Security Today Magazine Digital Edition - September 2018

September 2018

  • Cash in Transit
  • Processing Security
  • Bigger is Getting Better
  • Growing Adoption
  • Seeing the Potential


Cover Story

The Age of Voice

The Age of Voice

Voice is evolving as an active partner in the security industry

By Jim Hoffpauir

We all are talking to machines these days. We talk to assistants in our home, in our cars and on our phones. By using our voice, we feel more engaged. We also become more productive, freeing our hands and minds for other tasks.


Features

Expanding Rural Infrastructure for Drones

Expanding Rural Infrastructure for Drones

Leveraging drones despite the lack of communications infrastructure

By Matthew Leonard

Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts.


Comparing Wireless Communication Protocols

By Andrew Jimenez

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.


Tackling Parking Officer Abuse with Unified Evidence

Tackling Parking Officer Abuse with Unified Evidence

Parking agencies are gathering infraction evidence more easily

By Chris Yigit

About two million people are affected by workplace violence every year in the United States. Some of these people are parking enforcement officers.


Processing Security

Processing Security

Canadian metals firm deploys thermal imagers and HD cameras

By Suzi Abell

The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.


Just Say “Yes” to the Cloud

Just Say “Yes” to the Cloud

Blending digital and traditional security at your facility

By Peter Boriskin

Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.


The Door is Open

The Door is Open

Now is the time for new leaders to emerge within the industry

By Robert Lydic

Technology innovations are being introduced to the market at an increasingly accelerated pace and the established multi-national companies that have long enjoyed strong market shares and growth rates are being challenged by hundreds of startups.


Bigger is Getting Better

Bigger is Getting Better

SMG/The Moscone Center undertaking complete security renovation

By Ralph C. Jensen

Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.


Opening New Opportunities

Opening New Opportunities

The market is wide open for cloud-based access systems

By Tom Potosnak

As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.


Growing Adoption

Cloud and trusted identity technologies drive more intelligent customer experiences

By Ian Lowe, Mark Robinton

One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages


Cash In Transit

Enhanced electronic locking systems to accommodate unique security needs of ATMs

By Travis Ferry

By definition, cash-in-transit (CIT) is the physical transfer of banknotes, coins, credit cards and items of value from one location to another.


How to Protect Your Business from Amazon

How to Protect Your Business from Amazon

If you think Amazon isn’t a threat to you, think again

By Scott Lindley

If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.


Your Top Data-Exposure Risk: Employees

Too many IT departments lack policies to help employees protect data

By Jason Cronk

People are fallible creatures. As the saying goes, nobody’s perfect.


Departments

Industry Professional

Transitioning from Video to Vision

IP-based digital capabilities have surpassed quality and edge processing capabilities

By Vince Ricco

In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.


Industry Focus

Crossing the Border at Your Peril

By Ralph C. Jensen

There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.


Networking Security

Flying Under the Radar

Flying Under the Radar

Business travelers need to maintain secure connectivity

By Julian Weinberger

With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.


Consider Data Security

Consider Data Security

Every project must ensure best practices

By Paul Garms, Sean Murphy

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.


From The Editor

Cyber and Security

By Ralph C. Jensen

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.


Cybersecurity Challenges

Cybersecurity Challenges

Solving healthcare issues while improving efficiency and patient care

By Sheila Loy

Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data


A Browsing Challenge

A Browsing Challenge

Analysts are challenging malicious extension risks

By David Pearson

Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses.


Digital Edition

  • Security Today Magazine - October 2018

    October 2018

    Featuring:

    • Streamlined for Success
    • Making Your Expertise Unique
    • An Eye on the Campus
    • Solving Problems
    • Enhancing Security

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety