Security Today Magazine Digital Edition - August 2017

August 2017

  • The First Rule, Encrypt
  • Gearing Up for the Challenge
  • Curbing the Violence
  • Implementing a Data-centric Approach
  • Securing the City


Features

Curbing the Violence

Curbing the Violence

Violence in the workplace continues to escalate; healthcare workers at risk

By Paul Baratta

Let me let you in on a troubling, not-so-little secret: violence in the workplace is continuing to escalate in medical facilities, despite the fact that national assault rates have been dropping in recent years.


The First Rule, Encrypt

When implementing a card-based system, protect yourself

By Scott Lindley

It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems go beyond.


Implementing a Data-centric Approach

Reducing costs is as equally important goal in operating an enterprise

By Kim Rahfaldt

A company is much more complex than an IT department or a number of buildings. It is always evolving and adding more servers, buildings and systems, and therefore, obtaining more risk, costs and threats.


We See You

We See You

Do you know who’s lurking beyond your cameras?

By Robert Jones

The last major advancement in commercial perimeter security was the introduction of CCTV cameras.


On the Tip of their Toes

On the Tip of their Toes

Fresno PD may have technology advantage in their backyard

By Ralph C. Jensen

No matter where any given city places a video surveillance camera, there are privacy concerns. There is, however, another side to the story.


Securing the City

Securing the City

How a new generation of video analytics is empowering the next generation of superheroes

Thanks to new advancements in video analytics technology and powerful Internet of Things (IoT) edge devices; these superheroes can now be armed with new superhuman capabilities to better protect us.


Think About the Future

Think About the Future

Surveillance used to protect people, places and assets

By Rod Coles

Video is a natural choice for security because as humans, we use our eyes more than any of our other senses.


The Potential of Biometrics

The Potential of Biometrics

Understand its uses for banking customers and employees

By Bill Spence

Many financial institutions are looking to biometrics to enhance customer trust and convenience, and for securing the bank enterprise and facilities.


Gearing Up for the Challenge

Gearing Up for the Challenge

Securing and protecting one of the largest U.S. sporting complexes

By Chuck Han

While the goal of this campus was to provide a facility for athletes to compete, it was the family, friends and spectators who had a big impact on how it was designed.


Departments

Industry Professional

Metro Proof

Securing the Amsterdam Metro Underground

By John Moa

The lock system of the Amsterdam underground is quite extensive and includes 2,574 cylinders. GVB was able to find and implement a system that solved their key issues as well as environmental issues.


Industry Focus

It Matters Where Its Made

By Ralph C. Jensen

When you walk through the CyberLock facility with Tammy Davis, you truly get a sense of pride, responsibility and an amazing relationship she has developed within the community.


Industry Vertical

Being Connected

Examining why closed-network systems are not immune to cyber threats and how cloud services add layers of security to minimize risk

By Francis Lachance

The security of corporate data is critical to the integrity of operations. Yet, everywhere we turn, it seems like another company has become victim to some form of cyber threat, malware or ransomware attack.


Networking Security

Encryption to Cyber Bullying

By Ralph C. Jensen

The most pervasive cyber threat in the past 11 years has been ransomware infections. Who would have even known about something like this 30 years ago, but here we are trying with all diligence to protect folders and files, or even worse, the entire hard drive.


The Backbone

The Backbone

Security fundamentals form a line of protection

By Jeffrey Carpenter

For many years, the sage advice for cybersecurity leaders has been to take a layered approach to security, and those words have served the industry well. Unfortunately, cracks in those layers continue to leave organizations vulnerable to security attacks.


How to Respond - Encryption is used to foil decryption tools

How to Respond

Encryption is used to foil decryption tools

By Rishi Bhargava

Between 2005 and 2016, ransomware infections were more common than data breaches, making them the most pervasive cyber threat of the last 11 years. Ransomware attacks may encrypt folders and files or even the entire hard drive, or they may just lock the devices so that users cannot access them.


Protecting ATM Connections

Amid security threats, end users must consider IoT and M2M

By Julian Weinberger

With the rising popularity of the Internet accessible machines, the need to protect connections between the disparate ATMs and the banks’ processing centers became critical.


Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3