August 2012


Features

Dissecting The Layers

By Jeff Brown

When people talk about layered physical security, they often think it involves having more than one security device at a particular point on their property.


Peace of Mind

By Michael Irvin

We have all heard of “tightening the belt” in tough economic times, but few can relate as well as the multitude of private, not-for-profit organizations that rely on public and private donations and grants for their annual budget.


Circle The Wagons

By John Bartolac

As the first line of defense, perimeter security is often the initial focus: physical barriers, deterrent strategies, access control and intrusion detection systems, ground sensors and street patrols.


Increased Card Security

By Eric Widlitz

Protecting the physical integrity of personal and corporate information is an important task for Banco do Nordeste do Brazil (BNB), which goes above and beyond the security rules established by the Central Bank of Brazil to adopt additional security measures.


Boosting Identity

By Phil Scarfo

Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.


From the IT Perspective

By Mike Green

Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.


Supplement

New Fire Protection Essential

By Beth Welch

Texas Children’s Hospital recently added a new high-rise facility, the Pavilion for Women, to its already impressive five-building campus in the heart of the Texas Medical Center in Houston.


Providing Security

By Greg Peratt

IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.


Safer More Secure Campuses

By Vance Kozik

To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.


Cost-Effective Compliance

By Chris Jensen

The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.


Todays Threat Landscape

By Bill Morrow

Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.


New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.