August 2012


Features

Dissecting The Layers

By Jeff Brown

When people talk about layered physical security, they often think it involves having more than one security device at a particular point on their property.


Peace of Mind

By Michael Irvin

We have all heard of “tightening the belt” in tough economic times, but few can relate as well as the multitude of private, not-for-profit organizations that rely on public and private donations and grants for their annual budget.


Circle The Wagons

By John Bartolac

As the first line of defense, perimeter security is often the initial focus: physical barriers, deterrent strategies, access control and intrusion detection systems, ground sensors and street patrols.


Increased Card Security

By Eric Widlitz

Protecting the physical integrity of personal and corporate information is an important task for Banco do Nordeste do Brazil (BNB), which goes above and beyond the security rules established by the Central Bank of Brazil to adopt additional security measures.


Boosting Identity

By Phil Scarfo

Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.


From the IT Perspective

By Mike Green

Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.


Supplement

New Fire Protection Essential

By Beth Welch

Texas Children’s Hospital recently added a new high-rise facility, the Pavilion for Women, to its already impressive five-building campus in the heart of the Texas Medical Center in Houston.


Providing Security

By Greg Peratt

IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.


Safer More Secure Campuses

By Vance Kozik

To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.


Cost-Effective Compliance

By Chris Jensen

The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.


Todays Threat Landscape

By Bill Morrow

Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.


New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.