Security Technology | I/O Hub

Tags: Security Technology

Trusted Platform Module (TPM): Helping to Secure Industrial PCs

Trusted Platform Module (TPM): Helping to Secure Industrial PCs

There is no such thing as perfect security. Passwords can be cracked, users’ access information phished, and malicious software installed via email attachments and USB thumb drives. Security challenges are especially tough when working with industrial PCs (IPC), which often run unattended in publicly-accessible spaces like hospitals, shop floors and meeting venues. One way to […]

Read more
Regarding RAID: Risk and Reward

Regarding RAID: Risk and Reward

Redundant Array of Inexpensive Disks, or RAID, is a tried-and-true storage technology that teams multiple hard drives to provide enhanced performance, availability and redundancy in PC and server-based storage. RAID can be used to simultaneously write data to two or more disks, creating duplicate copies of information that protect against data loss and disruption should […]

Read more
ASIS 2015 Report: Taking Security on the Road

ASIS 2015 Report: Taking Security on the Road

How was the show? What’s the market looking for? Is our focus on rugged, in-vehicle Network Video Recorders justified?  These are just some of the questions I bombarded our Logic Supply security team with when they got back from ASIS International 2015 in Anaheim California last week. Once they had a moment to catch their […]

Read more
ASIS 2015 Day 2: Building Rugged Security Systems

ASIS 2015 Day 2: Building Rugged Security Systems

Every show floor is busy and bustling, but the amount of activity, lights and sounds at ASIS 2015 can not be overstated. When you’re surrounded by physical security vendors there’s a screen showing a video feed, an alarm buzzing or a series of lights blinking around every corner. ASIS is truly an assault on the […]

Read more