As the first line of defense, perimeter security is often the initial focus: physical barriers, deterrent strategies, access control and intrusion detection systems, ground sensors and street patrols.
- By John Bartolac
- Aug 01, 2012
IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.
- By Greg Peratt
- Aug 01, 2012
Protecting the physical integrity of personal and corporate information is an important task for Banco do Nordeste do Brazil (BNB), which goes above and beyond the security rules established by the Central Bank of Brazil to adopt additional security measures.
- By Eric Widlitz
- Aug 01, 2012
To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.
- By Vance Kozik
- Aug 01, 2012
Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.
- By Phil Scarfo
- Aug 01, 2012
The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.
- By Chris Jensen
- Aug 01, 2012
Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.
- By Ronnie Rittenberry
- Aug 01, 2012
Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.
- By Mike Green
- Aug 01, 2012
In 2010, the historic Egyptian Theatre in DeKalb, Ill., decided to upgrade to a more modern and effective life safety system to protect the structure and its patrons.
Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.
- By Bill Morrow
- Aug 01, 2012