Security Today Magazine Digital Edition - July August 2019

July/August 2019

  • Moving to the Door
  • A Winning Security Plan
  • Relying on Power
  • Thermal Imagers Deployed
  • Using Mass Notification


Cover Story

Moving to the Door

Moving to the Door

Biometrics makes its way across the enterprise

By Steve Carney

Biometrics have rapidly expanded into our daily lives, as millions of people use fingerprints to unlock their mobile phones, access cash through ATMs, and verify their identity in a growing range of use cases.


Features

Relying on Power

Relying on Power

Mohegan Tribe surveillance operations seek bold network connectivity

By Ralph C. Jensen

Mohegan Sun is a premier gaming and resort destination covering 185 acres of reservation land along the banks of the Thames River in the foothills of southeastern Connecticut. First opened on Oct. 12, 1996, Mohegan Sun can truly be classified as a mega- resort.


Shielding the Attendees

Shielding the Attendees

Vehicle tragedies emphasize need for pedestrian protection at large events

By Greg Hamm

By their very nature, terrorist attacks and errant drivers, who can also create untold damage, are unpredictable and predicated on surprise.


A Winning Security Plan

A Winning Security Plan

Milwaukee Bucks protect new Fiserv Forum arena and growing downtown entertainment district with intelligent surveillance solution

By Mark McCormack

In the world of sports, oftentimes there’s as much action in the stands as there is on the floor. That’s why the Milwaukee Bucks felt it was so important to design their new stadium with a network of security cameras to safeguard the welfare of players and fans alike.


Gaining Customer Trust

Gaining Customer Trust

In a new era of digital identities, data breaches are growing and here to stay

By Christina Luttrell

Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.


Protecting His House

Protecting His House

Long recognized as a welcoming environment, churches now consider protection

By Dana Pruiett

Criminals often view houses of worship as soft targets. The mission of these groups needn’t change but for the safety of clergy and congregants, leaders must commit to hardening their facilities against those that would do them harm.


Thermal Imagers Deployed

Thermal Imagers Deployed

Canadian metals processor steps up with thermal assistance and HD cameras

By Suzi Abell

Dominion Nickel Alloys Ltd. operates on a global scale. Dominion specializes in the purchasing, sorting, processing, and marketing of a broad range of high temperature and specialty nickel-based alloys.


Safe in Sound

New IP microphone technology takes center stage

By Richard Brent

While video surveillance often takes center stage in security deployments, equally as important is audio.


Using Mass Notification

Installing a system at sporting and event complexes that benefit attendees

By Paul Shain

Event venues and sporting complexes pose unique security and communication challenges. Numerous factors, including crowd size, whether the event is indoors or outdoors and what time of day the event is taking place all impact how a safety plan is developed.


Encrypted USB Drives

One of the most effective, cost-efficient cybersecurity solutions

By Richard Kanadjian

The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.


Don’t Reinvent the Wheel

Don’t Reinvent the Wheel

Six critical cybersecurity issues for video networks

By Moses Anderson

As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.


Departments

INDUSTRY FOCUS

Ready Set Tackle

By Ralph C. Jensen

Being a TSA agent at Phoenix Sky Harbor International Airport doesn’t mean you have to understand the game of football or does it?


Networking Security

Changing the SIEM Game

Making the investment for storage, processing and infrastructure support

By Mike Sprunger

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.


Advanced VMS and Analytics

Improving blockchain workflows for the shipping industry

By Aluisio Figueiredo

The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.


Plan Might Have a Weakness

Plan Might Have a Weakness

Cybercriminals can cause a security breach for unprepared organization

By Greg Schreiber

Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.


A Word of Caution

Avoid portals in your mobile access control implementation

By Scott Lindley

A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.


  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety