24/7 Operations Center: (860) 800-6681

Thank You

Check your e-mail for the Top 5 questions

Request For Proposal (RFP): Your Mistakes And How To Fix Them

Many are familiar with the Request for Proposal or RFP. This involves a client that publicly seeks for a solution and makes everyone know their request. It includes the creation of a document that enumerates what they are trying to obtain, the management of the response, and the determination of the best solution. Individuals who work in a government agency or a technical product are familiar with RFP. In addition to that, other industries and products also utilize RFP. Major purchases must adhere to a set of checks and balances. Thus, it is required to have an RFP process. However, there are cases when the whole process defeats its purpose as being meticulous might result to missing the main goal.   Creating an RFP has its own set of obstacles. The question is if a group can conquer these problems and obtain the best solution for a specific situation. Here are the problems.   Proposal Versus Quote RFP, as the name implies, means proposal. It asks on what can an institution or individual help to solve a problem. One of the main challenges of an RFP is that they are utilized to purchase something instead of asking for solutions. It is a common mistake for companies to use an RFP when they already know what to buy and just need a quote. It is a senseless practice to use an RFP when what you really need is a Request for Quote (RFQ). An RFP’s purpose is to verbalize one’s needs and to obtain proposals from the target market on how one can solve it the best way. It is... read more

Leveraging Automation to Improve Your Security System

According to research firm HIS Markit, it is estimated that around one third of the 62 million cameras installed in North America are network surveillance cameras. The firm further posits that majority of new security devices manufactured and sold these days are IP-based, including access control readers, panels, door locks, and even fire detectors.   The IP-based devices are popular because they do bring significant benefits compared to legacy hardware. However, they do have a downside – they are also vulnerable to an increasing number of threats.   Being Internet-capable gives malicious individuals a vector for attack, as opposed to traditional devices that are inaccessible except for people who are on-site. The Wall street Journal and some mainstream news outlets have caught wind of massive DDoS attacks that strangely use hijacked cameras and recorders as part of botnets, and there are also cases of hackers taking control of internet-capable nanny cams and using it to spy on people’s private lives.   These breaches serve as a wake up call to the industry, and should never be taken for granted. If you or your internal staff are determined to secure your video surveillance system against security breaches, here are some vulnerabilities that you should watch out for:   Inherent Vulnerabilities   Most IP-based security systems have vulnerabilities that stem not from mistakes, but are inherent in the structure of the systems. These include:   Physical Exposure of Access Ports – installation of these devices should be done with awareness that they need to be positioned in such a way that physical network ports are inaccessible or would require effort to... read more