Incident Response


Whoa! Nellie

Say you have some pasture land and a few horses. Chances are you won’t install a security system to ensure their safety and security. However, Stonestreet Farm isn’t your run-of-the-mill horse ranch. It’s a thoroughbred horse farm that sprawls over 460 acres in the heart of the bluegrass near Lexington, Ky.

Sky Raiders

Today’s airports are at the frontline of homeland security. Checking for shoe bombs, banned liquids and suspected terrorists are part of the daily routine for airport security personnel. In fact, airport vulnerability has become such an issue that the Department of Homeland Security assigns the airline industry its own threat level designation. For example, airports can be assigned to threat level orange, meaning “High Risk of Terrorist Attacks” while the rest of the nation is at yellow, or “Elevated Risk.”

Question & Answers From the Product Manager's POV

American Fibertek Inc.’s V’nes stands for Video Network Enterprise Solution. It is an integrated and standardized network transmission solution designed specifically for professional security applications with a specialized open path to truly integrate IP and analog systems operation.

You Can Run, but You Can’t Hide

Maintaining the security of any large residential institution housing hundreds or thousands of people can be a daunting task. The problems faced by those in charge of preserving the peace in these facilities can mirror those of any urban police department. As in any diverse population, there are those who will remain lawful and those who look to circumvent the rules that serve to regulate the peace.

From the Product Manager's POV

New technologies are taking the world by storm. That means the security industry is in the midst of change and product rebirth. The same holds true for recording devices. DVRs are cost-effective, and NVRs are state-of-theart. Not sure which to choose? Read what Panasonic group manager Steve Surfaro has to say and then decide.

Sophisticated Surveillance

The Art of Smart

It's a terrifying thought -- a hacker breaks past a company's firewall and has unlimited access to a jackpot of data, from employee information to trade secrets and financial details.

iControl Networks, GE Security Introduce Web-Based Security Solution

iControl Networks has introduced a Web-based solution to monitor and control the home, and will be introducing Home Security 2.0, along with partner GE Security.



Counter Attack

HEALTHCARE providers today deal with threats not thought of a few years ago. In the past, a family’s gravest concern was infectious disease, and if there were significant security threats, many people were comfortably oblivious of them. Today, healthcare facilities must be aware of multi-dimensional threats such as infant abduction, drug theft, workplace violence and even terrorism.

The Borne Security

CHILD abductors are seldom spontaneous. When they're bent on taking children from a facility such as a hospital, they'll stalk it, scope it out to determine its security features, and watch it like at hawk. But at WakeMed, abductors find Deputy Police Chief Scott Holzshu and his 71-officer police force watching too, using technology to make sure that security is as tight as possible.

Instituting Security

THE Institute for Advanced Learning and Research in Danville, Va., is a state-of-the-art facility built in 2005 to serve as a catalyst for economic and community transformation in an area recently impacted by the loss of thousands of manufacturing jobs. By providing advanced learning programs, strategic research and technology transfer conferences, and outreach and technology programs in the region of south Virginia, IALR is helping the community's workforce to adapt to a changing economy.

On Defense

IN a sea of 20,000 people at a concert or sports event, security becomes even more complicated than usual.

At the Heart of the Matter

THE operation of a busy regional hospital has enough challenges without taking into account the security of its staff. For Hotel Dieu Grace Hospital, located on the Detroit River in Windsor, Ontario, the priority was finding one system that would allow hospital workers to immediately reach out to security in an emergency situation.

Improving Evolution

YOU’VE heard it all before. “We’re living in a post-9/11 world.” “The terrorist threat is higher than ever.” “It’s just a matter of time before the next Sept. 11.” Yes, it’s tired. But unfortunately, it’s the truth. The fact is, terror threats continue to be a top concern at critical infrastructure sites. And domestic criminals continue to evolve and become smarter and more savvy in efforts to thwart security measures.

Surveillance Warm Up

THERMAL security cameras are imagers that see heat, or thermal energy, in an object. The human eye cannot detect thermal energy.

Hot Shots

IN today’s troubled times, large industrial sites are in more danger of security breaches than ever before. With miles of perimeter fencing and multiple entrances to secure, large petrochemical plants are a complex security challenge.

Protection Outside the Lines

WORLD events indicate the rate of growth in perimeter security requirements will continue to escalate for the foreseeable future. Airports, seaports and petrochemical facilities certainly qualify for increased protection, but schools, storage facilities, sporting events, bridges and tunnels are examples of new targets needing protection.

Making a Change

THE security industry has gone through many paradigm shifts during the last 100 years. As is the case with every paradigm change, there are winners and losers. The security industry is no different. Business paradigm shifts seem to always create new opportunities. However, some of those opportunities leave a wake of destruction and demise in its path. Seeing and understanding a new paradigm before it happens can make or break any company, regardless how big or small the company might be.

Tailoring Transformation

THE retail banking industry is undergoing a significant transformation accompanied by increasing regulatory compliance requirements, consumer demands and industry consolidation—all while working to provide the best in customer service and maintain operational efficiency.

Hands Up

Today, three out of four bank robbers are caught within 18 months of their crime. FBI and local law enforcement efforts are aided by financial institutions using current technological advancements along with specialized training and practices by bank employees.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3