Security Today Magazine Digital Edition - March 2019

March 2019

  • Continued Integrity
  • Looking Beyond the Hype
  • The Uberization of Security Business Model
  • A Secure Healthcare Prescription
  • Automating Critical Environments


Features

Leveraging Thermal Against Threats

Leveraging Thermal Against Threats

By Fredrik Wallberg

Artificial intelligence continues to redefine the capabilities of physical security systems and shape customer demands.


Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

By Richard Diver

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.


A Secure Healthcare Prescription

A Secure Healthcare Prescription

By Courtney Dillon Pedersen

Hospitals and other healthcare facilities face unique security and surveillance challenges.


The Uberization of Security’s Business Model

The Uberization of Security’s Business Model

By Ed Bacco

Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).


Automating Critical Environments

Automating Critical Environments

By Brent Boekestein

As key stakeholders look to implement AI into their workflow, many find that security and safety is a commonsense place to begin.


Continued Integrity

Continued Integrity

By Michael Bone

For the County of Travis in Austin, Texas, research, dedication and the right team resulted in the perfect integrated security solution for its sprawling campus and multi-location facilities.


Creating User-Centric Citizen Identity Programs

Creating User-Centric Citizen Identity Programs

By Steve Warne

Governments are implementing innovative programs that are revolutionizing how the world looks at identity and citizenship.


Looking Beyond the Hype

Looking Beyond the Hype

By Sean Lawlor

The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.


Protecting Mining and Quarry Operations

Protecting Mining and Quarry Operations

By Dana Pruiett

Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes.


Addressing Heightened Threats

Addressing Heightened Threats

By Michael Masters

The attack on a Jewish institution comes amidst unprecedented year-over-year increases in anti-Semitic incidents and hate crimes directed against the Jewish community in North America.


The Flaws and Dangers of Facial Recognition

The Flaws and Dangers of Facial Recognition

By Martin Zizi

When dealing with airport and border security, we need databases, we need to share information and we need law enforcement.


Are You Throwing Money Away

Are You Throwing Money Away

By Scott Seraboff

Millions of video surveillance cameras around the world are losing money.


Making it Work

Making it Work

By Tim Williams

The first step in any security plan is assessing the risk that could impact a company, venue and/or business sector.


The Future Looks a Lot Like You and Me

The Future Looks a Lot Like You and Me

By Denis Petrov

From simple photo IDs of the past to 2D barcodes and the now ubiquitous use of video cameras, businesses, schools and venues are constantly looking for better ways to protect people and property.


Dealer Strategies

More Than Just Security

By Bob Dolan

As technology has advanced, security has branched out beyond simple surveillance and intruder deterrence.


Selecting the Right Access Control System

Selecting the Right Access Control System

By J. Matthew Ladd

With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.


New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.