You can also view this issue in our new Security Products magazine Digital Edition format.

July 2008


Features

Who Has the Keys?

By Mike McGovern

There is a mistaken belief among some that the use of traditional mechanical keys is becoming less important with the proliferation and evolution of sophisticated access control technology. The fact is, traditional mechanical keys are more common than ever, and today’s security awareness dictates these keys be tracked, monitored and managed effectively.


Answer the Call

By Steve Walker

Across the United States, many cities are successfully reducing false alarm dispatches. Each municipality is attributing success to a variety of reasons: alarm verification requirements, alarm system registration, false alarm fees, alarm user training and improved security equipment technology. Two common reasons cited for this success are the strong collaboration among law enforcement, the alarm industry and alarm users, and the expansion of verified response services by alarm companies.


High Demand, Short Supply

By John Venator

Information security is a top priority for many organizations. Increasing security concerns regarding the use of hand-held devices, mobile and remote workers, VoIP technology and a host of other issues affect almost every organization. Yet a recent study indicates that the individuals responsible for maintaining data and network security may not have the skills to do so.


Is Our Telecomm Infrastructure Secure?

By Andy Hilverda

The events of Sept. 11, 2001, and the 2005 hurricane season emphasized U.S. dependence on an effective national telecommunications infrastructure. Telecommunication companies are a critical part of America’s infrastructure and key to securing the homeland in times of emergency. Reliable, resilient communication services can provide the bridge between emergency responders, firefighters and law enforcement for cohesive emergency management.


The Heat Is On

By David Lee

When many security professionals think of thermal security cameras, they think of exotic cameras with long-range, high-resolution performance that can cost as much as a nice car and feature applications befitting their high-end status: border security, huge industrial facilities and the like.


An Eye Under the Sky

By Peter McKee


Getting the Green Light

By Kim Rahfaldt

The transportation industry relies on an inherently open architecture and is a complex critical infrastructure where free movement is necessary as people move within and between modes of transportation. This freedom of movement must be maintained for transit to perform its basic functions. Due to the volume of people in public places using various means of transportation, ensuring safety and monitoring all of the movement can be difficult and challenging.


Doing More With Less

By Brent Hamachek

Drug store giant Walgreens has just completed installing and networking Ionit Technologies Inc.’s DVR system to monitor, manage and protect more than 6,200 stores, facilities and distribution centers around the country.


The Digital Revolution

We now live in a digital world. Digital technology, just like the air we breathe, has penetrated our social life in every respect, including surveillance systems in the security industry.


Critically Speaking

By Mariann McDonagh

Critical infrastructure organizations are essential to the functioning of societies and economies. The role of these facilities in international commerce makes their security a top priority. But given the complex and often geographically dispersed nature of these facilities and assets, critical infrastructure security often presents a daunting challenge.


Supply and Demand

By Michael Regelski

There are two opposing forces at work in the security industry today. One is the growing sophistication of the customer base, and the other is wide-scale fragmentation, which has caused many systemic issues.


Departments

Questions and Answers From the Top

By Security Products Staff


Ask the Expert

By Dave Shelton


Going Undercover

By Ralph C. Jensen


Mistakes, Misconceptions, Myths

By Steve Duncan

As technology evolves, more and more enterprises become targets of highly sophisticated criminal organizations.


Something Old, Something New

By Megan Weadock

In both life and business, it’s always the lessons of the past that help to guide the future.


Upcoming Webinar

5/23: Aligning your physical security infrastructure with your organizational growth strategy
Learn how several global organizations have executed enterprise security risk management strategies to clearly define a vision of the future and innovative solutions to solve critical business problems and lower risk.