Immix CC Blog

The Evolution of the Security Command Center

By | 0 Comments No Comments

Change will never be this slow again.

Read More

A New Look for SureView

By | 0 Comments No Comments

You have probably noticed that we have changed our logo and corporate branding. We recently split our business into two unique organizations: our Central Station…

Read More

Resilience: Scaling and Tiers

By | 0 Comments No Comments

Scalability is the property of a system to handle a growing amount of work by adding resources to the system.

Read More

Operational Resilience: Using Routing Groups to Automate Response SLAs

By | 0 Comments No Comments

In any team there are individuals with specific tasks—wide receiver, goalie, catcher, and so on. The same can apply to your security team. If your organization is large…

Read More

SureView: Now One Name Says it All

By | 0 Comments No Comments

Security Response Software Evolved

Read More

Operational Resilience: Sharing and Collaboration

By | 0 Comments No Comments

Not all security events are dramatic or large scale. Let’s take something as simple as an elevator entrapment. Usually, all that happens is that an operator calls…

Read More

To support growth, SureView Systems creates two distinct companies

By | 0 Comments No Comments

Each business will focus on the unique needs of its market and customers

Read More

Resilience: The Design of the SOC’s Interface Makes All the Difference

By | 0 Comments No Comments

One of the biggest challenges in any SOC is deciphering what constitutes an emergency or threat. Centers can quickly become overwhelmed with incoming calls, alarms,…

Read More

Resilience: Hot or Cold failover..which one is right for my operation?

By | 0 Comments No Comments

When a failure occurs, modern IT systems often have a "failover" feature that provides the capability to switch over to another set of servers so that users can continue…

Read More

Spread the Load–Alarm Filters Provides Operational Resilience

By | 0 Comments No Comments

Alarm and event traffic can come from a range of different sources, ranging from devices and system alerts, to tips from employees or the public, or requests for service…

Read More