School Safety Self-Assessment Tool Available To School Leaders 

CDW Government Inc. (CDW-G), a subsidiary of CDW Corp. and source of Information Technology (IT) solutions to governments and educators, has published its School Safety Index Self-Assessment Tool, which allows school leaders to participate in CDW-G's School Safety Index survey and receive instant scores to learn how their school or district compares to the national school safety average CDW-G reported in June.
The School Safety Index published in June is based on a May 2007 survey of 381 school district IT and security directors on 14 elements of physical and cyber safety. It highlights the indicators of strong district safety programs, as well as the barriers to school safety. ...

Security Industry Association Launches Training Initiative 

The Security Industry Association (SIA) has announced the launch of a new training initiative to meet the security industry's need for timely and relevant training. SIA identified the first seven critical job roles in the security technology industry, developed a competency model to represent the skills needed to perform these jobs effectively, and built a listing of courses applicable to the needed skills -- a curriculum map.
"The mission of SIA Education is to raise the level of knowledge and professionalism in the security technology industry channel," says Richard Chace, SIA executive director and CEO....

Lenel Presents OpenAccess Partner Pavilion At ASIS 2007 

Lenel Systems International, Pittsford, N.Y., is presenting its OpenAccess Partner Pavilion at ASIS International 2007 this week in Las Vegas. The OpenAccess Partner Pavilion, located in booth #1697, showcases eight system manufacturers, each of which has utilized Lenel software Application Programming Interfaces (APIs) to develop an interface between its product and Lenel's OnGuard security management solution.

The partners offer systems that are complementary to the OnGuard solution, which greatly expands the range of opportunity for all customers. ...

Research Casts Doubts On Cost-Savings of Analog Systems 

Contrary to popular belief, an IP-based system of 40 cameras offers a lower total cost of ownership (TCO) than an analog-based surveillance system, according to a new independent study released this week by network video provider Axis Communications, Chelmsford, Mass. The study also shows that if IP infrastructure is in place, the IP-based video surveillance system will always be lower cost for any system size. ...

Introducing The Top 20 New Products Of 2007 

During the ASIS International show in Las Vegas this week, judges selected the top 20 finalists in Access Control & Security Systems' sixth annual New Product of the Year competition. The finalists will be featured in the October issue of the magazine, when readers will be allowed to vote for their favorite....

Survey Shows Security Programs Missing Opportunity 

The Security Executive Council has announced the results of its June/July International Security Research Database survey and the posting of the next set of survey questions online at Each survey's results will help expand and improve the Council's International Security Research Database, a new tool with which security professionals can measure the business value of their security operations by comparing their organization to others across the globe.
The June/July survey provided interesting insights into the frequency of workplace violence incidents and methods of gathering and reporting security-related data to management. ...

Weakest Security Link = People? 

People remain the weakest security link for financial companies, according to consultancy firm Deloitte.
The compromising of customers' systems continues to be the major cause of security breaches in financial institutions, according to the 2007 Global Financial Services Security Survey.
Business partners and third parties also represent a cause of computer security breaches, one example given being the loss of up to 48 million credit and debit card details from a well-known discount retailer....

Billion Dollar Growth Projected For Alarm Systems Market 

Despite a two percent fall, from $17.8 billion in 2005 to $17.5 billion in 2006, the market for alarm systems, services, and installations is expected to reach $19.6 billion by 2011, according to U.S. Market for Alarm Systems, Services and Installations, a new report from market research publisher Specialists in Business Information (SBI).
Following significantly reduced equipment shipments and system installations in 2006 and changing market conditions in both the residential and commercial markets in 2007, SBI projects that growth will return to the market in 2008. Expected annual increases range between one and four percent, with growth expected as advanced technologies, integrated systems, cross- channel innovation, and general end-user awareness and interest in security, which is no longer limited to fire and intrusion, converge....

Texas Alarm Associations To Cooperate With Dallas Officials 

The Dallas City Council repealed its "verified response" burglar alarm policy, meaning police officers has again respond to all commercial alarm calls.
"Dallas business leaders expressed their concern about the policy and their elected leaders responded. The repeal of the verified response policy by the Dallas City Council is the beginning of another chapter in the alarm industry's long-term effort to reduce false alarms and enhance public safety," says Chris Russell, president of the North Texas Alarm Association (NTAA). "Some may view this as a reason to relax, but we need to continue to work from all directions to significantly reduce the number of false alarms to the extent that verified response will not even be considered again."...

What Are The Top 5 Most Challenging Issues in Security? 

