March 2016
- Private and Secure
- Keep it Simple
- Seven Superior Steps
- A Prayer for Security
- Intelligent Action
- Cloud-Based Solution
Features
Using one platform to reign in all security applications
By Adlan Hussain
There have been many discussions and articles about PSIM over the last five years, but there is also a lot of confusion around exactly what it does, how it is defined, and in what way it differs from other forms of security management.
Why physical and IT security are converging
By Stephen Joseph
Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.
With the goal in mind, don’t do stupid things
By Fernando Pires
Over the past decade, high-tech devices, megapixels, Power over Ethernet, and many other new offerings and improvements have revolutionized the physical security landscape.
What it takes to ensure your infrastructure is safe
By Andrew Elvish
Cyberattacks are on the rise. Whether via IT infrastructure or internally, the Security Industry faces the challenge of guaranteeing that the data in their systems remains private, properly protected and encrypted.
Taking a positive role in how security is managed
By Kim Rahfaldt
Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more.
Securing houses of worship may be easier said than done
By Jon Daum
Houses of worship have long been known as welcoming, open havens, offering support and guidance for people in need, but that mission is being challenged by active shooters and other criminals committing assault, theft, arson and vandalism.
Enterprises are challenged with having to deal with many categories of identities who need access to myriad of systems and resources that could be geographically dispersed across locations
By Pan Kamal
Today’s instant economy requires that more of a company’s business processes be open to external stakeholders.
Reduce costs and grow your bottom line
By Ajay Jain
Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.
Departments
INDUSTRY FOCUS
By Ralph C. Jensen
All signs are pointing to Las Vegas for ISC West. Even though I’m writing this two months ahead of the show, it is pretty much all that is on my mind, as far as work is concerned.
INDUSTRY PROFESSIONAL
By Ralph C. Jensen
In November 2015, New York-based system integrator Total Recall Corp. celebrated 30 years of designing and delivering technologically advanced video surveillance security solutions for a variety of industries including law enforcement, government agencies and corporations.
INDUSTRY VERTICAL
Our connected world needs confident security systems
By Peter Smallridge
Our world is connected through travel now more than ever before. Globalization has made way for a constant coming and going, making border security more necessary.
Dealer Strategies
Ten types of people who should look at smart lock options
By Larry Goldman
Sales of home automation systems and connected or smart locks are growing every year.
By Ralph C. Jensen
You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.
Working with DIYers can provide another source of revenue, and make sure the job is done right
By Robert Ogle
The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.