switch type and device requirements such as data rate, power consumption, port density, benefits of managed and unmanaged switches, and the need for converters/ fiber optic transmission for longer distances and increased bandwidth. Data rate The existing network speed or anticipated network speed upgrade is important in determining the right PoE switch. Standard Ethernet network speeds (10 Base T networks), fast Ethernet (10 Base T and 100 Base T networks), gigabit Ethernet (1000 Base T networks), and greater (1/10G) are all supported with specific PoE switches. Power consumption The total power consumption of all powered network appliances and devices should be within the operational capacity of PoE switches, including the power consumed by the PoE switch. Depending on the number of ports and type of PoE switch, all powered network appliances and devices should be simultaneously connected and powered. The right PoE switch can provide uninterrupted data transmission without power or signal loss. Power budget depletion and signal loss can be avoided by careful calculation of the power budget. ComNet’s PoE Power Supply Budget Calculation is available to help you calculate your power budget. Port density The size or potential growth of an organization’s network should help in anticipating port density. PoE switches commonly offer 8, 12, 16, 24, and 48 ports or more for Ethernet cabling and connectivity. PoE switches with 8 to 16 ports typically meet the requirements of small or home networks. PoE switches with 24, 48, or more ports can meet large and diverse network system needs of data centers, corporate organizations, and institutions. Managed or unmanaged PoE switches A managed switch allows for user configuration and includes switch management operations. Managed switches provide configuration and control over ports, bridges, and network protocols. An unmanaged switch comes pre-configured for plug and play operations and will automatically identify system operations and hardware components. An unmanaged switch does not require user configuration and typically cannot be modified. Both managed and unmanaged switches can incorporate PoE. However, users can modify the configuration of managed switches remotely, from a management console, or via network interface from a web browser with the advantage of PoE. Fiber optic transmission The maximum length and effectivity of UTP cabling is 100 meters. Fiber optic cabling allows for longer distance and greater bandwidth capacity over UTP cabling, with the use of PoE media converters. Fiber optic transmission bridges the distance and bandwidth requirements. PoE media converters convert fiber optic to copper transmission and send data over PoE UTP cabling to network appliances and devices. Need a little more help choosing PoE Switch? ComNet’s Design Center is here to support you with oneon-one technical pre-sale telephone assistance. The ComNet Design Center service is free for customers interested in using ComNet products in their designs. You can click here to connect with a Design Center representative- we’re here and ready to help. You can also see our full line of PoE Switches that can support your organization’s existing or planned network data rate by clicking the button below.  

