You can also view this issue in our new Security Products magazine Digital Edition format.

June 2008


Features

Making a Break

By Del V. Salvi

Rewind to the year 1991. Literally. After 14 years of overused VHS tapes, programmable VCRs and older matrix switchers, the Dearborn County, Ind., Sheriff ’s Department was overdue for an upgrade to its video surveillance system. The deputies and officers wanted a security system that would allow them to depend less upon manned in-house security and more upon digital, PC-controlled cameras and recorders.


Handy Prescription

By Jon Mooney

A biometric device identifies a person via a unique human characteristic, such as the pattern of a fingerprint or the size and shape of a hand or face. As a result, biometrics ensure the bad guys stay out and the good guys get in to the hospital. When used for time and attendance applications, biometrics attest that the person clocking in is really who she says she is, eliminating timecard fraud caused by buddy punching.


In the Public Eye

By Ralph C. Jensen

Building automation has revitalized public safety in Puerto Rico by employing a video surveillance system that improves communication throughout the police force and centralizes public housing issues.


Delivering Results

By Andy Hilverda

The earliest forms of postal communications within New Zealand were haphazard at best. Being a maritime country made up of three main islands and a number of smaller offshore islands, the first residents were primarily missionaries, whalers and traders. Residents had to rely on occasional passing ships for mail. Eventually, the establishment of settlements across the north and south islands brought the need for structured postal services—and New Zealand Post was established.


No Strings Attached

By Ray Shilling

Much attention has been given to the development and deployment of IP-based video surveillance systems. However, the adoption rate of these new technologies has been slowed, in part, by the heavy bandwidth consumption of video streams and their adverse impact on the network.


On the Fast Track

By Jaap Groot

An organization suspects that an employee is not following his or her route. In the past, a security manager would personally follow the employee or instruct someone to do so. This tactic is time consuming, especially if, on that particular day, the employee actually goes where he’s supposed to go.


Online Exclusive

Disaster Preparation for the 21st Century Business

By Richard Daley

Business is all about managing risk, and risk management comes down to making solid business decisions to avoid and mitigate potential threats, including natural disasters.


Safe and Risk-Managed

By Kevin McDonald

While every individual and organization that provides security products or services will have their spin on what security is and how to achieve the desired level, the truth is, security is essentially an unachievable outcome. A common definition of security is, “freedom from danger, fear and anxiety.” Security defined as such is, therefore, unattainable.


Going Places

By Jack Smith

Transportation affects people every day. They depend on the safe and efficient operation of airports, mass transit systems and roadways for work, personal travel and commercial business.


Network-Centric Security, June 2008

• The Smart, Secure Building: Planners seek to tie security systems to building automation
• Healthcare Data Security: Why it’s in need of care
• Cleaning up Montebello: Wireless surveillance erases a graffiti problem


Safe, Secure and Sophisticated

By Tim Trautman

With 30 years’ experience as a volunteer firefighter, Steve Merola has a special appreciation for alarm technology. The New York based custom integrator wishes more of his customers had the same attitude.


The Data Defenders

By Bill Piwonka

Twenty-five million records containing personal information lost by the U.K. tax authority. Personal and confidential health records found on a USB stick by a university student. NATO secrets on a USB stick found in a Stockholm library. Sensitive personal information lost on a flash drive by the Iowa Department of Natural Resources. Fertility treatment information on 3,100 patients lost.


Like Gang Busters

By Thomas W. Leo, CPP

Most people who read the newspaper or pay any attention at all to what is happening are aware of the porosity of our borders. People also are aware that the current administration, the two major political parties and Congress seem unwilling to do anything about it.


Departments

'Green' Gains Steam

By Megan Weadock

In 1999, it was "Y2K." "Chad" in 2000. Each year, the American Dialect Society chooses the word of the year, a word that had enough impact to summarize the year as a whole.


Hospital Security 2.0

By Ralph C. Jensen


Breach In Delivery

By John Livingston

To avoid becoming the next media headline, healthcare organizations now must demonstrate that they know where their mobile computers are


Ask the Expert

By J. Matthew Ladd


From the Product Manager's POV


Not a Sure Bet

By Jason Schmitt

Digital video has become the buzzword for all modern surveillance systems, but networked, or IP, video is still anything but a sure bet—despite its numerous benefits.


Upcoming Webinar

5/23: Aligning your physical security infrastructure with your organizational growth strategy
Learn how several global organizations have executed enterprise security risk management strategies to clearly define a vision of the future and innovative solutions to solve critical business problems and lower risk.