In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively.
- By Andy Schreyer
- Sep 18, 2024
Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats.
Frederick Tucker, Allied Universal security professional, has been honored with the 2023 Ralph Day Memorial Security Officer Heroism Award for his life-saving actions during a shooting at the Nashville Metro Public Library. The award is the highest recognition a security officer can receive for an act of heroism.
After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool.
Research from the National Skills coalition (NSC) suggests that 92% of today’s jobs require digital skills. It’s frankly hard to believe that figure isn’t at 100 percent. Businesses of all kinds are significantly impacted by applications that manage all sorts of transactions internally and externally. The capture, storage, and use of data is prolific across all industries—and subject to increased risk of unauthorized access and cybersecurity breaches.
- By Perry Carpenter
- Sep 16, 2024
During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery.
- By Monique Merhige
- Sep 13, 2024
PureTech Systems, a provider of geospatial AI-boosted video analytics for perimeter and border security, is excited to announce the expansion of their perimeter solutions by further integrating with Axis Communications products. The most recent integration combines PureTech's patented video analytics with the detection capabilities of the Axis Communications D2110-VE security radar.
ISC East, with its premier sponsor Security Industry Association (SIA) and in partnership with the ASIS NYC Chapter, announced this year’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination.
ASSA ABLOY has acquired Level Lock, a technology solutions business based in Redwood City, California.
Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks.