Security Products Magazine Digital Edition - August 2014

August 2014

  • MEDICAL SECURITY - Making a Cultural Shift
  • BIOMETRIC INTELLIGENCE - Your Biometric Accepted Here
  • IP VIDEO - Retrofit to IP
  • LOCKS/ALARMS - Mission Control


Features

Making a Cultural Shift

Making a Cultural Shift

Change empowers staff to be part of the credentialing process

By

Hospitals operate 24/7. As a result, countless numbers of people enter and exit their facilities. In order to provide a safe environment for their patients and employees, they need to know who these people are and why they are there.


Pitching a Better IP Solution

Pitching a Better IP Solution

Turning technology staff into your biggest champions

By John Bartolac

IT professionals are becoming increasingly involved in video surveillance initiatives across all industries. It’s time to build strong relationships with the IT side of the house and include them in discussions about any new system that will piggyback on their backbone.


Weatherproof Your Equipment

Weatherproof Your Equipment

Taking care of your security solutions is a wise choice

By Gary Bibeau

The days of security systems guarding primarily against theft, vandalism and violence are long gone; instead, camera systems are mostly to protect companies against liabilities such as accidents and negligence.


Energy Distribution

Energy Distribution

Devices meet challenging ECS requirements for an energy company’s sprawling campus

By David George

When officials at the United Illuminating Co., a regional energy distribution company in New Haven, Conn., planned the recent completion of their 56-acre corporate headquarters, their “must-have” list included a campus-wide Emergency Communications System (ECS).


A Crash Course

A Crash Course

Creating a vehicular perimeter security system

By Greg Hamm

From pedestrian-filled farmers markets and universities to new and used car lots, a wide variety of agencies find peace of mind through the use of barriers, bollards, barricades and crash gates for vehicle-based physical access control at the perimeter.


Mission Critical Life safety systems play an important role in high-security facility

Mission Critical

Life safety systems play an important role in high-security facility

By Brian Carlson

Dealing with an obsolete, legacy fire alarm system and a separate, standalone ECS, the building owner’s property management company, Childress Klein Properties, Inc., turned to local Gamewell-FCI distributor Critical Systems LLC, to help them find a new, comprehensive solution.


Retrofit to IP

Retrofit to IP

Using legacy cable to save costs and manpower

By Guy Apple

Choice, cost savings, speed of deployment and convenience. This is what the use of existing legacy cable can afford the end-user as they migrate existing, analog-based surveillance, access control or intercom systems to IP.


Your Biometric Accepted Here

Your Biometric Accepted Here

Initial resistance gives way to mainstream acceptance when biometrics allow convenient and secure access

By Phil Scarfo

While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.


Departments

World-Class Security

Friedman brings blighted Chicago real estate into technology world

By Mary Wilbur

As the only 24/7 neighborhood in Chicago, River North and Friedman Properties have a shared vision for the area to ensure that success will continue to present itself: aligning the right tenants with the right buildings, demanding the best in security and investing purposefully.


Apprehending the Internal Thief

By Ralph C. Jensen

Some of the most discouraging statistics in the security industry are the record numbers reported in shoplifting from dishonest employees. Recent numbers reported by Jack L. Hayes International shows that those numbers have increased yet again.


Networking Security

Taking Charge Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own hands

Taking Charge

Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own hands

By Mark Byers

Distributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world.


A Brave New World Power protection is significant in the networking and IP camera space

A Brave New World

Power protection is significant in the networking and IP camera space

By Samantha Wade

While businesses will spend thousands of dollars on cameras and recording systems, alarms, intrusion detection, emergency communication and theft prevention, many overlook the need for systems’ power protection.


Where Current SMS Authentication Fails, the Next Generation Succeeds

Mobile-originated SMS creates a four-factor authentication solution by sending a simple text message

By Scott Goldman, Robert Foster

Jane and Jake work for the same company. This week they’re on one of those dreaded road trips—three cities in four days—and are, as we all are, completely dependent on their tools of choice while on the move.


IT Security Compliance for Cloud Service Providers

By Gábor Marosvári

Compliance with increasingly stringent regulations for organizations providing outsourced IT services, particularly in regards to data protection, is becoming more difficult.


Digital Edition

  • Security Today Magazine - May 2018

    May 2018

    Featuring:

    • The Changing Landscape
    • Booking an Upgrade
    • The Best Bet
    • Get Out of Our Space
    • Poised for Expansion

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety