You can also view this issue in our new Security Products magazine Digital Edition format.

September 2009


Fundamental Facilities

By Jason Oakley

Technology from the security industry fulfills an essential role in protecting the nation's critical infrastructure. This is defined by a Homeland Security Presidential Directive as physical and virtual systems that are "so vital to the United States that [their] incapacity or destruction would have a debilitating impact on security, national economic security, national public health or safety."

In Control

By Tim Kraft

York County School Division in Yorktown, Va., has never had a major security problem, and that's the way they want to keep it. To ensure the security of their facility and safety of their students, officials installed security systems in each of their 23 facilities.

Unwavering Focus

By Tom Harada

A breakthrough in security optics technology, called Varifocal Plus, is expected to revolutionize the industry. The solution offers precise CCTV installations with total cost of ownership considerations. It also is expected to surpass conventional technology and create new marketing areas for the CCTV surveillance market by providing time-saving installation and commissioning through consistent focusing technology.

Deployment Strategies

By Avi Shabtay

As the necessity for public and personal safety increases, the demand for surveillance solutions requiring the most rigorous, video-based security standards continues to grow.

Chain of Command

By Guy Apple

A leading grocery chain's corporate security and loss prevention departments had requested an overall upgrade to the region's facility surveillance systems. These facilities included grocery stores with gas stations and regional distribution centers. The departments were directed to integrate the most cost-effective progressive technology, increase the camera count and be able to easily relocate existing cameras.

Who Are You?

By Ajay Jain

Airports exhibit one of the most complicated scenarios to administer restricted-area access control, identity verification and issuance of an access credential. Various airline employees, vendors, third-party contractors and tenants need to be authenticated at all times, and their physical access rights must be controlled and managed dynamically based upon their role and policies affecting their access.

When Seconds Count

By Chris Helm

When an emergency call is received at the communications center of the Regina Qu'Appelle Health Region in Regina, Saskatchewan, it could be originating from across the hall or from hundreds of miles away.

Ahoy! Port

By Kim Rahfaldt

The Port of Houston tenants more than 150 private industrial companies along the 25-mile-long Houston Ship Channel. The Port of Houston Authority owns and operates the public facilities located on the Houston Ship Channel, which extends over complicated terrain from downtown Houston to the Gulf of Mexico. The terminals were designed to handle virtually any kind of cargo, from heavy containers to dry bulk materials or frozen goods. The port also has two major container terminal locations to move large containers in and out of PHA.


Questions and Answers From the Top: Luis Orbegoso

By Security Products Staff

Lenel Systems International, part of the UTC Fire & Security Unit of United Technologies, has a long list of enterprise-scale applications—a who's who of top companies and institutions worldwide—that all depend on the company to integrate their security management functions. The latest addition is SkyPoint, a highly intuitive user interface for video surveillance system management that simplifies how users handle video and boosts the productivity of security personnel.

Network Questions & Answers with Bret McGowan

By Security Products Staff

Many people I've spoken to outside the security industry believe, regardless of the overall economy, that our market should always be experiencing growth due to the unrelenting need for better security. However, the truth is that security is still a capital investment and the budget for security gets reduced or removed just like any other expense during tough economic times.

Ask the Expert

By Steve Morefield

Thinking Beyond the Product

By B. Scott Haroff

Technology plays a dichotomous role in the security of an organization's information assets. While it enables us to protect assets in ways we never imagined, it also can enable the very threats that leave those assets vulnerable.

Into the Wild

By Sherleen Mahoney

On a typical day at Kruger National Park, the largest game reserve in South Africa, visitors on safari will encounter the Big Five—lions, African elephants, Cape buffalo, leopards and black rhinoceros—living in their natural habitat. In addition to the 147 species of mammals—more than any other African game reserve—the park is home to more than 500 bird and almost 2,000 flower and tree species.

Round the Clock

By Megan Weadock

In just a few weeks' time, the security industry will once again be converging on the annual ASIS International Seminar and Exhibits, this time in Anaheim, Calif.

Upcoming Webinar

5/23: Aligning your physical security infrastructure with your organizational growth strategy
Learn how several global organizations have executed enterprise security risk management strategies to clearly define a vision of the future and innovative solutions to solve critical business problems and lower risk.