- Cash in Transit
- Processing Security
- Bigger is Getting Better
- Growing Adoption
- Seeing the Potential
Voice is evolving as an active partner in the security industry
We all are talking to machines these days. We talk to assistants in our home, in our cars and on our phones. By using our voice, we feel more engaged. We also become more productive, freeing our hands and minds for other tasks.
Leveraging drones despite the lack of communications infrastructure
Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts.
Blending digital and traditional security at your facility
Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.
If you think Amazon isn’t a threat to you, think again
If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.
Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.
Parking agencies are gathering infraction evidence more easily
About two million people are affected by workplace violence every year in the United States. Some of these people are parking enforcement officers.
Enhanced electronic locking systems to accommodate unique security needs of ATMs
By definition, cash-in-transit (CIT) is the physical transfer of banknotes, coins, credit cards and items of value from one location to another.
Canadian metals firm deploys thermal imagers and HD cameras
The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.
Now is the time for new leaders to emerge within the industry
Technology innovations are being introduced to the market at an increasingly accelerated pace and the established multi-national companies that have long enjoyed strong market shares and growth rates are being challenged by hundreds of startups.
SMG/The Moscone Center undertaking complete security renovation
Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.
Cloud and trusted identity technologies drive more intelligent customer experiences
One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages
Too many IT departments lack policies to help employees protect data
People are fallible creatures. As the saying goes, nobody’s perfect.
The market is wide open for cloud-based access systems
As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.
There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.
IP-based digital capabilities have surpassed quality and edge processing capabilities
In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.
Analysts are challenging malicious extension risks
Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses.
From The Editor
Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.
Solving healthcare issues while improving efficiency and patient care
Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data
Business travelers need to maintain secure connectivity
With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.
Every project must ensure best practices
Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.