- Watch Your Perimeter
- Vetting a Vendor
- Evaluating Accuracy
- The Data Dilemma
- Tame the Hot Spots
- Carry On Convenience
Installers and system integrators must consider a wide range of readers and credential types in the evaluation process when designing an access control system.
Every part of a financial institution must be secure
Security continues to be a major area of vulnerability for the banking industry, with attacks impacting individuals, small businesses and major corporations.
Security professionals can help keep hospital challenges under control
Hospitals present combined security challenges not found in other facilities. There are potentially thousands of people, patients, staff, visitors and vendors, to protect.
Video surveillance for perimeter security should pay close attention to light sensitivity and other IP camera features
When it comes to securing perimeters, no two are exactly the same. Perimeters can be vast and remote like a national border, or they can be small and urban like the area surrounding a city bus terminal. Intrusion concerns can be via land, air, water or all three. Nearly any combination of factors is possible.
Solve video surveillance with a multi-tier approach
Today, smart devices seem to be everyplace—homes, cars, transit stations, workplaces, stores, restaurants, and even on our bodies to name just a few—capturing information and creating massive amounts of data.
According to Vaughn Glenn, a TSA agent and union representative in Detroit, only about half of Americans surveyed in a 2014 poll thought TSA screening makes air travel safer.
Vehicle for city wide and remote location video monitoring/recording
A vehicle with the ability to remotely monitor and record has been rolled out for city wide use. The prototype, created by Dotworkz, was designed for use at construction sites, high profile events and even search and rescue missions.
Louisiana’s Port Fourchon makes security an important dialog
The Greater Lafourche Port Commission, located on the Gulf Coast in Louisiana, facilitates the economic growth of the communities in which it operates by maximizing the flow of trade and commerce.
Does your surveillance system fit the proper cyber profile?
It’s become clear that the likelihood of cyber attacks isn’t a question of “if,” but rather a question of “when.”
New workers must be agile and be able to adapt quickly
Today’s workplace is far different from 15, five, even two years ago. Employees are expected to get more done, in a shorter amount of time, with more distractions than ever before.
Acknowledging the role of the end user in critical infrastructure security
Phishing is a problem for everyone from consumers to businesses to governments.
Customers should not have to worry about a possible data security risk
Despite years of breaking news stories on security breaches and the resulting reputational damage, many businesses are still under protected when it comes to data security.
Energy and electric utilities need realistic security resources
A resilient electric power grid is critical to a wide range of essential services and is a highly complex mosaic of technologies.