Incident Response


Sky Raiders

Today’s airports are at the frontline of homeland security. Checking for shoe bombs, banned liquids and suspected terrorists are part of the daily routine for airport security personnel. In fact, airport vulnerability has become such an issue that the Department of Homeland Security assigns the airline industry its own threat level designation. For example, airports can be assigned to threat level orange, meaning “High Risk of Terrorist Attacks” while the rest of the nation is at yellow, or “Elevated Risk.”

Question & Answers From the Product Manager's POV

American Fibertek Inc.’s V’nes stands for Video Network Enterprise Solution. It is an integrated and standardized network transmission solution designed specifically for professional security applications with a specialized open path to truly integrate IP and analog systems operation.

You Can Run, but You Can’t Hide

Maintaining the security of any large residential institution housing hundreds or thousands of people can be a daunting task. The problems faced by those in charge of preserving the peace in these facilities can mirror those of any urban police department. As in any diverse population, there are those who will remain lawful and those who look to circumvent the rules that serve to regulate the peace.

The Art of Smart

It's a terrifying thought -- a hacker breaks past a company's firewall and has unlimited access to a jackpot of data, from employee information to trade secrets and financial details.

From the Product Manager's POV

New technologies are taking the world by storm. That means the security industry is in the midst of change and product rebirth. The same holds true for recording devices. DVRs are cost-effective, and NVRs are state-of-theart. Not sure which to choose? Read what Panasonic group manager Steve Surfaro has to say and then decide.

Sophisticated Surveillance

iControl Networks, GE Security Introduce Web-Based Security Solution

iControl Networks has introduced a Web-based solution to monitor and control the home, and will be introducing Home Security 2.0, along with partner GE Security.

Counter Attack

HEALTHCARE providers today deal with threats not thought of a few years ago. In the past, a family’s gravest concern was infectious disease, and if there were significant security threats, many people were comfortably oblivious of them. Today, healthcare facilities must be aware of multi-dimensional threats such as infant abduction, drug theft, workplace violence and even terrorism.



The Borne Security

CHILD abductors are seldom spontaneous. When they're bent on taking children from a facility such as a hospital, they'll stalk it, scope it out to determine its security features, and watch it like at hawk. But at WakeMed, abductors find Deputy Police Chief Scott Holzshu and his 71-officer police force watching too, using technology to make sure that security is as tight as possible.

Instituting Security

THE Institute for Advanced Learning and Research in Danville, Va., is a state-of-the-art facility built in 2005 to serve as a catalyst for economic and community transformation in an area recently impacted by the loss of thousands of manufacturing jobs. By providing advanced learning programs, strategic research and technology transfer conferences, and outreach and technology programs in the region of south Virginia, IALR is helping the community's workforce to adapt to a changing economy.

On Defense

IN a sea of 20,000 people at a concert or sports event, security becomes even more complicated than usual.

At the Heart of the Matter

THE operation of a busy regional hospital has enough challenges without taking into account the security of its staff. For Hotel Dieu Grace Hospital, located on the Detroit River in Windsor, Ontario, the priority was finding one system that would allow hospital workers to immediately reach out to security in an emergency situation.

Improving Evolution

YOU’VE heard it all before. “We’re living in a post-9/11 world.” “The terrorist threat is higher than ever.” “It’s just a matter of time before the next Sept. 11.” Yes, it’s tired. But unfortunately, it’s the truth. The fact is, terror threats continue to be a top concern at critical infrastructure sites. And domestic criminals continue to evolve and become smarter and more savvy in efforts to thwart security measures.

Surveillance Warm Up

THERMAL security cameras are imagers that see heat, or thermal energy, in an object. The human eye cannot detect thermal energy.

Hot Shots

IN today’s troubled times, large industrial sites are in more danger of security breaches than ever before. With miles of perimeter fencing and multiple entrances to secure, large petrochemical plants are a complex security challenge.

Protection Outside the Lines

WORLD events indicate the rate of growth in perimeter security requirements will continue to escalate for the foreseeable future. Airports, seaports and petrochemical facilities certainly qualify for increased protection, but schools, storage facilities, sporting events, bridges and tunnels are examples of new targets needing protection.

Making a Change

THE security industry has gone through many paradigm shifts during the last 100 years. As is the case with every paradigm change, there are winners and losers. The security industry is no different. Business paradigm shifts seem to always create new opportunities. However, some of those opportunities leave a wake of destruction and demise in its path. Seeing and understanding a new paradigm before it happens can make or break any company, regardless how big or small the company might be.

Tailoring Transformation

THE retail banking industry is undergoing a significant transformation accompanied by increasing regulatory compliance requirements, consumer demands and industry consolidation—all while working to provide the best in customer service and maintain operational efficiency.

Hands Up

Today, three out of four bank robbers are caught within 18 months of their crime. FBI and local law enforcement efforts are aided by financial institutions using current technological advancements along with specialized training and practices by bank employees.

An Eye On It All

IN an age when the need for increased security services is at an all-time high, managing security information has become more efficient, flexible and powerful.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3