Critical Infrastructure


North American Cable Equipment Announces Winter Stimulus Program

The company is offering pre-built headends with deep discounts on assembly costs.

New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.

Security Money Goes Missing

I’m no fan of the current administration in Washington, D.C., especially when it comes to spending money. The White House, it would seem, pays its bills by printing more money and borrowing from a creditor that has no interest in democracy.

scalable systems

Scalable Systems

Technological refinements and cost effectiveness in video surveillance systems are changing the security industry as we know it. Just about every aspect of a surveillance installation benefits from enhanced capabilities.

oil rig security camera

Keeping Infrastructure Resilient

The threat against a network of gas pipelines goes far beyond the possibility of terrorism, and includes natural causes and careless excavation. Security, as well as the inherent design and operation of a natural gas pipeline system, can help reduce the probability of an incident, which could have an adverse affect on the nation.

Integration Frustration

Many of today's security systems and products integrate with each other, and thanks to end user demand, manufacturers have made integrating with multiple security products easier. But while product integration is a huge advantage to the end user, and manufacturers regularly provide lists of compatible products, it is important to understand how compatible two products really are.

gradesheet

Making the Grade

Over the past decade, as a result of tragedies at school and college campuses nationwide, student and staff security has become a high priority. Also in the last 10 years, driven by an increase in the population of school-aged children, new school construction and the renovation of existing facilities have surged.

Wireless Security

The Wireless Linchpin

This year is the turning point for the deployment of large-scale, multi-service municipal wireless mesh networks expanding upon their public safety wireless networks for a variety of municipal and government services.



Fundamental Facilities

Technology from the security industry fulfills an essential role in protecting the nation's critical infrastructure. This is defined by a Homeland Security Presidential Directive as physical and virtual systems that are "so vital to the United States that [their] incapacity or destruction would have a debilitating impact on security, national economic security, national public health or safety."

Deployment Strategies

As the necessity for public and personal safety increases, the demand for surveillance solutions requiring the most rigorous, video-based security standards continues to grow.

ComNet Partners with Convergint to Offer Signal Communication Solutions

Communication Networks of Danbury, Connecticut, or ComNet, a manufacturer of fiber optic transmission and networking equipment, has been added to the product offering of Convergint Technologies.

Bosch Will Provide Turnkey Security Installation to Hamburg-Moorburg Plant

Bosch Security Systems will provide communications and security technology to a Hamburg-Moorburg coal-fired power plant run by Vattenfall Europe Generation AG & Co. KG. The contract includes everything from public address systems to alarm signaling and evacuation, as well as fire detection technology, video surveillance, and communication and low-voltage networks for dual-unit plants.

MoMA Modernizes Network Infrastructure

MoMA Embraces New Internet Applications and Improves Threat Protection with PA-2000 Series Next-Generation Firewalls

Getting Carded

The potential for catastrophic injury in the petrochemical industry makes safety training and credentialing of employees imperative. Coordinating this process for a variety of industries, including many in the petrochemical fields of southern Alabama, is Training Solutions for Construction and Industry.

Perimeter Prowess

Acts of terrorism can be carried out in many forms and at various locations around the world. Those who pose the most risk are individuals or groups that breach secured areas of critical infrastructure facilities, such as seaports and airports, government buildings or power and chemical plants.

Brain Power

Security directors face large problems in large facilities. Officials at airports, seaports, industrial facilities and other large installations deal with a unique set of security problems. They also have a unique set of limitations. They must protect against a variety of security threats, many of which are unknown, and they must address these issues with limited manpower. They also are dealing with creative enemies who are always adapting and enhancing their sly methods.

Trial and Error

With 1.3 million workers at 3,200 port facilities and on 10,000 U.S. flagged vessels, the initial TWIC roll-out seemed like a good place to start securing U.S. transportation locations. The Transportation Security Administration is requiring all port employees to use tamper-resistant smart cards, which include encrypted magnetic stripes, bar codes, and contact and contactless technologies.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

New Products

  • Schlage RC reader controller

    Schlage RC Reader Controller

    This new innovative device combines the power of the Pure IP™ access control technology pioneered by ISONAS with Schlage’s intelligent hardware and credentials, delivering a comprehensive and cost-effective perimeter solution to customers. 3

  • LenelS2 BlueDiamond™ mobile app

    enelS2 has introduced its Indoor Location subscription-based service for businesses and other organizations using LenelS2’s BlueDiamond™ mobile app version 2.1.8 for smartphones. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3