Read More

A Smart Use for Doping

If someone sells you a luxury handbag from Paris, France, but it turns out be a forgery from Paris, Texas, the counterfeit item might cost you a thousand bucks and the crook could wind up in jail. But if a counterfeit electronic device gets installed in a car, it could cost passengers or the driver their lives. Without new security measures, the interconnected wireless technologies, digital electronics and micromechanical electronic systems that make up the Internet of Things are vulnerable to forgeries and tampering that could cause entire telecommunication networks to fail. In 2017, sales of counterfeit products of all sorts – from electronics to pharmaceuticals – amounted to an estimated $1.2 trillion worldwide. To help prevent counterfeit computer chips and other electronic devices from flooding the market, researchers at the National Institute of Standards and Technology (NIST) have demonstrated a method that could electronically authenticate products before they leave the factory. Implanting Atoms to Create a Unique Electrical ID To detect the presence of forged components in a system, you need a way of uniquely identifying and authenticating these components throughout the supply chain. To achieve this, NIST researchers have developed a new low-cost process for creating unique and non-duplicable ID tags by altering the electronic structure of silicon. These tags could be embedded into a device during the manufacturing process and easily authenticated by anyone receiving the device, ensuring a secure supply chain for components in critical systems. Credit: Sean Kelley/ NIST. The scientists employed a wellknown technique called doping, in which small clusters of ‘foreign’ atoms of a different element from those in the device to be labeled are implanted just beneath the surface. The implanted atoms alter the electrical properties of the topmost layer without harming it, creating a unique label that can be read by an electronic scanner. Using doping to create electronic tags for devices is not a new idea. However, the NIST technique, which uses the sharp tip of an atomic force microscope (AFM) probe to implant atoms, is simpler, less costly and requires less equipment than other doping techniques using lasers or a beam of ions, said NIST researcher Yaw Obeng. It is also less damaging than other methods. “We’re putting a sticker on every device, except that the sticker is electronic and no two are identical because in each case the amount and pattern of the dopant atoms is different,” said Obeng. To create the electronic ID, Obeng and his colleagues first deposited a 10-nanometer (billionth of a meter) film of dopant material – in this case aluminum atoms – about 10-centimeter-square silicon wafers that were then broken into postage-stamp-size fragments so that they could fit in the AFM. The team then used the needle-like tip of the AFM probe to push aluminium atoms a few nanometres into the silicon fragments. The diameter of the implanted regions was tiny, no larger than 200 nm. The implanted atoms alter the arrangement of silicon atoms just beneath the surface of the wafer. These silicon atoms, as well as those that reside throughout the wafer, are arranged in a repeating geometric pattern known as a lattice. Each silicon lattice acts like an electrical circuit with a certain impedance, the AC (alternating current) equivalent of resistance in a DC (direct current) circuit. When the implanted aluminium atoms were rapidly heated to about 600 degrees Celsius, a few of them acquired enough energy to replace some of the silicon in lattices just beneath the wafer’s surface. The random substitution altered the impedance of those lattices. Each dopant-modified lattice has a unique impedance depending on the amount and type of dopant. As a result, the lattice can serve as a distinctive electronic label – a nanometer-scale version of a QR code for the wafer, Obeng said. When a scanner directs a beam of radio waves at the device, the electrically altered lattices respond by emitting a unique radio frequency corresponding to their impedance. Counterfeit devices could be easily identified because they would not respond to the scanner in the same way. “This research is key because it offers a means to uniquely identify components by a secure, unalterable and inexpensive means,” said Jon Boyens, a researcher with NIST’s Computer Security Division who was not a co-author of the study. The study, which Obeng presented on Sept. 16 at the International Conference on IC Design and Technology in Dresden, Germany, builds upon earlier work by the same team. The new study refines the AFM method for inserting dopant atoms, so that the AFM probe can more precisely place the atoms in the silicon wafer. The higher precision will make it easier to test the electronic ID system under real-life conditions. Obeng and his collaborators, who include Joseph Kopanski of NIST and Jung-Joon Ahn of NIST and George Washington University in Washington, D.C., consider their technique a prototype that will need modification before it can be used in mass production. One possibility is to use the sharp probes of several AFMs working side by side so that the dopant material could be implanted in many devices at once. Another strategy would employ high-pressure rollers to rapidly push dopant atoms coating a computer chip or other device a few nanometres into the device. A pattern stencilled onto the rollers would ensure that the dopant atoms were implanted according to a precise blueprint. Rollers are widely used to smooth paper, textiles and plastics. Obeng presented the work on Sept. 16 at the International Conference on IC Design and Technology in Dresden, Germany.  

Read More

Hikvision Announces 2021 First Half-Year Financial Results

Hikvision, an IoT solution provider with video as its core competency, has announced its financial results for the first half of 2021. During the reporting period, Hikvision generated a revenue of RMB33.90 billion with a yearover-year (YoY) growth of 39.68%. Net profits attributable to shareholders of the listed company were RMB6.48 billion, reflecting a YoY growth of 40.17%. Hikvision’s revenue in overseas markets amounted to RMB9.47 billion, with a YoY increase of 25.53%. In the first half-year of 2021, Hikvision further expanded its investment in R&D, to RMB3.88 billion, which accounted for 11.44% of the revenue. Amid continuing uncertainties in the global environment, Hikvision remains focused on technological innovation and optimizing operations to maintain solid company development and value creation for its customers.  

