Security Products Magazine April 2014 Digital Edition

April 2014

  • WIRELESS TECHNOLOGY - Raising Concerns
  • CLOUD/STORAGE - Building a Secure Cloud Environment
  • STORAGE SOLUTIONS - Educating Without Surveillance
  • MEDICAL FACILITY - Who's on Deck


Features

Who’s on Deck?

Who’s on Deck?

Carolinas HealthCare System upgrades multi-story parking deck to achieve clarity

By Fredrik Nilsson

When nurses head home after a grueling 12-hour shift, the last thing Carolinas HealthCare System (CHS) wants them to worry about is getting to their cars safely.


Regulations that Affect Critical Infrastructure

By Ray Gilley

As the CEO of ISI Security, one of the most difficult and time-consuming aspects of my job is keeping up with the laws and regulations affecting my company.


Educating Without Surveillance

Educating Without Surveillance

Administration commits to video solution on campus

By Domingo Martinez

According to Saddleback College Chief of Police, Christopher Wilkinson, the childcare center in particular was a top priority due to concerns related to the Sandy Hook Elementary tragedy and other similar violent incidents.


Rush to Security

Rush to Security

Medical center simplifies with wireless, electronic locks

By Karen Keating

When Rush University Medical Center incorporated wireless electronic locks throughout its new 375-bed-tower hospital building, it made installation easier and more cost-effective while providing greater flexibility to meet future security needs.


Raising Concerns

Raising Concerns

City or municipal networks have pressing security issues

By Cosimo Malesci

Wireless transmission is usually a topic that raises many concerns in the security world. It seems common knowledge nowadays that a wireless network can be easily hacked, and private information can end up on the Internet or someone’s identity can be stolen.


College Upgrades

College Upgrades

Wireless locks in place at Queensborough campus

By Ann Geissler Timme

Reflecting the uniqueness and diversity of the local Queens’ community, for more than 50 years, Queensborough Community College has served students from Queens and the entire New York City region as a starting place to pursue their academic and career goals.


Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

A secure IT strategy often emerges as a key concern

By Sumeet Sabharwal

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.


Departments

Stopping Theft in Its Tracks

Stopping Theft in Its Tracks

Increasing cost of technology requires line of defense

By Pete Gulick

The evolution of line security for handheld electronics in retail stores has been nothing short of amazing. When Scorpion Security Products launched its Scorpion security device, telecommunication and consumer electronics companies around the globe wanted the most unobtrusive, minimal security possible.


Saving One School at a Time

By Ralph C. Jensen

I’ve been on a kick lately thinking that schools need more security attention. I believe I feel so deeply about schools because they are filled with children who are learning to become the leaders, technicians and thought-leaders of tomorrow.


Government Security

Improved Surveillance

Improved Surveillance

Louisiana’s Port Fourchon deploys IP video at strategic oil site

By Courtney Dillon Pedersen

Port Fourchon plays a strategic role in supplying the United States with nearly 18 percent of its oil supply, servicing over 90 percent of the Gulf of Mexico’s deep-water exploration and production.


Government Procurement Challenges

Government Procurement Challenges

Best of Breed versus lower cost, proprietary solutions

By John Merlino

More than likely, you have witnessed an RFP that includes dated product specifications and, in some cases, multiple product specifications that are more “wish-list” than reality.


High-Tech Solutions

High-Tech Solutions

Reaching out to the perimeter to protect the first line of defense

By Greg Hamm

Nearly everyone is familiar with the standard manned guard booth in which a person sits and allows drivers in and out of a facility; however, border stations, government buildings, military bases and other locales where there can be a “very unwanted guest” all use much highertech security booths.


On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

It is an unfortunate truth that military bases, filled with individuals dedicated to keeping America safe, sometimes come under threat within their own country. Incidents like the 2009 Fort Hood shooting and the 2013 killings at the Washington Navy Yard serve as reminders that the military is not immune to the threat of violence and crime.

By Dave Tynan

One might think that a military base is among the most secure places in the country. Unfortunately, though, the sprawling nature of military bases makes them difficult to secure effectively, which leaves these sites vulnerable to a wide range of threats.


Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3