Mention border security, and you might imagine the intersection of two countries, or perhaps the border separating government facilities from private land. But border security also can be defined as perimeter security, which expands the concept to encompass walls, fences, roads and other perimeters around businesses, schools, prisons, utilities, research facilities, and other properties and buildings.
- By John Monti
- Mar 01, 2008
Whenever a casino looks at video analytics, the discussion often leads down the path of far-fetched concepts and applications for catching and tracking cheats.
- By Bob Cutting
- Feb 29, 2008
From retail and manufacturing to healthcare and government, security departments and staff for decades have looked to security industry experts for new technology and services to improve operations and the bottom line. To that end, remote services provided by electronic security alarm providers that augment local security staff have become a frequent customer request.
- By Bill Fitzhenry
- Feb 29, 2008
Monitored security is a $30 billion industry with approximately 24 percent household penetration and consistent year-over-year revenue growth.
- By Paul Dawes
- Feb 29, 2008
- By Bill Savage
- Feb 14, 2008
Stretching several miles, Mission Beach, Calif., is the most popular beach area in San Diego, and it draws large crowds during the summer. Various shops, restaurants and beach rental outfits line its narrow boardwalk. Mission Beach offers limitless opportunities for sunbathing, surfing, bicycling, skateboarding and other outdoor activities. Despite the beach area’s idyllic landscape, last year San Diego Public Safety recorded the largest number of violent crimes ever.
Think about it. Two decades ago, cell phones were the size of bricks and could barely receive phone calls; today, they are wafer-thin and offer Internet access. Traveling to unknown destinations required detailed instructions scribbled on a notepad; today a car’s navigation system will direct the driver while the kids watch a DVD in the back seat.
- By Paul Dawes
- Feb 14, 2008
If you pick up any local employment guide, you cannot avoid seeing the many call centers with ads that read, “Customer service representatives wanted—immediate hire.” Why are these call centers continuously struggling with hiring and turnover?
- By Jacquellin Faison
- Feb 01, 2008
You’ve all seen that guy in the hallway: that unfamiliar face. “He must be the new guy.” “He must be here for a meeting.” “Isn’t he Jane’s husband?” “He probably works for facility management.” In too many cases, employee simply do not know who or why that person is wandering around the premises
Correctional facility infrastructures are aging, inmate populations in the United States are increasing, and the cost of operating jails and prisons is growing twice as fast. Correctional facility officials know these facts all too well.
- By Felix Gonzalez
- Jan 03, 2008
Everyone in the security industry who has visited a casino has probably marveled at the level of preparation and care it must take to safeguard a gaming facility.
- By Megan Weadock
- Jan 03, 2008
Organizations of all sizes will get even more from their IP networks by adding new IP Trunking capabilities unveiled recently by Verizon Business.
The Department of Homeland Security’s publication of chemical facilities anti-terrorism (CFAT) standards has many chemical and petrochemical companies scrambling to develop security plans for their high-risk facilities. The continued post-9/11 threat of terrorism dictates urgency, and the DHS put teeth in the CFAT rules.
- By Carol Enman
- Dec 04, 2007
In Cincinnati, when you say “school’s out,” it has a whole different meaning. That’s because all 65 schools in the Cincinnati Public School District—encompassing preschool through grade 12—are part of a massive, $1 billion facilities master plan that will completely change the face of the city’s educational infrastructure.
- By Jeff Hendrickson
- Dec 04, 2007
The digital revolution is transforming the nation’s culture and clearly altering the way people communicate with each other. Nowhere is technology’s power more visibly demonstrated than with training. Factor in digital training that educates, empowers and connects the vital security officer sector, and you have a game plan for success.
- By Rich Cordivari
- Dec 01, 2007
Have you ever looked at a surveillance image and wondered why the image quality is so poor when compared with the clear, detail-packed images captured by consumer digital cameras or even the newest cell phones?
- By Pierre Parkinson
- Dec 01, 2007
Say you have some pasture land and a few horses. Chances are you won’t install a security system to ensure their safety and security. However, Stonestreet Farm isn’t your run-of-the-mill horse ranch. It’s a thoroughbred horse farm that sprawls over 460 acres in the heart of the bluegrass near Lexington, Ky.
- By Ralph C. Jensen
- Nov 27, 2007
Today’s airports are at the frontline of homeland security. Checking for shoe bombs, banned liquids and suspected terrorists are part of the daily routine for airport security personnel. In fact, airport vulnerability has become such an issue that the Department of Homeland Security assigns the airline industry its own threat level designation. For example, airports can be assigned to threat level orange, meaning “High Risk of Terrorist Attacks” while the rest of the nation is at yellow, or “Elevated Risk.”
American Fibertek Inc.’s V’nes stands for Video Network Enterprise Solution. It is an integrated and standardized network transmission solution designed specifically for professional security applications with a specialized open path to truly integrate IP and analog systems operation.
- By Security Products Staff
- Nov 05, 2007
Maintaining the security of any large residential institution housing hundreds or thousands of people can be a daunting task. The problems faced by those in charge of preserving the peace in these facilities can mirror those of any urban police department. As in any diverse population, there are those who will remain lawful and those who look to circumvent the rules that serve to regulate the peace.
- By Bob Levine
- Nov 05, 2007