- Bringing it All Together
- Combatting Insider Threat
- Where the Cloud Meets Video Surveillance
- Contextual Analytics
- How Smart is Your Phone?
Integrating multiple card reader and key systems into one access control solution
Nearly 3,000 members, plus parents and children from the community, use the Bartlett United Methodist Church in Bartlett, Tenn, as their home base for worship services, preschool and recreational activities.
Surveillance footage will reveal the truth
Jim Short can’t name names, but one of his NVR clients is a Los Angeles hotel brimming with $3,000 a night suites, and a parking garage stocked with vehicles that most of us only dream of owning.
Cloud security faces its own security issues
Cloud environments give companies a cost-effective, easy-to-use data store solution. In fact, analysts predict that cloud spending will cross a $200 billion tipping point in 2016.
Ready to take the next step about cloud-based surveillance, here are some considerations
I’m sure by now everyone understands the basics of “The Cloud” since it has become ubiquitous with almost all business apps now offered or exclusively offered in the cloud.
Utah universities look to security best practices to implement IP video
ew developments in video surveillance based on IP technology are helping primary and secondary schools, colleges and universities improve security, enhance operations and minimize losses in commercial areas such as bookstores, cafeterias and vending machine halls.
Multi-site video security helps resolve many challenges
High camera counts, limited bandwidth for connecting multiple locations and linking together a variety of different security technologies are just some of the challenges facing multi-site organizations when selecting video security technology.
A more complete security and risk picture appears when fully prepared
Each of the millions of decisions made each day by people, devices and systems falls into one of two categories: binary and contextual.
Convergence technology takes into account a malicious insider
The recent disappearance of Egypt Air Flight MS804 on May 19 has once again highlighted the issues of insider threat at airports.
Protecting priceless masterpieces at the Worcester Art Museum
Located just an hour west of Boston, the Worcester Art Museum is world-renowned for its 35,000-piece collection of paintings, sculptures, photographic prints, drawings and new media.
The security experience is changing because today’s electronics are part of the landscape
Smartphones have changed the way we do business in virtually every industry that touches the Internet, which is now virtually every industry on the planet.
The fall festival, otherwise known as ASIS, kicks off later this month. Thankfully, it is in Orlando, though I can hardly wait until next year when it is scheduled for Dallas.
You might not give a second thought when you enter or exit a secure facility; it may just seem routine. But, that’s not how Martin Huddart and the team at ASSA ABLOY see it.
A security consulting firm provides companies with virtual security program
For most startup companies, paying for security management may not be a possibility. Budget constraints, business plans and other factors can lead to security taking a backseat to a company’s long list of other priorities.
If you are a security installer, you probably have a favorite place to work. For instance, as an integrator of security systems, you may have a passion for securing schools or healthcare facilities. Both are honorable goals and facilities to provide security.
Investing in well-trained, experienced employees
About a year ago when Curtis Kindred of American Defense Systems (ADS) decided to reorganize his sales team and shake up his company, industry watchers were skeptical.
The World Trade Center (WTC) site is hallowed ground in Lower Manhattan, yet throngs of people flood the acreage that used to be occupied by the Twin Towers.
All organizations are vulnerable
The phrases critical communications and crisis communications are used interchangeably. However, they are synergistic building blocks.