November 2017
- Keeping the Stars Aligned
- It's a Woman's World, Too
- 3 Access Control Trends to Watch
- Are We All in on Security
- Retail Under Fire
Features
Consider these best practices to stay on track
By Bruce Czerwinski
Multi-tenant buildings present security challenges not found in single-user facilities. Tenants may come and go at different times.
Cover Story
By Ralph C. Jensen
As with the technology in the industry, times are changing and Nancy Ford, and many other women, are now filling the rank and file of a booming industry.
How integrated paging and emergency solutions automate mass notification and communication tasks, reducing security workloads and human error
By L. William Nattress III
People are constantly on the move—particularly in busy transit hubs—and passengers need to know where they should be and by when.
Departments
Industry Vertical
Using video analytics to re-imagine financial strategy
By Stephen Joseph
While retailers have been incorporating video analytics into their daily operations for decades, financial institutions have lagged well behind the technology curve.
Industry Focus
By Ralph C. Jensen
I suppose it’s only a matter of time before another obscene, violent act will make headlines across the world. I do not wish for this, but these days it seems to be one wave after another.
Industry Professional
What makes enterprise-level merchants vulnerable to cyberattacks?
By Miguel Gracia
A recent data security report, published by Thales, revealed that 62 percent of all retailers worldwide have experienced a data breach within the past year.
Industry Trends
Before your next vendor meeting or tradeshow, tune into these defining trends related to door access systems
By Geoff Kohl
hile video surveillance may get all the attention—what with the stunning sharpness of 4K, the immersive experience of panoramic sensors and see-through-the-night capabilities— for most security projects, the door access control solutions are among the most important.
Networking Security
Connectivity is a hot topic in the IT world
By Mitchell Kane
The organizations of today have a wealth of technology at their fingertips, highlighting new features and advancements that are changing the way these entities do business, how people work and the interconnectivity between the two.
Security over the network comes with challenges and accolades
By Brian Simmons
A few advantages with IP-based systems worth mentioning are remote access anytime, anyplace; digital images do not degrade over time; real time analytic capability; and content distributed electronically quickly and easily.
By Ralph C. Jensen
More than a decade ago, it was all about analog cameras. My, how times have changed. By 2010, IP-based cameras were taking over the security duties, and doing a good job, but there were challenges.
7 ways criminals are making money from cyber crime
By Andrew Deen
As more of our lives move online, crime has unfortunately migrated to the internet at matching pace taking form in what’s now considered cybercrime.
Ransomware: How to stop it once and for all
By David Wagner
Ransomware attacks are becoming infamous. As I write now, the Petya attack is unfolding.
Dealer Strategies
Cover Story
By Ralph C. Jensen
There are a few things you should know about the consulting business in the security industry. First, it is a must to be a trusted security advisor.
Creating a special opportunity for salespeople
By Robert Ogle
Established security integrators often deal with prospects who are also considering solutions that let them eliminate live monitoring and keep an eye on their homes via smartphone.
What every integrator should know about the solution
By Larry Reed
To best leverage the advantages of biometrics, integrators should follow the tips outlined below to take advantage of the primary benefits of biometrics, which are enhanced security and convenience.
By Ralph C. Jensen
Boxerbaum was driven by good work and making the world a more secure place, but he also was a techie interested in futuristic gadgets.
Evaluating an entrance location based on end user goals
By Greg Schreiber
Many professionals in the security industry today tend to use the word “turnstile” to refer to all security entrances, when, in fact, there are actually multiple types of entrances for different applications, industries and levels of security.