Security Today Magazine Digital Edition - November 2017

November 2017

  • Keeping the Stars Aligned
  • It's a Woman's World, Too
  • 3 Access Control Trends to Watch
  • Are We All in on Security
  • Retail Under Fire


Features

Keeping the Stars Aligned

Consider these best practices to stay on track

By Bruce Czerwinski

Multi-tenant buildings present security challenges not found in single-user facilities. Tenants may come and go at different times.


It’s a Woman’s World

Cover Story

It’s a Woman’s World

By Ralph C. Jensen

As with the technology in the industry, times are changing and Nancy Ford, and many other women, are now filling the rank and file of a booming industry.


The New First Responder

The New First Responder

How integrated paging and emergency solutions automate mass notification and communication tasks, reducing security workloads and human error

By L. William Nattress III

People are constantly on the move—particularly in busy transit hubs—and passengers need to know where they should be and by when.


Departments

Branch Banking

Industry Vertical

Branch Banking

Using video analytics to re-imagine financial strategy

By Stephen Joseph

While retailers have been incorporating video analytics into their daily operations for decades, financial institutions have lagged well behind the technology curve.


Industry Focus

Are We All in on Security

By Ralph C. Jensen

I suppose it’s only a matter of time before another obscene, violent act will make headlines across the world. I do not wish for this, but these days it seems to be one wave after another.


Industry Professional

Retail Under Fire

What makes enterprise-level merchants vulnerable to cyberattacks?

By Miguel Gracia

A recent data security report, published by Thales, revealed that 62 percent of all retailers worldwide have experienced a data breach within the past year.


Industry Trends

3 Access Control Trends to Watch

Before your next vendor meeting or tradeshow, tune into these defining trends related to door access systems

By Geoff Kohl

hile video surveillance may get all the attention—what with the stunning sharpness of 4K, the immersive experience of panoramic sensors and see-through-the-night capabilities— for most security projects, the door access control solutions are among the most important.


Networking Security

The Age Of Collaboration

Connectivity is a hot topic in the IT world

By Mitchell Kane

The organizations of today have a wealth of technology at their fingertips, highlighting new features and advancements that are changing the way these entities do business, how people work and the interconnectivity between the two.


The IP Evolution

Security over the network comes with challenges and accolades

By Brian Simmons

A few advantages with IP-based systems worth mentioning are remote access anytime, anyplace; digital images do not degrade over time; real time analytic capability; and content distributed electronically quickly and easily.


Getting A Hold On The Bandwith

By Ralph C. Jensen

More than a decade ago, it was all about analog cameras. My, how times have changed. By 2010, IP-based cameras were taking over the security duties, and doing a good job, but there were challenges.


Criminal Intent

Criminal Intent

7 ways criminals are making money from cyber crime

By Andrew Deen

As more of our lives move online, crime has unfortunately migrated to the internet at matching pace taking form in what’s now considered cybercrime.


Held Hostage

Ransomware: How to stop it once and for all

By David Wagner

Ransomware attacks are becoming infamous. As I write now, the Petya attack is unfolding.


Dealer Strategies

Maintaining Customer Trust

Cover Story

Maintaining Customer Trust

By Ralph C. Jensen

There are a few things you should know about the consulting business in the security industry. First, it is a must to be a trusted security advisor.


Making the Case

Creating a special opportunity for salespeople

By Robert Ogle

Established security integrators often deal with prospects who are also considering solutions that let them eliminate live monitoring and keep an eye on their homes via smartphone.


Biometric Ideas

Biometric Ideas

What every integrator should know about the solution

By Larry Reed

To best leverage the advantages of biometrics, integrators should follow the tips outlined below to take advantage of the primary benefits of biometrics, which are enhanced security and convenience.


Putting the Customer First

By Ralph C. Jensen

Boxerbaum was driven by good work and making the world a more secure place, but he also was a techie interested in futuristic gadgets.


Its Not Just A Turnstile

Its Not Just A Turnstile

Evaluating an entrance location based on end user goals

By Greg Schreiber

Many professionals in the security industry today tend to use the word “turnstile” to refer to all security entrances, when, in fact, there are actually multiple types of entrances for different applications, industries and levels of security.


Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3