In the past year, highly publicized mass shootings — especially the Sandy Hook Elementary School tragedy in December — have made the call for armed security officers commonplace. To many, it seems logical to fight fire with fire; that is, using armed officers to combat armed criminals and prevent tragedies from occurring.
Welcome to the adventures of complete facility access control solutions. Enterprise security leaders and integrators face diverse mysteries here, but each can be solved with an intelligent mixture of technology, security focus and IT collaboration, seasoned with a big dose of bottom-line business benefits.
The Bandos Island Resort and Spa had a communications problem – the Maldives Islands resort needed a direct connection between the two control centers over an eight-mile distance without spending more money on a legacy audio system.
The video analytics drums are beating louder these days. But now may finally be the time when technology advances, security-and-beyond enterprise-centric applications, IT’s big data notion and smarter systems integration are trending to real, cost-effective benefits.
Conducting investigations within a security organization is very different than an episode of Miami Vice– from the timeframe to the interviews to, probably, the color of the investigator’s blazer. The process isn’t as thrilling as TV makes it out to be, but, as ACFE President and CEO James Ratley knows, that perception can work in your favor
Businesses today face an ever growing array of threats to the security of their critical data and IT assets. From sophisticated cyber attacks to unintentional data exposure to environmental threats, the list of potential causes of harm is endless.
Start off the new year with an exclusive look at the innovative security technology in the U.S. Bank Stadium in Minneapolis in our annual Security Technology & Innovations Report. This issue also includes guides for retail security leaders on video surveillance techniques, tips for retrofitting your access control systems, and recommendations for the new U.S. president on cybersecurity and terrorism.