Security Today Magazine Digital Edition - June 2017

June 2017

  • Team Work
  • Data Secure
  • Building in Security
  • Protecting the Puppets
  • The Right Combination


Features

Security Strategy

Security Strategy

By John Carter

While many security teams at retailers are concerned about the potential for a big data breach, everyday security threats, like social engineering and shoplifting, are heightened in a world of omni-channel retail.


Filling the Gap

Filling the Gap

By Greg Smith

When seconds count in an emergency, such as an active shooter or severe weather, gaps in communication can cost lives. Many schools, businesses and healthcare facilities face the challenge of ensuring comprehensive coverage with their existing emergency mass communication systems.


The Right Combination

The Right Combination

By Michael Hardy

With a pending network overhaul and the fast-approaching emergency exercise, Pangborn Memorial Airport was driven to action.


Secure the Perimeters

Secure the Perimeters

By Ralph C. Jensen

The National Park Service has an extensive security protocol for its numerous locations nationwide, though they do stress an extensive layered approach.


Building in Security

Building in Security

By Ralph C. Jensen

A family-oriented municipality with a thriving business environment, the city of Cypress is home to 48,000 residents in North Orange County, Calif.


Team Work

By Kim Rahfaldt

Sometimes you need to be in the right place at the right time. Sometimes, it’s who you know. For Karrie Gabbard, executive director of the East Butler County Family YMCA in Hamilton, Ohio, it was both.


Data Secure

By Christopher Camejo

The risk posed by hackers to the Internet of Things (IoT) is a hot topic and there have already been some serious real-world attacks.


Protecting the Puppets

By Dawn Nye

The Center for Puppetry Arts commissioned Atlanta’s Operational Security Systems (OSS) to provide security including access control for both phases of the construction project. The challenge included many key components.


The Best Defense

By Kathleen Hannon


Force Multiplier

Force Multiplier

By Dwight Dumpert

Port Angeles, located on the U.S.-Canada border, is host to a thriving maritime port and a significant customs entry point into the United States.


Business Intelligence

Business Intelligence

By Brent Dirks

Many industries have successfully implemented video surveillance and management systems in their manufacturing facilities as a way to reduce the risk of theft or vandalism.


New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.