 
                    
                                        
		            
                    How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
                    
			            - By Evan  Francen
- Aug 02, 2019
 
            
                
	                
                    
                                        
		            
                    While video surveillance often takes center stage in security deployments, equally as important is audio. 
                    
			            - By Richard  Brent
- Aug 01, 2019
 
            
                
	                
                    
                                        
		            
                    Although IP-based network cameras are the prevailing standard for new installations, it wasn’t that long ago that analog cameras, and the complex infrastructures required to support large numbers of them, were the only way to accomplish the job. 
                    
			            - By Robert  Wegner
- Jun 01, 2019
 
            
                
	                
                    
                                        
		            
                    At the start of every new year, I get a sampling of what new technologies are going to be introduced. Most of the time, I’m in way over my head. Sometimes I understand and relate to the solution, the technology and what it all means.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    When this upgrade project began in early 2017, there was a mix of standard-resolution legacy video cameras scattered throughout the facilities.
                    
			            - By Courtney Dillon Pedersen
- Jun 01, 2019
 
            
                
	                 
                    
                                        
		            
                    Most access control systems are focused on improving security and protecting the business, ensuring that only the right people have the right access to the right areas. It keeps the bad guys out and the good guys in. 
                    
			            - By John  Carter
- Jun 01, 2019
 
            
                
	                 
                    
                                        
		            
                    Today, many video surveillance systems use IP-based equipment, which sends recorded video across ethernet cabling to local, remote, and cloud-based recorders, often using the same LAN infrastructure that is used by general office workers.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    And harness their power.
                    
			            - By Matt  Johnson
- Apr 08, 2019
 
            
    
                
	                
                    
                                        
		            
                    Every interview I get for the magazine is enjoyable, and even entertaining. Every conversation is a story but once in a while I have a lead that I know will stick with me for quite a long time.
                    
			            - By Ralph  C. Jensen
- Apr 01, 2019
 
            
                
	                 
                    
                                        
		            
                    See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.
                    
			            - By Tom  Galvin
- Apr 01, 2019
 
            
                
	                 
                    
                                        
		            
                    As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.
                    
			            - By Rich  Aycock
- Apr 01, 2019
 
            
                
	                
                    
                                        
		            
                    Like many metropolitan cities, Hartford, CT has its share of crimes. And solving those crimes usually involves sifting through an overwhelming amount of data. 
                    
			            - By Kevin  Taylor
- Apr 01, 2019
 
            
                
	                 
                    
                                        
		            
                    Video surveillance management is becoming increasingly sophisticated in terms of operational capabilities, including the type and scope of analytics available. 
                    
			            - By Peter  Ainsworth
- Apr 01, 2019
 
            
                
	                 
                    
                                        
		            
                    Gone are the days of paper-based note-taking and incident reporting, or hiring four guards to cover the role of one. Today’s security companies need to be more efficient and responsive, including being better at scheduling resources. 
                    
			            - By Mark  Folmer
- Apr 01, 2019
 
            
                
	                 
                    
                                        
		            
                    With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.
                    
			            - By J. Matthew  Ladd
- Mar 01, 2019
 
            
                
	                 
                    
                                        
		            
                    The following predictions for ISC West 2019 dive deeper into how these innovations, among others, will help move the security industry forward.
                    
			            - By Joe  Oliveri
- Mar 01, 2019
 
            
                
	                 
                    
                                        
		            
                    Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes. 
                    
			            - By Dana  Pruiett
- Mar 01, 2019
 
            
                
	                 
                    
                                        
		            
                    The first step in any security plan is assessing the risk that could impact a company, venue and/or business sector. 
                    
			            - By Tim  Williams
- Mar 01, 2019
 
            
                
	                 
                    
                                        
		            
                    The Villages investigated its options for a higher-quality system in an effort to rectify what was an unnecessarily complex situation and improve the quality and management of the video surveillance systems. After evaluating solutions from a number of manufacturers, Ritch and his team chose cameras from Hanwha Techwin America for deployment throughout the property.