Read More

ONVIF Releases Profile D for Access Control Peripherals

ONVIF®, the leading global standardization initiative for IP-based physical security products, has released Profile D, a new profile that addresses interfaces for access control peripheral devices, providing the market with an additional tool for building modern and secure IP-based integrated video and access control systems using ONVIF. Profile D is designed to provide ONVIF interoperability for peripheral devices such as locks, credential/ biometric readers, PIN pads, license plate recognition cameras, door phones, sensors and displays. These types of peripherals commonly require specific integrations between products from different vendors to be able to incorporate them into an access control management platform. “Users are increasingly looking to incorporate additional technologies into their access control systems for use in innovative ways such as bar code reading cameras for visitor management or video door stations for intercom applications,” said Patrik Björling, Chair of the ONVIF Profile D Working Group, “Profile D provides a standardized way to satisfy this demand for interoperability, which can in turn drive additional opportunities for more use cases for peripheral devices.” Using Profile D, a peripheral device such as a wireless lock or license plate recognition camera, can pass credential identifiers to a securely located Profile D conformant client such as an access control unit or management software. The client or controller, which stores access rules, schedules and credentials, can then take the access decision and send a command back to the peripheral device to grant or deny access, display a message or request additional input such as a PIN code. Having sensitive information on a separate controller in a secured area enhances security. Communications between the device and client are secured using ONVIF security protocols such as TLS. The Profile D specification enables a conformant client to configure a conformant device with the necessary data such as which door and access point the device is responsible for, as well as configure a list of allowed or blocked credential identifiers in a device that supports this capability. ONVIF Profile D complements Profile A and Profile C in enabling standardized communications in an IP-based electronic access control system. Profile D devices can also support video profiles such as Profile T and Profile M to enable an integrated video and access control system using ONVIF inter[1]faces. Such devices include a door phone that combines a reader and lock with audio/ video intercom, or an IP camera with a relay output connected to a lock that can be used by a guard to visually identify a visitor and remotely unlock the door. Founded in 2008, ONVIF is a leading and well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and more than 20,000 profile conformant products. In addition to Profile D, ONVIF offers Profile S for streaming video; Profile G for video recording and storage; Profile C for physical access control; Profile Q for improved out[1]of-the-box functionality, Profile A for broader access control configuration, Profile T for advanced video streaming, and Profile M for metadata and events for analytics applications. ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.  

Read More

4th Edition of Intersec Saudi Arabia Rescheduled to Return in 2022

Intersec Saudi Arabia, the Kingdom’s largest trade fair for security, safety, and fire protection, has been rescheduled to take place in September 2022, the show’s organiser announced. The 4th edition of the three-day event was originally set to run from 12-14 September 2021, however, the move to next year comes after the Kingdom’s international travel restrictions remain in place, impacting the ability to plan ahead for the show. Intersec Saudi Arabia is organised by Saudi-based Al-Harithy Company for Exhibitions (ACE) Group under licence from UAE-headquartered Messe Frankfurt Middle East, which organises Intersec, the world’s leading exhibition for security, safety and fire protection. Alexandria Robinson, Intersec Saudi Arabia’s Show Director, said, “We continue to remain in regular contact with our key stakeholders, trade associates, government partners, exhibitors and supporters of Intersec Saudi Arabia. “The decision to move the exhibition to 2022 is widely supported by the industry and the feedback we’ve received has indicated everyone is positive and excited about what the future holds. “We’re looking forward to delivering a fully booked Saudi show in 2022 that will deliver above and beyond what is expected of the Intersec brand.” “Saudi is the largest and fastest growing market for security, safety and fire protection in the Middle East, and Intersec Saudi Arabia 2022 will present the ideal platform for international and local exhibitors to re-connect and gain direct access to key players in this industry,” added Robinson. Intersec Saudi Arabia is supported by key government entities including the Saudi Ministry of Interior, Saudi Civil Defense, and the Saudi Standards, Metrology and Quality Organization (SASO), together with the industry at large. More than 120 exhibitors from 20 countries are expected to participate next year, while the customary wide range of value-added conferences covering much needed discussions and topics will also return. Long-term prospects for Saudi’s security, safety, and fire protection market look good after a pandemic-affected 2020; according to analysts 6W Research, the Kingdom’s market for video surveillance, access control, and intrusion detection, along with fire safety systems and equipment, is estimated to be worth US$906 million in 2021, a seven percent increase over the previous year (US$846.6 million). The market is set to grow at a compound annual growth rate of 6.3 percent over the next five years, and is estimated to reach US$1.2 billion in 2026.  

Read More

Axis Products Conform to ONVIF Profile M for Easier Integration of Metadata

Axis Communications announces that a selection of its cameras is now ONVIF Profile M conformant, enabling standardized streaming of metadata and event sending from edge-based analytics applications in a best-of-breed multi-vendor surveillance system. Conformance to Profile M enables easier integration of metadata and events with ONVIF Profile M conformant clients like video management software and services. Profile M conformant clients on the market would be able to query, filter and receive metadata to trigger automatic responses and effectively store and search for video content of interest. The initial list of Axis products with Profile M conformance supports the detection and classification of humans and vehicles from AXIS object analytics. The list will expand in the future to a wider range of devices and support a variety of metadata from Axis analytics applications. Profile M is the latest ONVIF profile that Axis products support. Other supported ONVIF profiles include Profiles A and C for access control devices, and Profiles G, S and T for video products. The addition of Profile M makes it easier for system integrators and end users to use Axis products with other ONVIF conformant clients in a wide range of applications for security and safety, operational efficiency and smart building management.  

