Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.
- By Brandon Arcment
- Nov 01, 2015
In the decade that First Service Insurance (FSI) has conducted business in Roseville, Calif., it has provided contractors with specialized property and casualty insurance products focused on general liability, workers compensation, business auto and bonding/surety.
- By Scott Lindley
- Nov 01, 2015
As interest in connected home technology rises, consumers are beginning to pay attention to its many safety and security benefits.
- By Juan M. López
- Nov 01, 2015
At the peak of El Salvador’s sugar harvesting and processing season, the Ingenio Azucarero Injiboa mill in San Vicente becomes incredibly busy as hundreds of employees change shifts throughout the entire day, typically seven days a week.
- By Mohammed Murad
- Nov 01, 2015
Realizing the need for stronger surveillance in high-profile locations such as the marathon route, the city of Boston decided to increase civilian protection. The new security measures included doubling law enforcement personnel to about 3,500, the addition of bomb-sniffing dogs, and a SWAT team provided by the FBI.
- By Ron Grinfeld
- Nov 01, 2015
Vandalism and destruction of property are not the only concerns at schools. Sadly, theft, assaults and campus shootings are also important issues.
- By Ellen Kreitz
- Nov 01, 2015
In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.
- By Denny Heaberlin
- Nov 01, 2015
Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.
- By Ralph C. Jensen
- Nov 01, 2015
Most dealers know that it’s crucial to run a credit report before signing up a new account. But it’s also worth remembering that it’s not a minor detail, and even a borderline credit record may have long-term repercussions.
- By Robert Ogle
- Nov 01, 2015
One of the campus’s current projects is the renovation and expansion of the Rietz Student Union that prompted the discovery of several ‘dead zones’ in the outdoor notification program.
- By Molly Walsh
- Nov 01, 2015
Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.
- By Brandon Arcment
- Nov 01, 2015
There are many challenges associated with securing Specialized including theft protection and loss prevention, general security for employees, and protecting the company’s highly confidential trade secrets which are safeguarded at headquarters.
- By Taylor Foster
- Nov 01, 2015
This is a story of lens selection gone wrong, and right. Often it seems lens selection is not given much attention, and at worst is an afterthought.
- By Andrea Iniguez
- Nov 01, 2015
This month I ventured out just a little bit to talk about residential security, though much of what I learned also applies to commercial and industrial security. No better place to learn about software than Silicon Valley.
- By Ralph C. Jensen
- Nov 01, 2015
Employee mustering at industrial sites or large facilities has typically been difficult to efficiently manage due to the complexity of the situation and human factors.
- By Steven Pisciotta
- Nov 01, 2015
This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.
More than a decade ago, the talk was all about convergence. Well, the industry has converged, but there is now something more interesting on the horizon.
- By Ralph C. Jensen
- Nov 01, 2015
According to several studies, growth is now focused on “self-installed” products that piggyback on the popularity of smart phones and the tech-savvy millennials that use these devices for everything from banking to prepared food delivery.
- By Bart Didden
- Nov 01, 2015
Imagine getting slapped with a $1 million fine for not adequately securing your facility. Think it can’t happen? Think again.
As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?
- By Ryan Corey
- Nov 01, 2015