August 2012
Features
One frame at a time
By Michael Irvin
We have all heard of “tightening the belt” in tough economic times, but few can relate as well as the multitude of private, not-for-profit organizations that rely on public and private donations and grants for their annual budget.
Different product offerings meet various security requirements
By Jeff Brown
When people talk about layered physical security, they often think it involves having more than one security device at a particular point on their property.
Perimeter security in the physical world and cyber realm, from 500 miles away
By John Bartolac
As the first line of defense, perimeter security is often the initial focus: physical barriers, deterrent strategies, access control and intrusion detection systems, ground sensors and street patrols.
Brazil’s Central Bank adopts additional security measures
By Eric Widlitz
Protecting the physical integrity of personal and corporate information is an important task for Banco do Nordeste do Brazil (BNB), which goes above and beyond the security rules established by the Central Bank of Brazil to adopt additional security measures.
Knowing who’s who is imperative when so much relies on it
By Phil Scarfo
Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.
By Mike Green
Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.
Departments
Planning ahead can prevent harm to people and the bottom line
When severe tornadoes struck six Southern states in April 2011, the ensuing crisis tested the mettle of emergency responders
The first significantly new fire hydrant in more than a century could—and should—revolutionize the industry
By Ronnie Rittenberry
Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.
By Ralph C. Jensen
After recommending strategies for on-the-border video cameras and other security technologies, Rep. Candice Miller (R-MI) and her colleagues in the U.S. House of Representatives have passed H.R. 1299, known as the Secure Border Act.
Supplement
High-risk moms, babies at heart of new maternity pavilion
By Beth Welch
Texas Children’s Hospital recently added a new high-rise facility, the Pavilion for Women, to its already impressive five-building campus in the heart of the Texas Medical Center in Houston.
Making effective security integral to healthcare, corporate and education campuses
By Greg Peratt
IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.
Keeping a close eye on students, visitors, faculty members and campus property is a critical concern for today’s institutions
By Vance Kozik
To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.
Full CJIS compliance to be enforced by 2013
By Chris Jensen
The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.
Thieves, hackers always looking for new ways to grab information
By Bill Morrow
Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.