There are three major initiatives for cards and credentials on college and healthcare campuses that every security director needs to be aware of
- By Jeremy Earles
- Jul 01, 2014
When most people think of school violence, they immediately think of school shootings. The media saturation that covers these shootings makes it unavoidable. however, school shootings are only the most extreme and rarest example of school violence.
- By Don Commare
- Jul 01, 2014
Every 14.4 seconds—about the time it takes to rinse your hands—a home in the U.S. is burglarized. That means that during the roughly two minutes it takes to brush your teeth, eight homes have been robbed.
- By Jamie Friedlander
- Jul 01, 2014
The International Energy Agency predicts that America will overtake Saudi Arabia as the world’s leading oil producer by 2017 and be a net oil exporter by 2030.
- By Anthony Incorvati
- Jul 01, 2014
Students, staff and instructors begin their day at a reasonable hour during a work day, but for security, time has no meaning.
- By Steve Surfaro
- Jul 01, 2014
Beyond the added intelligence that verified alarms afford police officers when strategizing safer and more effective responses to real intrusion events, verification is also able to deliver practicality of another kind altogether: the minimization of false alarm dispatches.
- By Jeremy Bates
- Jul 01, 2014
The ELERTS Campus app is designed for broader use among students, teachers and residents in keeping with the national “See Something, Say Something” campaign.
- By Jill Baker
- Jul 01, 2014
Rapidly growing technology brings both opportunities and challenges to our industry that dealers are digesting now and will be down the road as home automation creates remote lifestyle options that simplify a customer’s daily schedule.
- By Rob Phillips
- Jul 01, 2014
Hospitals offer patients a controlled environment that encourages rapid healing protected from the outside world. Yet, hospitals are open to the public and subject to many of the same security threats as the world at large.
- By Courtney Mamuscia
- Jul 01, 2014
According to data from the American Public Transportation Association, riders took a staggering 10.7 billion trips on public transportation in 2013, marking the eighth year in row that more than 10 billion trips were taken on public transportation systems nationwide.
- By Greg Peratt
- Jul 01, 2014
Over the last few years, I have heard from integrators that the biggest challenge isn’t necessarily landing projects, but instead keeping margin.
- By Charlie Howell
- Jul 01, 2014
An increased need for the safety of students and staff has caused school systems around the United States to examine their security equipment and protocols.
- By Richard Brent
- Jul 01, 2014
According to the U.S. Coast Guard, there are 361 major ports with port authorities as the others are governed by various state and local public entities, portnavigation districts and municipal port departments.
- By Vicki Contavespi
- Jul 01, 2014
There’s an old axiom that a good salesman could sell virtually anything to anybody—even if the item isn’t always the best fit for a need.
- By Patrick V. Fiel Sr.
- Jul 01, 2014
From its beginnings a half century ago, SBU has been characterized by innovation, energy and progress that includes state-of-the-art security systems to protect students, staff and instructors, while transforming the lives of people who earn degrees and those who make groundbreaking discoveries in the university’s laboratories.
- By Ralph C. Jensen
- Jul 01, 2014
It seems odd to me that people talk about school or campus security in terms of having a budget. I do understand that there is no endless resource for new equipment and technology, but really, security measures and technology should get top billing.
- By Ralph C. Jensen
- Jul 01, 2014
As part of our commitment to helping dealers and integrators adapt to evolving technologies, TRI-ED offers an array of ongoing training events and Counter Days in each of its 60 branch locations.
- By Pat Comunale
- Jul 01, 2014
Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options.
- By Mig Paredes
- Jun 30, 2014
ESX 2014 attendees discover best practices, establish key relationships and learn through education tracks that cover industry-specific topics while experiencing classic country music at its finest.
- By Ginger Hill
- Jun 27, 2014
An innovative and easy-to-use interface allowing local monitoring and management, including photo ID badging for up to 250 entrance points and 25,000 users.
Key control and asset management technology are reliable and cost-effective methods to improve security by ensuring that facility keys are properly managed with regard to access, storage and tracking.
- By Fernando Pires
- Jun 27, 2014
Seeing what’s out there is the beginning of situational awareness. Over the years, video surveillance technology has steadily raised the level of situational awareness available to security teams, and today’s video technologies are pushing the envelope again.
- By Richard E. Widup Jr.
- Jun 27, 2014
Do you remember that one hotel you’ve stayed at during the course of your travels? You remember the one I’m talking about; it looked good on the outside, but inside, there was no security. It sort of left you feeling weak in the knees hoping nothing bad would happen.
- By Ralph C. Jensen
- Jun 27, 2014
Over 300,000 servers still vulnerable; McAfee offers free detection tool.
- By Ginger Hill
- Jun 24, 2014
Allows quick communication between cybersecurity professionals who respond to cyber threats.
- By Ginger Hill
- Jun 23, 2014
As campus shootings increase across the nation, retailers are stepping up to create bulletproof products.
- By Ginger Hill
- Jun 19, 2014
Total number affected still unknown, but company to offer free credit monitoring.
- By Ginger Hill
- Jun 19, 2014
What it all boils down to is internal vs. external cyber communications.
- By Ginger Hill
- Jun 18, 2014
Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.
- By Ginger Hill
- Jun 18, 2014
Complementary solution delivers industry's top-rated systems.