Read More

Delta’s Single Shallow Foundation Bollard Gets M30 Rating

Delta Scientific announced the successful testing of its ASTM F2656-20 M30/ P1-certified model DSC633, a single shallow foundation bollard design that stops and destroys a 15,000 pound (6.804kg) test truck with -8.82 feet (-2.69m) of static penetration and -3.63 feet (-1.1m) of dynamic penetration. The simulated bomb load remained intact and contained on the truck bed. The test vehicle weighed 15,000 pounds (6,804kg) and was traveling over 30 miles per hour (48kpm). The truck was stopped and completely disabled. “The negative penetration levels recorded on this test continue to prove the stopping power of Delta’s barriers,” stated David Dickinson, CEO of Delta Scientific. The DSC633 bollard has a height of 44 inches (111 cm) and a diameter of 13.75 inches (35cm) with a cover. Delta’s bollards can be furnished with an array of decorative covers to enhance the look and match the aesthetics of the surrounding structures. These covers include stainless steel, powder coated aluminum and fiberglass with custom styling and painting also available. Lights, beacons and audible devices can also be added to the bollards for additional safety protocols. Delta has been manufacturing shallow foundation bollards and barricades 24 inches (60.96cm) or less for decades. Shallow foundation bollards are the perfect solution for sidewalks, campuses, parking structures and government/ corporate facility perimeters where underground utilities and space limitations pose a problem for traditional deep foundation bollards. Delta’s shallow foundation bollards are often used to protect building perimeters and sports stadiums as static arrays and used in conjunction with Delta’s active bollards and vehicle barricades at entrances and exits. Delta Scientific Corporation is the leading manufacturer of vehicle access control equipment with over 260,000 square feet of production facilities in Palmdale, Calif. Delta’s three product lines consist of high-security vehicle barricade systems, parking control equipment and guard booths. Delta Scientific has been engineering and manufacturing vehicle access control equipment since 1974 and sells its products worldwide.  

Read More

Long John Silver’s Implements ‘Network of the Future’ with Interface

Long John Silver’s, the largest quick-service seafood restaurant chain in the United States, has chosen Interface Security Systems, a leading managed service provider delivering business security, managed network, UCaaS and business intelligence solutions to distributed enterprises, to enhance network connectivity across 430 of its restaurants. To build this ‘network of the future,’ Long John Silver’s implemented Interface’s fully managed, restaurant-technology-in-a-box solution that includes prefabricated network equipment ready for SD-WAN expansion, wireless WAN backup and VoIP connectivity. In order to continue offering consistent and satisfactory customer service, the IT team at Long John Silver’s needed a reliable, high-speed network for their restaurants. Accompanied by a robust backup network, the system supports additional services like guest Wi-Fi, mobile devices and tablets for their staff. After a rigorous evaluation of managed services vendors, Long John Silver’s chose to partner with Interface. “Interface’s solution stood out as the most innovative and cost-effective option on the market,” said Brad Gardone, Vice President of Information Technology Services at Long John Silver’s, “The company’s restaurant-technology-in-box model came with preconfigured network cabinets and accessories outfitted specifically for Long John Silver’s, allowing for installation to occur with no disruption to restaurant operations. No other service provider offered us this model.” Interface helped Long John Silver’s completely replace the legacy switches and myriad connectivity solutions with a secure, scalable LAN and WAN with LTE failover, 24×7 remote monitoring, along with a business VoIP voice connectivity. Long John Silver’s was able to go live across 430 restaurants in a matter of a few months. With the new solution in place, restaurant staff was able to focus solely on the customer experience, rather than dealing with connectivity issues or outages. Not to mention, revenue leakages due to offline credit card transactions came down drastically and operational reports are now generated in real time, giving management better visibility on restaurant performance. When the pandemic hit and Long John Silver’s customers shifted their preferences to online ordering, the revamped network and VoIP solution bundle allowed the seafood chain to pivot to an online-order-first model. “During the pandemic, about 90 percent of the business shifted to online/ drive-through. While dine-ins will steadily make a comeback in the future, we are proud of what we accomplished with help from Interface,” said Gardone, “We now have a top-of-the-line network and voice solution that’s robust, scalable, secure and will become the foundation for everything we plan to build in the coming years.” The partnership between Long John Silver’s and Interface is just picking up steam. In addition to offering an expanded voice communication system to support remote teams and work from home employees, Interface will continue to play a key role in Long John Silver’s mission to maintain top-tier security and drive growth. Interface Security Systems is a leading managed services provider delivering business security, managed network, UCaaS and business intelligence solutions to distributed enterprises. They improve security, streamline connectivity, optimize operations, and reduce IT costs, maximizing ROI for the nation’s top brands.  

Read More