Memo To Staff 

By Stephanie Silk

Staff and students play a variety of roles in schools and universities, and many of these roles can affect security, for better or worse, according to...

Getting Management On Board 

By Paul C. Boucherle

Editor's Note: Welcome to our new monthly column that will translate the issues of convergence into everyday, practical terms. Our goal is to provide...

Be Aware Of Emerging Issues 

By Bob Hayes, Kathleen Kotwica and Marleah Blades

EDITOR'S NOTE: There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base...

The Inside Scoop on H.264 

By Fredrik Nilsson

H.264 is a new video compression standard that offers end-users many advantages and far fewer disadvantages than previous standards. Some say that within...

The Architecture of Analytics 

By Chris Johnston

At the point of its introduction in the last decade and even as recently as three years ago, video analytics existed mainly in government-related installations...

Plan For Parking 

Stephanie Silk

Parking facilities whether they are adjacent to a building, remote from a building, standalone or in an interior area pose security risks. Each parking...

Contactless Smart Cards: Not Just Access Control |  

BY ROBERT M. FEE

Here is the challenge: Establishing a multi-application capability while allowing for easy integration during ongoing operations, flexibility and scalability...

Picking and Choosing Biometrics 

By MICHAEL FICKES

All of a sudden, everyone is getting biometric access control. The federal government is installing systems in offices across the United States. Federal...

The Essentials of Badging and ID Solutions 

By Bill Kiechafer

Much has been said and written recently about emerging technologies in the security industry, including the convergence of physical security and information...

Choosing Fire Extinguishers for Health Care Facilities 

By Craig Voelkert

Many fire hazards exist within health care facilities. Today, more than ever, it is necessary to prevent as well as suppress fires, if and when they occur...

On the Defensive 

By David Dickinson

Keeping pedestrians safe and protecting structures from accidental or intentional automobile crashes are big concerns for many facilities. From pedestrian-filled...

Getting To Know You 

By Cynthis Freschi

With the rapid development of new security technologies and means of implementation, it is a difficult task to stay on top of all the nuances required...

Combining ADA Compliance With Aesthetics, Convenience 

By M. Christopher Smith

No need to sacrifice appearance for compliance for owners, architects, specifiers and facility managers, complying with the Americans with Disabilities...

9 Things to Know About Video Analytics 

STANDARDS-BASED: Video Analytics is not standalone technology. Compatibility with network and video equipment is essential for optimum performance. Open...

The New Playing Field 

By JAMES GOMPERS

As security technology shifts to more network-centric solutions, there is a whole new playing field. The decision-makers are not necessarily the same....

All About ID Cards 

BEYOND PHOTO ID, TECHNOLOGY IS MAKING CARDS MORE FUNCTIONAL IN TODAY'S COMPANIES OFTEN AT LOWER COST By STEVE BLAKE ID cards are powerful tools that provide...

The End-User's Role In Integration 

By RAYMOND DEAN

Last month's article described how an end-user should go about selecting a systems integrator and what is reasonable to expect from that person and his...

5 Questions To Ask Your Systems Integrator And 6 Things to Expect 

By RAYMOND DEAN

Whether installing a new security system or retrofitting an existing one, an important step for an end-user to take is selecting the best systems integrator...

Big Fish, Small Fish 

By CLARISSA JACOBSON

The old caveat that Nobody ever got fired for using IBM is one that corporate purchasing agents once lived by. A lot has changed since then. Intelligent...

8 Steps for Selecting a Security Contractor 

Remember enduring the ambibilant mind process that occurs on a first date? Wherever the outing took place, chances are, you spent most of the time sizing...

8 Ways To Prepare Employees For A Crisis 

By Dr. Andy Edelman

A critical incident in the workplace whether it is an armed robbery or even an extremely irate customer can transform employees' emotions from normal...

Seven tips for protecting data on a laptop 

INTEGRATION ISSUES ON THE TABLE 

WHEN IT IS TIME to install a new security system, where do you begin the process? What are the roles of security dealers, security consultants and system...

How To Think About Return On Investment 

By Michael Fickes

Few security directors have mastered the concept of return on investment or ROI. For starters, it seems complicated. It looks like a hard nut to crack,...

The Big Picture 

By Andrew Wren

There is a bulletproof method for eliminating shoplifting in the retail environment: Assign a personal escort for each and every customer entering the...

1 | 2 | 3 | Next

Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top