During ASIS 2007 next week in Las Vegas, the results of a poll will unveil The Top 5 Most Challenging Issues in Security. Experts will be on hand to discuss the exclusive poll results and what they mean to today's security professionals.
The poll will be featured as part of a series of live, interactive sessions at ASIS, sponsored by Verint Systems in cooperation with Access Control & Security Systems magazine and Experts will discuss several key issues that are shaping the future of the security industry and the lives of security professionals in the "Get Connected" series to be held at Verint's booth #1213....

Report Provides Electronic Surveillance Market Outlook 

In the wake of increasing security threats and global terrorism, the market research report "Global Electronic Surveillance Market Outlook", published by research firm RNCOS this month, provides an in-depth study of the current market trends, evolving technologies and growth prospects of the electronic surveillance and security surveillance technology market worldwide.
The report aims to help clients analyze new opportunities critical to the success of the electronic surveillance technology industry at a global level. Detailed data and analysis provided in the report will help potential investors to navigate through the evolving market....

Natural Disaster Preparedness Survey Spurs Scary Results For Atlanta 

The threats of devastating natural disasters such as hurricanes, terrorist attacks and other manmade calamities have prompted more U.S. businesses to prepare for disaster. But a survey taken by AT&T Inc. of local executives indicates that many businesses in Atlanta remain vulnerable. The survey of 100 local information technology (IT) executives found that the Atlanta business community scored in the lower half of U.S. cities surveyed for disaster preparedness, with nearly one-third of respondents saying business continuity is not a priority.
"Tornadoes, floods, fires, blackouts and manmade disasters such as cyberattacks can all have devastating consequences, but having a plan in place can minimize the impact of a disaster," says Phil Jacobs, president, Business Communications Services, AT&T Southeast. "In Atlanta and throughout the Southeast, AT&T offers companies a wide range of defenses to protect networks from intrusion by viruses and hackers as well as ensure remote backup and secure data storage for businesses of all sizes."...

Businesses Plan To Increase Spending On Network Security 

Cisco has released a set of results from an additional international study examining mobile workers' security behavior with regard to corporate security and its impact on businesses. The study reveals widespread plans to increase security spending by as much as 20 percent next year to protect expanding wireless networks and the growing numbers of mobile employees who access them.
The latest research builds on findings released earlier this month spotlighting the growing trend of mobile employees and how their security behavior can heighten risks for businesses' IT organizations as they connect to corporate networks and carry sensitive information outside office walls. While the previous findings involve more than 700 mobile employees in seven countries where wireless and mobility technologies are widely adopted, the additional recent findings reveal spending plans and business drivers for more than 700 IT decision makers who work in those same nations: the United States, United Kingdom, Germany, China, India, South Korea and Singapore....

Jericho Forum Presenting Corporate Security Blueprint At InfoSecurity Conference 

Chief information security officers from some of the world's biggest companies say the tools they've been getting out of the high-tech industry aren't good enough. They say they've been having a hard time protecting their companies and keeping them open for business on the Web.
So they banded together and founded the Jericho Forum, named after the Battle of Jericho, where the Israelites blew their trumpets and made the city walls fall down. Those walls, like many corporate security perimeters, look like "Swiss cheese," Paul Simmonds, the forum's chairman told Baseline magazine.
The Jericho Forum may become better known when it presents a blueprint for a corporate security architecture, along with guidelines for designing it, at the InfoSecurity conference in New York City, running today and tomorrow (Sept. 11 and 12) at the Jacob Javits Convention Center. ...

Take The Poll: What Are The Biggest Security Challenges You Face? 

Please take our online poll and provide valuable feedback. We will announce the results during the ASIS show in Las Vegas in a session co-sponsored by Verint Systems Inc. Click here to take the poll....

VoIP May Make Eavesdropping Easier 

A leading member of the Jericho Forum security group has criticized the security of voice over IP technology after researchers revealed that it was possible to eavesdrop on VoIP conversations, according to ZDNet UK.
An eavesdropping vulnerability was revealed on the Full Disclosure mailing. Vulnerability researchers Humberto Abdelnur, Radu State and Olivier Festor claimed the exploit could allow a remote attacker to turn a VoIP phone into an eavesdropping device, citing a Grandstream SIP phone as an example....

SIA Offers Networking Opportunity With Australian Delegation 

The Security Industry Association (SIA) announced it will co-host a Sept. 18 reception at the Australian Embassy in Washington, D.C. for SIA members to network with a visiting delegation of leading-edge Australian security companies. The 4:30 -- 8:00 p.m. event is available to the first 30 SIA members who register.
"SIA is continuing its efforts to present international market opportunities for our members," says Richard Chace, executive director and CEO, The Security Industry Association. "We view this networking event as the beginning of a new relationship with these companies as well as the Australian Security Industry Association."...

