September 2018
- Cash in Transit
- Processing Security
- Bigger is Getting Better
- Growing Adoption
- Seeing the Potential
Cover Story
Voice is evolving as an active partner in the security industry
By Jim Hoffpauir
We all are talking to machines these days. We talk to assistants in our home, in our cars and on our phones. By using our voice, we feel more engaged. We also become more productive, freeing our hands and minds for other tasks.
Features
SMG/The Moscone Center undertaking complete security renovation
By Ralph C. Jensen
Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.
The market is wide open for cloud-based access systems
By Tom Potosnak
As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.
Cloud and trusted identity technologies drive more intelligent customer experiences
By Ian Lowe, Mark Robinton
One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages
Enhanced electronic locking systems to accommodate unique security needs of ATMs
By Travis Ferry
By definition, cash-in-transit (CIT) is the physical transfer of banknotes, coins, credit cards and items of value from one location to another.
If you think Amazon isn’t a threat to you, think again
By Scott Lindley
If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.
Too many IT departments lack policies to help employees protect data
By Jason Cronk
People are fallible creatures. As the saying goes, nobody’s perfect.
Leveraging drones despite the lack of communications infrastructure
By Matthew Leonard
Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts.
By Andrew Jimenez
Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.
Parking agencies are gathering infraction evidence more easily
By Chris Yigit
About two million people are affected by workplace violence every year in the United States. Some of these people are parking enforcement officers.
Canadian metals firm deploys thermal imagers and HD cameras
By Suzi Abell
The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.
Blending digital and traditional security at your facility
By Peter Boriskin
Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.
Now is the time for new leaders to emerge within the industry
By Robert Lydic
Technology innovations are being introduced to the market at an increasingly accelerated pace and the established multi-national companies that have long enjoyed strong market shares and growth rates are being challenged by hundreds of startups.
Departments
Industry Professional
IP-based digital capabilities have surpassed quality and edge processing capabilities
By Vince Ricco
In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.
Industry Focus
By Ralph C. Jensen
There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.
Networking Security
Every project must ensure best practices
By Paul Garms, Sean Murphy
Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.
From The Editor
By Ralph C. Jensen
Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.
Solving healthcare issues while improving efficiency and patient care
By Sheila Loy
Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data
Analysts are challenging malicious extension risks
By David Pearson
Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses.
Business travelers need to maintain secure connectivity
By Julian Weinberger
With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.