Using Your Phone for Mobile LPR

License plate recognition technology has been around for years. Fixed and mobile LPR cameras paved the way for departments to widely utilize the technology. But what if we told you that rather than using expensive LPR cameras, you could use a mobile device? In previous blogs, we’ve shared how our LPR partner Rekor flipped the…

Read More

MDTs, Body-worn & In-car Video: A Budget-Conscious Journey to Technology

|

Challenge A $10,000 grant in 2007 was life-changing for Christiana Borough’s three-car police department. An opportunity to modernize the department’s technology unknowingly turned into a decades-long relationship with Brite for ongoing support, expertise and new technology projects. A True Partnership Similar to other small police departments, Christiana Borough’s Chief Richard Finfrock has always used resourceful…

Read More

How to Estimate a Body-Worn Camera Program Cost

When exploring a body-worn camera program, there’s a checklist of factors that help decide which system is right for your department. And to be blunt, one critical factor in selecting a body-worn camera is the cost. This guide outlines how to approach the selection process while being budget-conscious so you can maximize every dollar without…

Read More

Why Do SIEM Tools Fail? Four Reasons Why

Graphic for "Why do SIEM tools fail?" blog

Security Information and Event Management (SIEM) – a staple in security strategies. For years, SIEM tools have been on a pedestal as the solution for real-time analysis of security alerts and monitoring of environments. But as XDR (nicknamed NextGen SIEM) platforms are on the rise as a more complete solution, we want to dive into…

Read More

How To Build a Customized Cybersecurity Playbook

Would Tom Brady go into a Super Bowl without a playbook? Having a cybersecurity playbook is no different. In a truly proactive security approach, it outlines how to handle various security situations around a specific environment. Due to the custom nature of playbooks, creating and building one should be one of the first steps when…

Read More

Body-Worn Camera Mounts and Clips for GVS BC-03

Getac BC-03 Clips and Mounts|||Getac Video Bodyworn Camera Molle Mount|Getac Video Bodyworn Camera Magnetic Mount|Getac Video Bodyworn Camera Pocket Clip|Getac Video Bodyworn Camera Pocket Clip|Getac Video Bodyworn Camera Alligator Clip|Getac Video Bodyworn Camera Alligator Clip|Getac Video Bodyworn Camera Molle Mount

[vc_row][vc_column][vc_column_text]Often compared to a deck of cards, body-worn cameras are small, portable and discreet enough to not interfere with duties, but how do you wear a body-worn camera? There are various mounting and clip options allowing officers to choose how to wear one comfortably without jeopardizing recording. With Getac Video Solutions’ newest BWC on the…

Read More

A Guide to Firewall Management

A guide to firewall management

Picture it. In the late 1980s, we were given the Motorola cell phone, The Simpsons, Seinfeld, the Gameboy and Firewalls. While we would love to talk about The Simpsons predicting major events, let’s talk about how firewalls continue to be a tried-and-true piece in every cybersecurity toolset and the keys to firewall management in 2021.…

Read More

What is FirstNet® MegaRange™?

[vc_row][vc_column][vc_column_text]FirstNet originally transformed communications with its private network for first responders and public safety. Now, with its most recent solution, FirstNet MegaRange, it’s enhancing and expanding the power of the FirstNet network. What is FirstNet MegaRange? FirstNet MegaRange improves connectivity and throughput of any FirstNet data services to cellular towers. In other words, it strengthens the…

Read More

The Right Solution for Your Fleet

Whether it’s a refresh or equipping new vehicles, outfitting an entire fleet isn’t always easy. Between product options, safety, technology advancements, budgets, RFPs, contracts, and timing, the buying process can be overwhelming and long.   From our 20 years of public safety experience, we have put together a quick cheat sheet of things to consider in the…

Read More

SIEM vs XDR vs Open XDR

SIEM vs XDR vs Open XDR

A new cybersecurity acronym has entered the chat. XDR, or Extended Detection and Response, is the latest security technology and method for threat detection. Best summarized as a “NextGen SIEM”, XDR is redefining the process of collecting, normalizing and correlating security data from multiple sources and leveraging security tools to automate immediate response. Because SIEM…

Read More