- Turn on the Lights
- Tornado Tracking
- Heads Up
- Securing the Network
- Key Management
Is your network secure? Hardening guide covers cyber security practices for deploying Milestone IP video
By Bjørn Eilertsen
It is an understatement to say that IP networks have been a game changer for specifying, installing or managing video security and surveillance systems.
Deploying advanced IP cameras in the challenging light conditions of rolling stock environments
By Kevin Shen
Most security professionals have acquired important video only to see that the resulting footage is over or under exposed because the camera is unable to adapt to the challenging light environment.
Independent alarm installer watches and reacts, saving lives
By Peggy Page
April 28, 2014, stands out in the memory of the residents of northern Mississippi as a violent F4 Tornado left a wake of major damage killing 10 people and injuring more than 80.
Achieving enhanced situational awareness through intelligence gathering in the financial market
By Kevin Wine
The financial business is always evolving to meet the growing demands of customers, and organizations have shifted priorities significantly to provide the highest level of service and convenience.
By Don Erickson
During this unusual political season, the presidential nominees have focused on significant national issues that receive constant media coverage such as border security and immigration, race relations, criminal justice reform, and taxes.
SVP of Global Engineering at HID Global discusses accomplishment, goals, and what he thinks the future holds for the trusted identity
By Lindsay Page
One of the biggest accomplishments for Learmonth with HID Global has been the move to mobile, which was first rolled out in 2014 with HID Mobile Access. This solution allows mobile devices to be used for access control.
By Ralph C. Jensen
Remember back in the old days when having pre-check stamped on your boarding pass meant getting through security a little bit quicker, and with the convenience of not having to take your laptop out, removing your shoes and not having to have an inspection on toiletries.
Benefits include improvements to cost, productivity, efficiency, security and convenience
By Fernando Pires
More than ever, the incidents of theft and property crime as well as information security are of greater concern for corporations, universities, hospitals and other large organizations.
Wide-area networking comes to physical security
By Dr. Cahit (Jay) Akin
As physical security technology continues to advance in both complexity and capability, it is increasingly bumping into and being influenced by other technology segments.
IT professional must review skill sets to meet new threats
By Tom Gilheany
Remember the Jurassic Age of organizational security? You built the stronghold, hardened the perimeter, established a set of rules and walked away. Security? Done.
Enhancing cyber infrastructure security with virtual sandboxes and cyber ranges
By Shashi Kiran
With cyber-attacks on the ascent, the need to strengthen the security posture and be responsive is top of mind for CIOs, CEOs and CISOs. Security is closely interlinked to all aspects of the business and has a direct bearing on business reputation, privacy and intellectual property
Securing and validating critical vision data
By John Stamos
Manufacturing companies are placing increasing emphasis on data security throughout their operations to protect confidential data and to validate their systems are protected against unauthorized and unwanted changes.
By Ralph C. Jensen
There is something to be said about a close family business. There can be trying times, but by and large there are close ties not only to business projects, but for family matters as well.
Different sales strategies and practices will ensure compliance
By Barbara Holliday
Baby Boomers are typically defined as the group born from 1946 to 1964, which means they are now between 50 and 70 years old. According to the U.S. Census Bureau, by the year 2030, 20 percent of Americans will be 65 and older, up from 13 percent in 2010.
Today’s technology provides security at the fingertips
By Joe Oliveri
In today’s world, businesses and organizations require a multitude of security solutions at their fingertips to adequately help protect their customers, employees and facilities from harm. The always-on, always- connected nature of our workforce calls for managers to have oversight and control over the security systems in place 24/7.
Campus Security & Life Safety
Campus officials work together when buying first-rate equipment
By Steve Darragh
While the number of cameras per property varies anywhere from 15 at a smaller elementary up to 80 or more at a larger high school, the Weber School District initially used design tools from Axis to determine an efficient solution now implemented across the board with a simple mix of network cameras.
Independent school in England boosts security on the perimeter
By Steve Carney
Wakefield Grammar School Foundation has chosen a complete Tyco Security Products surveillance package that includes Illustra IP cameras and exacqVision network video recorders with exacqVision VMS software and Kantech EntraPass access control system pre-installed.
Event-based security solutions for a new scholastic generation
By Steve Birkmeier
To ensure the safety of students and faculty members in these new facilities, Campbell decided to significantly upgrade its video surveillance system beginning with its Fine Arts building.
Topeka School District greatly improves security for safer educational environment with IP video surveillance
By Courtney Pedersen
The increase in incidents and safety concerns prompted the district to perform a security audit that involved the Topeka Police Department school resource officers, the FBI Joint Terrorism Task Force and the Department of Homeland Security.
By Ralph C. Jensen
Every month, almost every day, I hope that there has not been another school shooting where youngsters are hurt, or killed, on an educational campus. Too often that hope goes unfulfilled.
Security check-up proves successful for Idesco and Adelphi University
By Monique Merhige
Adelphi University has built a solid reputation and position of strength when it comes to safety due to its proactive philosophy and building the right team of people around them that consists of security professionals and electronic security contractors that are true experts in the field.
How analytics and video surveillance are changing the face of learning
By Jumbi Edulbehram
Video analytics enable schools to proactively recognize behaviors to create an efficient and safe environment with minimal disruption.
Targeting the criminal who targets you
By Bruce Czerwinski
Securing these outdoor spaces takes a different mindset. Indoors, a lot of effort is spent protecting assets. Outdoors, it’s mostly about protecting people. It’s about the student walking late at night between the library and dorm or the last student heading to their car in a remote parking lot.
Replacement of locks meant a look at security technology
By Ralph C. Jensen
In the beginning, however, Yelinek was hardly an easy sell. In fact, in his own words he was “dead set against” changing lock brands. That’s because simplicity is a priority for Yelinek, who for the past 20 years has been the only locksmith for all of the college’s campuses.
Don’t drive your sports car on a county road
By Minu Youngkin
Helping customers understand the importance of effective bandwidth management is the key to designing a system that truly supports their needs and priorities.