Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.
How secure is your business data network? It’s a question that can be tough to answer when new security risks seem to emerge on a daily basis. Broadband data and voice communications are the lifeblood of business, and without a network that functions optimally all the time, the productivity, profitability and even viability of businesses in many vertical sectors are at risk.
- By Christopher Rabii
- Jun 24, 2010
When a security program is designed to prevent more common and unwanted activities, in many ways the program will also lessen the potential of more extraordinary events. Many of us understand the principle of layered security using a number of resources.
- By Darren A. Nix
- Nov 09, 2009
ASIS International recently announced that the Department of Homeland Security has selected the ANSI/ASIS Organizational Resilience American National Standard as one of three sets of standards to be adopted as a national preparedness standard for private-sector entities as part of the DHS PS-Prep program.
Safety on campus continues to be a concern for colleges and universities across the country. With legislative updates associated with the Clery Act passed last year, and violent events across the United States once again threatening campus safety, the need for security and safety awareness on campus has not diminished.
- By Marcia Nickle
- May 28, 2009
Despite a renewed focus on governance and transparency, a recent survey from SailPoint Technologies revealed a disconnect between regulatory compliance and proactive risk management.
Situational readiness is a valuable tool which brings the public and private sector the ability to improve awareness of man-made and natural calamities.
- By Ralph C. Jensen
- May 06, 2009
As U.S. car sales near a 27-year low, dealerships have a higher stake than ever in ensuring the safety of their inventory. Many are enhancing security procedures or developing new measures to prevent theft, deter vandalism and ensure the safety of their employees and inventory.
- By J. Matthew Ladd, John Lynch
- May 01, 2009
Despite the fact that disasters and unplanned business interruptions have made it absolutely critical for organizations to quickly and accurately communicate with all stakeholders during such an event, many businesses have not put in place an effective emergency notification system that can actually reach recipients, according to an annual study conducted by Varolii Corp.
An increasing number of business continuity professionals and disaster recovery experts are discovering that the most vulnerable links in the continuity- of-operations chain are the people a business serves and the people who serve them. While this seems intuitively obvious now, for decades, resolving the fragility of technology had been the exclusive focus of the industry.
- By Maurice A. Ramirez
- Feb 01, 2009
From severe weather to acts of violence, schools across the nation are forced to deal with a variety of emergencies. As a result, districts and administrators have become well versed in crisis planning.
- By Karla Lemmon
- Oct 01, 2008
Defined as occurrences that have or might have a negative impact on the continuity of routine operations, incidents may occur in any organization, public facility or business entity.
- By Roni Zehavi
- Aug 01, 2008
The ASIS Commission on Standards and Guidelines has released the second edition of the Threat Advisory System Response Guideline (TASR).
While every individual and organization that provides security products or services will have their spin on what security is and how to achieve the desired level, the truth is, security is essentially an unachievable outcome. A common definition of security is, “freedom from danger, fear and anxiety.” Security defined as such is, therefore, unattainable.
- By Kevin McDonald
- Jun 02, 2008
Business is all about managing risk, and risk management comes down to making solid business decisions to avoid and mitigate potential threats, including natural disasters.
- By Richard Daley
- Jun 02, 2008
When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.
- By Debbie Bolles
- Apr 08, 2008
Securing an entire network at a finite number of ingress points simply does not offer the risk mitigation companies need.
- By Kevin Prince
- Apr 02, 2008
Sometimes it seems as if everything is about security these days. Homeland security, physical security, digital security— there’s constantly a new security issue that needs attention.
- By Monte Robertson
- Feb 14, 2008
You’ve all seen that guy in the hallway: that unfamiliar face. “He must be the new guy.” “He must be here for a meeting.” “Isn’t he Jane’s husband?” “He probably works for facility management.” In too many cases, employee simply do not know who or why that person is wandering around the premises
In the United States, people encounter a perpetual tradeoff between freedom and security. The nation depends on a complex system of critical infrastructures to maintain a high quality of life and the freedoms enjoyed every day. New threats to security have these organizations taking a second look at their vulnerabilities, however, scrambling to minimize disruption and to maintain the integrity of their operations. In the past, national security was perceived as the role of government. Today, Department of Homeland Security efforts to protect critical infrastructures from physical attack are a shared responsibility of the public and private sectors, as well as individual citizens.