Traditional panic buttons can be effective, but require a wired connection to an access control or intrusion system limiting where they are placed.
- By Patrick V. Fiel Sr.
- Jan 01, 2015
Campus safety is fast becoming a prerequisite for students and their families when they explore options for higher education.
- By John Bartolac
- Jan 01, 2015
Security and safety in residential halls is a top priority for college campuses of any size today. Students move into dorm rooms and on-campus housing with personal property of considerable value, including computers and other electronics.
- By Ann Geissler Timme
- Jan 01, 2015
It’s getting harder for building owners and system integrators to keep up with the latest trends in security.
- By Bret Emerson
- Jan 01, 2015
Security solutions are playing an increasingly important role in business operations as organizations are realizing the significant value these technologies can provide.
- By Hank Monaco
- Jan 01, 2015
More and more, security professionals using card-based front ends for their access control systems have been worried about the security of their proximity systems. They know that for $200 or less, their proximity system can be violated.
- By Kim Humborstad
- Jan 01, 2015
Experience may be the best teacher, but it’s often possible to learn what works—and what doesn’t work—simply by looking at other companies in the industry.
- By Robert Ogle
- Jan 01, 2015
Emergencies that compromise safety on college campuses and universities are an unfortunate reality today.
- By Nick Mirisis
- Jan 01, 2015
In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed.
- By Christie Walters-Hebert
- Jan 01, 2015
As the time nears on the shutdown of the second-generation, or 2G, wireless network, now is the time for security dealers and integrators to not only start planning for this massive migration but also begin searching for opportunities to make this change easier for themselves as well as their clients.
- By Ginger Hill
- Jan 01, 2015
Delivering a unique and innovative technology in today’s crowded and dynamic security market can be quite a challenge.
- By Ralph C. Jensen
- Jan 01, 2015
Mobile Personal Emergency Response Systems (mPERS) is attracting a lot of attention in the security industry these days, and for good reason. There are several reasons for the enormous interest.
- By Mark Fischer
- Jan 01, 2015
GPS vehicle security has attracted high interest in the eyes of dealers for many reasons. First, it provides peace-of-mind for families.
- By Dean Mason
- Jan 01, 2015
Minnesota’s Shooting Star Casino, Hotel and Event Center has consistently relied on the performance and scalability of key management technology from Morse Watchmans.
- By Tony V. Capelli
- Jan 01, 2015
When a security integration company is small, installation and sales are 100 percent of the focuses of time and attention. The sales have to be lean but profitable.
- By Charlie Howell
- Jan 01, 2015
Aside from security on campus or in the K-12 environment, there is nothing more passionate than border security.
- By Ralph C. Jensen
- Jan 01, 2015
When the Stanley Security staff wants to make an impression from the integrator to end user, it relies on the hard-hitting, well-versed security team at its Indianapolis Discovery Center.
- By Ralph C. Jensen
- Jan 01, 2015
Every time I hear or read about a shooting on campus, I naively think this will be the last one. It never is the last shooting, because, I suppose, there are some people bent on inflicting pain on someone else.
- By Ralph C. Jensen
- Jan 01, 2015
In the past year, we’ve seen a number of trends emerge in campus security at both the higher education and K-12 level, as U.S. school districts and universities enhance their security measures.
- By Bill Moran
- Jan 01, 2015
In an effort to serve its students, the university recently conducted a pilot program with HID Global of Austin, Texas in which approximately 15 participants used their smartphones to open doors at one or more of six possible campus entry points, including one parking garage.
- By Deb Spitler
- Jan 01, 2015