Security Today Magazine Digital Edition - May June 2022

May / June 2022

  • The Ying and Yang of Security
  • Protect Your Customers
  • Leveraging Surveillance
  • Using Mobile Data
  • Implementing Emerging Guidelines


Features

Using Mobile Data

Using Mobile Data

By Scott Lindley

One of the leading adaptors to mobile access control systems is the multi-family residential industry, an example being the high rise, luxury condominium that Quantuum Energy Products upgraded in downtown Sarasota, overlooking The Bay.


Building Business Resiliency

By Todd Miller

As workers return to the office, businesses must be prepared to protect their employees in any situation. From severe weather and medical emergencies to active assailants and cyberattacks, organizations must have resiliency plans in place.


Installing Smart Systems

Installing Smart Systems

By Jenny Lytle

Legacy entry systems will soon be obsolete as telecom companies begin to phase out the use of copper wiring. Security integrators who are serious about building their businesses should get in front of this inevitable transition to smart access control systems.


Implementing Emerging Guidelines

By Steve Hanna

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world.


Adding Force Multipliers

Adding Force Multipliers

By Kevin Taylor

There are more than 600,000 state and local law enforcement officers in the United States. Impressive, but with a U.S. population of more than 330 million–and growing–they have their work cut out for them.


Leveraging Surveillance

Leveraging Surveillance

By Keith Abuele

Mitigating loss is a primary objective of retailers everywhere. Historically, this has meant taking preventive actions against shrinkage, employee theft, and Organized Retail Crime (ORC). Today, retailers are confronted with a new threat as a rise in active shooter incidents has presented new challenges.


You’re Not Alone

You’re Not Alone

By Steve Bardocz

Is facility security something that you’re worried about? If you answered yes, you aren’t alone. According to the 2022 Ontic Center for Protective Intelligence Report, 88% of security correspondents are experiencing a dramatic increase in physical threat activity that is anticipated to grow this year.


Protect Your Customers

Protect Your Customers

By José Daniel García Espinel

In this digitally connected world, innovation and technology are at the forefront of security and safeguarding. As the landscape continues to evolve, businesses today are combining guarding services and technology to create a new security approach and elevate operational intelligence, primarily based on the security operations center (SOC) environment.


New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.