- Continued Integrity
- Looking Beyond the Hype
- The Uberization of Security Business Model
- A Secure Healthcare Prescription
- Automating Critical Environments
Strobe, LED and dim lighting can’t deter network cameras from their appointed tasks at the Hard Rock Hotel & Casino Tulsa
By Steve Darragh
Like many gaming venues, the lighting scheme at the Hard Rock Hotel & Casino Tulsa in Oklahoma focuses on creating an atmosphere of fun and excitement.
Defending against external threats and asset failure at substations
By Fredrik Wallberg
Artificial intelligence continues to redefine the capabilities of physical security systems and shape customer demands.
Companies need to rethink how they approach storage
By Richard Diver
Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.
Hospitals are improving security, operational efficiencies, and patient safety
By Courtney Dillon Pedersen
Hospitals and other healthcare facilities face unique security and surveillance challenges.
Is it time to reduce the total cost of ownership for the security program?
By Ed Bacco
Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).
Improving security and efficiency through AI should not be understated
By Brent Boekestein
As key stakeholders look to implement AI into their workflow, many find that security and safety is a commonsense place to begin.
Multi-phase access control upgrade moves from outdated legacy to updated networked solution
By Michael Bone
For the County of Travis in Austin, Texas, research, dedication and the right team resulted in the perfect integrated security solution for its sprawling campus and multi-location facilities.
Implementation of best practices must be employed
By Steve Warne
Governments are implementing innovative programs that are revolutionizing how the world looks at identity and citizenship.
By Sean Lawlor
The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.
Addressing challenges not typically found in other locations
By Dana Pruiett
Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes.
With preparedness and vigilance, American Jewish community works on additional security
By Michael Masters
The attack on a Jewish institution comes amidst unprecedented year-over-year increases in anti-Semitic incidents and hate crimes directed against the Jewish community in North America.
The best way to prevent your facial identity from being stolen is to limit it to airport and border security use cases
By Martin Zizi
When dealing with airport and border security, we need databases, we need to share information and we need law enforcement.
Turn your VMS into a data collection device and have it work for you By Scott Seraboff M
By Scott Seraboff
Millions of video surveillance cameras around the world are losing money.
Workplace security programs and protocols that can stop dangerous and damaging incidents before they happen
By Tim Williams
The first step in any security plan is assessing the risk that could impact a company, venue and/or business sector.
The rise of facial recognition is making us safer
By Denis Petrov
From simple photo IDs of the past to 2D barcodes and the now ubiquitous use of video cameras, businesses, schools and venues are constantly looking for better ways to protect people and property.
By Ralph C. Jensen
Security at the southern border is critical, but let’s not talk about illegal immigration. There is an issue more compelling and serious than what you’ve been seeing in the headlines recently.
By Richard Sheppard
People are always trying to predict industry trends, but virtually all of the predicted trends I have read lately are just a subset of the benefits offered by cloud managed video.
Follow the sequence of events for success
By Bob Dolan
As technology has advanced, security has branched out beyond simple surveillance and intruder deterrence.
You have the necessary experience, but think about the specifications for the job
By J. Matthew Ladd
With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.