July / August 2024
- Today's Enterprise
- Securing the Flow of Operation
- The Recipe for Stadium Security
- New Uses for AI
- Transformative Advances
Cover Story
From yesterday’s in-house server room to colocation at data centers
By Chris Hobbs
Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center.
Features
By Matt Fishback
Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers.
By Craig Herman
In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information.
If a camera recognizes the sound signature, it simply issues an alert
By Rui Barbosa
Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable.
By Florian Matusek
Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity.
By Aaron Saks
New applications of AI in IP cameras are delivering precise detection, robust search capabilities, elevated data analysis and enhanced image quality. When combined with built-in analytics, AI can help streamline forensic investigations and also supports several mission-critical business functions.
A comprehensive approach to stadium security begins with ingredients that aid situational awareness and incident response, while simultaneously creating a positive fan experience and boosting operational efficiencies
By Mark McCormack
The threat landscape of stadium security is fluid. Today’s venues and stadiums have operational security 24/7, hosting sporting events, community events, concerts, conventions and more – each with a unique visitor base and each with unique security risks.
Know which factors to focus on and how remote guarding can maximize technology, people and budget
By Scott Goldfine
Property managers have their hands full, especially when it comes to establishing successful security systems on their properties. There are many pieces to the puzzle that come together for a property to protect itself properly.
By Raffaele Ceravolo
The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly.
By Jamine Moton
Oftentimes, boutique security companies find themselves grappling with a unique set of challenges. Unlike their larger counterparts, these firms face obstacles stemming from limited resources, minimal peer-to-peer interactions and restricted access to cutting-edge technology.