Security Today Magazine Digital Edition - March 2020

March 2020

  • Transforming the Industry
  • All About the Data
  • Create a Standardized Platform
  • Defining Performance Criteria
  • Airport IoT Operations


Cover Story

Transforming the Industry

Transforming the Industry

AI enabled cameras are poised to make a signifi cant impact in security

By Ray Cooke

Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.


Features

Trucking fleets may be the next targets of ransomware

The Next Victims

Trucking fleets may be the next targets of ransomware

By Moshe Shlisel

Among the common types of cybersecurity attacks perpetrated on enterprises, arguably none are as sophisticated, effective or lucrative as ransomware is today.


The Chickasaw Nation standardizes video technologies to secure one of the world’s largest casinos

The Open Platform

The Chickasaw Nation standardizes video technologies to secure one of the world’s largest casinos

By Ralph C. Jensen

The Chickasaw Nation is a federally recognized, independent Native American nation located in south-central Oklahoma. The nation’s territory covers more than 7,600 square miles and is home to a population of nearly 70,000.


Secure Your Containers

Maintaining the integrity of cloud containers is critical

By Ambuj Kumar

Development and deployment of container-based software has become a popular movement in technology.


Galileo Delivers

Army Corps of Engineers delivers a captivating visitor experience

By Michael Callahan

ERDC enlisted the services of M3 Technology Group, an audio-visual integrator based in Nashville, Tennessee, to create a unique audio-visual experience not seen in other government facilities.


Validate Your Security Model

Validate Your Security Model

Amid growing threats, organizations must evaluate the holes and weaknesses in their systems

By Marcus Carey

As security threats grow in complexity and scale, organizations are spending major resources to address the threats and minimize risk, including hiring top security talent and purchasing sevenfigure security solutions.


Common Mistakes

With a cybersecurity skills gap and a growing threat landscape, attacks have become a regular occurrence

By Dan Hoban

As the cyber threat landscape has matured and evolved, cybersecurity incidents have become a regular occurrence.


Ohio County Taps Startups for Automation

By Stephanie Kanowitz

Officials in Cuyahoga County, Ohio are looking to digitize and automate paper-based processes at several agencies through a program that encourages governments, startups and small businesses to collaborate on solutions.


Implementing Commercial Security

State-of-the-art solution should start with a well-trained staff

By Jim Geyer

Commercial buildings face a universal challenge: how to manage security without encroaching on tenant privacy, comfort and experience.


Policy Bill Includes Cyber Investments

Congress agrees on 2020 National Defense Authorization Act

By Lauren C. Williams

Data on OTAs and prototypes. The House proposed an annual reporting requirement on how the Defense Department is using OTAs.


All About the Data

All About the Data

How video and audio analytics deliver an intelligent advantage

By Joe Morgan

When you consider today’s smartphones, the phone part is almost ancillary. It’s really the apps and the advanced optics that drive the purchase.


It Takes a Village

It Takes a Village

Atlanta chooses to deploy force multiplier to aid officers in protecting the city

By Kevin Taylor

As the city began strategically deploying surveillance cameras throughout Atlanta, APF invested $350,000 to create the cuttingedge Loudermilk Operation Shield Video Integration Center (VIC).


This is Big Business

This is Big Business

How security and safety companies can grow through government procurement

By Ben Vaught

When it comes to government contracting, security spending is big business—and small business too.


Essential Management

Essential Management

Take a look at the elements implemented by great integrators

By Dan Rothrock

There are essential elements that great integrators and managed service providers have that set them apart from the competition.


Airport IoT Operations

Intelligent devices taking off fueled by AI

By Hartmut Schaper

The Internet of Things (IoT) has landed in airport operations. More than 20 billion end devices are already networked via the Internet, and there will likely be three times more than this by 2025, according to Statista.


Transforming Healthcare Security

Transforming Healthcare Security

Understanding what situations need to be addressed

By Pat Scheckel

Security is a top priority at healthcare facilities across the country, but developing and deploying an effective healthcare security strategy is a challenging process.


Defining Performance Criteria

Defining Performance Criteria

Integrating the right equipment for each surveillance goal

By Jason Oakley

There are good reasons that video surveillance is mandated for any casino operation by both federal and state gaming authorities – it has proven to be an effective tool to help ensure safety,


Reconsidering Used Equipment

Reconsidering Used Equipment

Choosing the cheaper option may be tempting, but organizations risk long-term consequences

By Kurt Measom

Once you have made the decision to install a security entrance, you may find that your search for a provider brings you to used turnstiles, revolving doors or portals for sale. Naturally, these tend to be cheaper than new products.


Departments

INDUSTRY FOCUS

Surviving The Tough Times

By Ralph C. Jensen

Dayton, Ohio, has seen a lot of ups and downs over the years. The city is more than a survivor as businesses find a way to keep their doors open, and today, even attract some very interesting tech firms.


Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3