Security Today Magazine Digital Edition - November December 2019

November/December 2019

  • Security Foresights for the New Year
  • The Security of Medicine
  • Looking to the Future
  • Integrated Technology Drives Security
  • Reshaping the Perimeter


Cover Story

The Security of Medicine

The Security of Medicine

Illinois medical center relies on new server solution to secure all facilities

By Ralph C. Jensen

In keeping with SwedishAmerican’s mission to deliver excellence in healthcare, they also maintain the highest level of care when it comes to keeping their patients, medical staff, and facilities safe.


Features

More Power to You

IEEE802.3bt provides more versatility and cost efficiency

By Ronnie Pennington

Today’s professional security industry seems to have adopted the “more power” mantra by taking a much more pragmatic approach.


Reshaping the Perimeter

Developing the basics of deter, detect, delay and deny

By Craig Summers

Driven by the 2013 physical assault on a California substation, the NERC CIP 14 regulation has reshaped the way energy’s physical security directors are viewing perimeter security.


Video and IoT Megatrends to Accelerate into 2020

Video and IoT Megatrends to Accelerate into 2020

It makes sense to understand and be ready for questions and concerns that will arise

By Tom Galvin

As we wind down 2019 and look forward to a new decade, it is time to reflect upon the year and the megatrends that have started to influence video surveillance and the physical security industry.


Integrated Technology Drives Security

Integrated Technology Drives Security

Honor system has evolved to fast-paced security at the front door

By Valerie Anderson

Most security professionals would agree the rapidly-evolving nature of technology can be daunting, not only for end users but also for systems integrators and consultants alike.


Looking to the Future

Looking to the Future

Security tech trends to watch

By Brian Carle

Video surveillance technologies continue to evolve. Some of the fastest-growing areas include AI-based video analytics and cloudbased video access and recording.


Envisioning What Might Be Ahead in 2020

Envisioning What Might Be Ahead in 2020

Delivering even better clarity in the camera of the future

By Fredrik Nilsson

You have probably heard the old adage, “Hindsight is always 20/20.” Looking forward though, our vision is not nearly as clear.


Security Foresights for the New Year

Security Foresights for the New Year

Data is becoming more digital and systems are becoming more integrated

By Clayton Brown

Once upon a time, this was the year when cars could fly, human immune systems healed themselves and cops could stop a crime dead in its tracks. While some of these things are still more of a dream than a reality, the last one is becoming more viable every day.


What You Need to Know About Access Control in 2020

What You Need to Know About Access Control in 2020

Mobile credentials, adoption have been anticipated for more than a decade

By Laura Fradette

It is hard to believe that 2019 is coming to a close. As we look ahead to the New Year, sitting with colleagues, we reflected on the trends that impacted our industry in 2019, and predict what we can look forward to in 2020 and beyond.


Departments

INDUSTRY PROFESSIONAL

Defining Intelligent Communication

Zenitel challenges the audio market to set an industry standard

By Sherelle Black

The way people and businesses communicate is ever evolving, and with that, so are the communication products.


INDUSTRY FOCUS

Another Banner Year, More to Come

By Ralph C. Jensen

It would seem everyone has a crystal ball when it comes to forecasting the future. What I have discovered is that some crystal balls are a little more polished than others. I’m pleased to have several contributors who will give us all some incredible insight into 2020.


Networking Security

Spotting Signs Your IT is Out of Date

Focus on the four primary levels of evaluation

By Jorge Del Prado Lera

This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.


Taking on Security Automation

Taking on Security Automation

Increasing risk exposure in modern software

By Felicia Haggarty

Not only does modern software architecture create a broader attack surface area, the accelerated DevOps methodology makes it harder to detect and remediate vulnerabilities.


Webinars

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3