Security Products Magazine Digital Edition - August 2015

August 2015

  • Ensuring Success
  • High Value Assets
  • A Protective Circle
  • The User Experience
  • Securing Your Car
  • Shifting the Selling Paradigm


Features

Navigating the High Seas

Navigating the High Seas

New Coast Guard rules redefine video requirements onboard cruise ships

By Jumbi Edulbehram

In recent years, the cruise industry has received a lot of attention from the news media regarding serious security issues onboard its vessels, ranging from people falling overboard to sexual assaults.


Shifting the Selling Paradigm

Shifting the Selling Paradigm

Turning security dealers into home automation dealers

By Larry Goldman

With the increased focus on home automation and associated “smart home” devices, it is incumbent on security dealers, installers and integrators to do more than simply sell security products.


Ensuring Success

Ensuring Success

Make sure you have the right camera placement for optimal use of analytics

By Ian Westmacott

Those words are often associated with the real estate industry, but the security community can also apply that mantra to the all-important issue of camera placement for optimizing analytics.


The Big House

The Big House

PLC controllers provide reliability, greater security and lower risk

By Ralph C. Jensen

A large corrections campus encompassing more than 30 buildings in the southeast United States houses approximately 5,000 inmates with separate jail facilities for men and women who are awaiting sentencing, serving sentenced jail time and are in maximum security.


The User Experience

The User Experience

Improving security by implementing tap authentication

By Tim Phipps

With the move to a mobile- and cloud-first world, corporate data has become increasingly difficult to protect.


High Value Assets

High Value Assets

Finding a cost-effective perimeter solution

By Dale Climie

Perimeter security: Just the words conjure-up visions of horror.


A Key Role

A Key Role

Data Reporting and Dispatching Features Essential for Converged Security Systems

By Tony V. Capelli

The city of Calgary in southern Alberta, Canada has achieved international acclaim with its annual Calgary Stampede and its legacy of world-class sporting facilities and events.


Securing Your Car

Securing Your Car

When you’re at work, there is someone watching your vehicle

By Mary Wilbur

Chances are, when you picked a parking place this morning, you weren’t thinking about security in that facility.


Departments

One Innovation at a Time

Industry Professional

One Innovation at a Time

Quality and innovation among key factors for success

By Neil Robertson

Today, Dedicated Micros continues to conceptualize and develop ground breaking video surveillance solutions to meet industry needs.


Security in the Sanctuary

Industry Focus

Security in the Sanctuary

By Ralph C. Jensen

I wouldn’t consider myself an extremely religious man, but I do go to church on a weekly basis, and I do expect my presence in the church to be safe and secure.


Networking Security

Everyone Is At Risk

By Ralph C. Jensen

Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.


Access Control in the Midst of an IP Revolution

By Mitchell Kane

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.


No Protection From Bad Data

No Protection From Bad Data

Beware what the experts claim as noise and a security signal

By Jonathan Sander

Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.


Breaching the Network

Breaching the Network

All businesses are at risk of a cyberattack

By Lee Pernice

Cyberattacks are one of the greatest threats facing global businesses today.


Privileged Identities

Privileged Identities

Learning what is at the core of online attacks

By Philip Lieberman

Over the last year, we have witnessed a series of staggering data breaches affecting some of the world’s leading businesses— with each breach seemingly worse than the last in terms of financial and reputational damage.


Digital Edition

  • Security Today Magazine - October 2018

    October 2018

    Featuring:

    • Streamlined for Success
    • Making Your Expertise Unique
    • An Eye on the Campus
    • Solving Problems
    • Enhancing Security

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety