Security Today Magazine Digital Edition - February 2017

February 2017

  • Guarding Valuables
  • Emergency Security
  • Security by the Book
  • Bandwidth Throttling
  • The Cloud Keeps Evolving in 2017



Keeping up with recent changes and challenges

By Anthony Incorvati

When it comes to protecting transportation hubs, seaports have their own set of challenges.

The Cloud Keeps Evolving in 2017

The Cloud Keeps Evolving in 2017

The expected and surprising ways the Cloud will change in coming years

By Christian Morin

Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.

Bandwidth Throttling

VMS Bandwidth Saving Technologies

Demand for video and improved resolution continues to increase in organizations

By Brian Carle

Beyond the core functionalities of recording and displaying video, one of the most important capabilities of modern Video Management Software platforms is the ability to reduce bandwidth required for transmitting live video.

See What You’re Missing

Leveraging video for banking fraud investigation

By Daniel Caggiula

Fraud prevention, it’s time to get better acquainted with your security team. You may see them in the hallways, have a coffee with them in the breakroom, and possibly join them on the dance floor at your annual holiday party.

Emergency Security

Ambulance company boosts security and reduces costs with key management

By Fernando Pires

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

Security by the Book

Security by the Book

By Ralph C. Jensen

Pick any county in the United States, money is scarce to non-existent, and in the pecking order of who gets the available money, the county library is way down the line.

Triggers for Transition

The best times to upgrade access control technology

By Brandon Arcment

It can be difficult to decide whether and when to make the transition to new access control technology. Transitions are often delayed over budget concerns or because of worries that the process will adversely impact productivity and workflow.


Terminal Upgrade

Industry Vertical

Terminal Upgrade

JFK Airport improves functionality and image quality

By Courtney Pedersen

Terminal One at JFK International Airport had relied on a limited analog surveillance system and a separate, older IP system that were independent of each other.

Controlling The Keys

Industry Professional

Controlling The Keys

School district deploys access control system

By Jennifer Robinson

After a year of in–depth research and testing of many systems, the RJUSD found CyberLock’s access control system to be the solution that best fit the district’s needs, including installation and maintenance.

Industry Focus

Alarming Trend with Police

By Ralph C. Jensen

I’ve been writing, professionally, for 40 years. The first story that I ever worked on was a triple homicide, and a contract murder that was related. Back then, I didn’t think reporting could get any worse.

Networking Security

Making IP Video Cyber Secure

How financial institutions should be implementing video surveillance on their networks

By Stephen Joseph

Financial institutions have been historically slow to adopt IP video surveillance citing concerns about possibly compromising network security.

Stop Lingering

Software updates hold the key to cyber security

By John Szczygiel

Security threats are on the rise and as IT security teams increase their scrutiny of all network-connected devices, it’s time for some new thinking about the design and maintenance of building security systems.

The Connected World

The Connected World

Vital requirements exist for convenience and efficiency

By Ken LaMarca

The abundance of networked solutions and devices—both security and nonsecurity— has exploded in recent years, providing unparalleled convenience and efficiency.

Dissecting the Advantages

Realizing the cost benefits for small- and medium-size businesses

By Don Campbell

Physical identity access management (PIAM) solutions have changed the way leading organizations approach security.


New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3