Security Today Magazine Digital Edition - February 2018

February 2018

  • Banking on Efficiency
  • Ante Up
  • Metro Security
  • A Balancing Act
  • Four Video Storage Trends to Watch


Features

Ante Up

Casino lighting no longer compromises video clarity

By Chris Cavey

Like many gaming venues, the lighting scheme at the Hard Rock Hotel & Casino in Tulsa, Okla., focuses on creating an atmosphere of fun and excitement.


Metro Security

Cover Story

Metro Security

Bexar County Texas uses best of breed security systems to launch EOC

By Ralph C. Jensen

It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility.


Luxury in Your Apartment

Luxury in Your Apartment

New Kansas City homes offer best in security, plus convenience

By Howard Carder

Commerce Tower on Main, in Kansas City, Mo., is redefining downtown apartment living by creating an energy-efficient, vertical neighborhood with luxury apartments, exclusive amenities and a connected lifestyle.


Transforming Security

Transforming Security

Remote video anchors the security of widespread electrical substations in Guatemala

By Courtney Pedersen

Empresa Eléctrica de Guatemala (EEGSA Group) required a video surveillance system that could digitize the security footage on its substations to help avoid damage to its own infrastructure as well as electrocution hazards for people trying to access these places without warning or authorization.


Banking on Efficiency

Banking on Efficiency

Maintaining financial services compliance requirements

By Kim Rahfaldt

Operating in more than 4,000 buildings, one of the largest U.S. banks could not keep up with the onboarding and off-boarding of 300,000-plus employees, contractors, vendors and visitors.


A Balancing Act

A Balancing Act

Cybersecurity takes a look at availability and protection

By Jonathan Lewit

Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis.


Four Video Storage Trends to Watch

Four Video Storage Trends to Watch

How organizations must navigate the evolving storage landscape

By Eric Polet

Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.


The Right Fit

The Right Fit

Choosing the appropriate access control solution for a retro

By Gordon Holmes

Standalone systems, where certain access points are equipped with card readers but are not connected to a larger network, can provide a cost-effective access control solution.


Departments

Industry Focus

Serious About All Security

By Ralph C. Jensen

I read a recent news story I wanted to share and make aware of the ramifications. After nearly disappearing in the 1990s, the spread of child sexual abuse material exploded with the rise of the internet, while child sex trafficking increased with exposure to a greater market online. Today, the problem is complex and still growing.


Industry Professional

How to Plan for Product Updates

By Bruce Czerwinski

Making changes to an existing product is more than adding a tweak here and a new feature there.


Networking Security

The Cost of Cybercrime

The Cost of Cybercrime

Consider these best practices to ensure a secure network

By Jennifer Hackenburg

Cybercrime is a large and dangerous business and it impacts individuals, businesses and governments worldwide.


Locking the Cabinet

Locking the Cabinet

Forsythe drives new business with innovation

By Howard Carder

Providing independent consulting, best-inclass products, hosting solutions and financial services to more than 1,000 U.S.- and Canada-based companies, Forsythe is one of the largest independent IT integrators in North America.


Know Your Enemy

By Ralph C. Jensen

Like it or not, every time you spend time on the keyboard, there may be someone watching your every keystroke. It wouldn’t hurt if you knew your enemy; and it certainly would be beneficial if you knew who was on your side.


Why Do Commonly Used Security Measures Fail

Why Do Commonly Used Security Measures Fail

A simple firewall used to be effective; those days have long since disappeared

By Csaba Krasznay

Information security is defined as a reactive activity, as it involves managing risks that may have a serious effect on the organization if they occur.


Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3