Surveillance Vs. Privacy: A War People Aren't Fighting 

Largely unmonitored and apparently ineffective in solving any crimes, the video surveillance cameras in San Francisco housing projects have become symbols of futility and waste. The intrusive Big Brother implications of cameras peering into the daily lives of its citizens were ominous enough. But for many who responded to news of the cameras, the real crime is the money spent on something that simply doesn't work, reports The San Francisco Chronicle.
However it plays out, the controversy opens a window on a much larger truth: Americans are being closely and constantly watched, carefully scrutinized and meticulously monitored as never before. From government wiretapping, to Google cameras that offer up street-level views of private houses around the world, to mighty digital data banks that record and store everything from real estate loan applications to pizza purchases, the machinery of observation and analysis has become powerful and pervasive....

Survey Says Corporate Security Policies Often Not Enforced 

What keeps security administrators awake at night? It could be the latest attack, or a newly-discovered vulnerability in the systems. But according to a report by Forrester Research and RSA Security, creating a security policy is still the biggest nightmare for most chief security officers.
Sixty-two percent of respondents consider the enforcement of existing company policies to be their most pressing driver in ensuring that data is properly secured. However, controlling the rising costs of ongoing compliance with those policies is becoming a burden, and 33 percent of the respondents -- the majority response to this question -- said compliance costs are too high.
Security policy issues have been around for years -- and that's part of the problem. Fifty-five percent of respondents have data security policies that are either outdated or require significant changes to bring them in line with regulatory and company mandates, the study says....

A New Dawn: Using CCTV As Infotainment 

As protesters gathered outside the Security and Prosperity Partnership summit in Montebello, Quebec, to confront George Bush, Felipe Calderón, the Mexican president, and Stephen Harper, the Canadian prime minister, Associated Press reported this detail: "Leaders were not able to see the protesters in person, but they could watch the protesters on TV monitors inside the hotel ... Cameramen hired to ensure that demonstrators would be able to pass along their messages to the three leaders sat idly in a tent full of audio and video equipment ... A sign on the outside of the tent said, 'Our cameras are here today providing your right to be seen and heard. Please let us help you get your message out. Thank You.'"
Like contestants on a reality TV show, protesters at the SPP meeting were invited to vent into video cameras, their rants to be beamed to "protest-trons" inside the summit enclave. It was security state as infotainment. ...

Survey Finds Top Concerns for Network And Security Managers 

Q1 Labs, Waltham, Mass., a network security management company, finds that today's IT managers are plagued with insider threats and internal issues, according to a new survey.
Responding to these concerns requires more complete internal monitoring that integrates with identity and access frameworks to identify who, not just what, is responsible.
A survey of more than 9,000 network and security managers from various industries and organizations found that more than 53 percent of respondents cited security mishaps originating from employees' careless or malicious behavior as their top issue. ...

School Districts Nationwide Get Help From GE Security 

GE Security Inc., Bradenton, Fla., is providing a new strategic planning model designed to help make schools safer and more secure.
The company is collaborating with school districts in Lynn, Mass., and elsewhere around the country, to develop and execute strategic security plans designed to create safer and more secure learning environments while maximizing return on security infrastructure investments. In addition to Lynn, these include the School District of Manatee County, Fla., and Scottsdale Unified School District, Ariz....

Canadian Security Personnel Face Stricter Rules 

Ontario's private security industry quietly entered a new era when legislation governing private security guards and investigators came into force, reports The London Free Press.
Designed to better define the role of a growing number of security personnel and ensure stricter standards of training, the new act overhauls rules that had been in place since 1966.
The new legislation, the Private Security and Investigative Services Act, requires all private security practitioners to be licensed, including in-house security staff, such as those working for retailers and bars, who were previously exempt....

CCTV And Recorded Footage Take On Casino Criminals 

When Ah Tung was fighting a Macau casino to honor a $95,000 jackpot she won on a slot machine, the 16-year-old had reason to thank the CCTV cameras, reports Agence France-Press (AFP).
The video footage helped the teenage Hong Kong native win the money after Sands casino in the southern Chinese city refused to pay her, arguing she was too young to be there.
The unprecedented case, which made headlines worldwide in February, was decided when Macau's gaming watchdog promised whoever won a game "without cheating" would receive their payouts. ...

Business Management Botching Access Control, Survey Says 

Polled about their organization's approaches to identity and access management, audit and compliance professionals in industry and government expressed a high level of frustration with how their IT and business management units are managing IAM.
Almost half (45 percent) of the 845 respondents questioned by the Ponemon Institute for the research study released today said their own organization does not effectively focus its IAM policies and controls on areas of business risk.
The compliance professionals, 68 percent of whom said IAM products were in use in their organizations, also expressed frustration that IT and business management groups weren't collaborating well in deploying IAM....

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | Next

Govt Security


This month in Access Control

Latest Jobs

Popular Stories

Back to Top