Featured Stories

How Mesh Networks Form the Backbone of Smart Cities

Wireless mesh networking is not for everyone. But, when it makes business sense, it works the best.
December 1, 2013

Overall, a wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways.


Read More

How Emergency Messaging Aids Access Strategies

Getting the word out, correctly, in time and to the right people, is an important mission for colleges and universities.
December 1, 2013

Mass notification has become a key element of campus safety and security. John Dellacontrada, assistant vice president of media relations at the University of Buffalo, New York, says he sought a “solution that we could deploy quickly and consistently, one that would work on desktop and mobile devices to get a message broadcast via various ways and that could work with our existing emergency public address system.”


Read More

The Future of Big Data for Retail and Property

As interesting as Big Data can be for finding patterns in the past, its biggest promise for security lies in being able to predict the future.
December 1, 2013

As interesting as Big Data can be for finding patterns in the past, its biggest promise for security lies in being able to predict the future.


Read More

Security 500: How Security’s Risk Mitigation Focus Creates a Risk-Nado!

What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
November 5, 2013

Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.


Read More

2013 Security 500 Sector Reports

Use Sector-Specific Benchmarking to Compare Your Enterprise’s Focuses to Those of Your Peers
November 5, 2013

What are security’s top critical issues? What department does security report to? How are budgets changing? What responsibilities do security leaders shoulder within their organization? Compare your enterprise’s focuses to those of your peers in the Security 500’s sector-specific analysis.


Read More

2013 Security 500 Report Methodology

Get the Background on the Security 500 Sources, Key Metrics and Feedback.
November 5, 2013

The Security 500 tracks 17 vertical markets and collects unique data where appropriate (such as patients in healthcare) and applies this data to key metrics.


Read More

2013 Security 500 Rankings

Compare Security 500 Company Rankings Sector-by-Sector in this Benchmarking Tool.
November 5, 2013

Where does your enterprise stand? Compare security rankings sector-by-sector in this benchmarking tool to determine who the frontrunners and thought-leaders are in your enterprise’s field. 


Read More

Migrating from Keys: It’s All in the Journey

When “Do Not Duplicate” is not working as a key control strategy, perhaps it’s time to consider switching to electronic access control solutions.
November 5, 2013

 Among the worst things to hear: “I can’t find the master key.” Whether lost or stolen, that situation triggers a long and expensive process of rekeying. Perhaps this is the last straw pushing your enterprise toward an electronic access control solution. 


Read More

How Video Recorders Provide Critical Support to the Enterprise

While cameras are becoming a critical enabler of operational excellence, reliable video storage is the absolute necessity to ensure that the tool is there when you need it.
November 5, 2013

 More cameras, storage, sharing of security video and more uses…all of which leads to an expanding array of storage choices: digital video recorders (DVRs), hybrid DVRs and hybrid network video recorders (NVRs), pure NVRs, virtual storage, storage in the cloud and, for some, especially retail, storage to analytics by a specializing third party. 


Read More

Top Technologies from ASIS 2013

Hungry for the highlights from ASIS 2013? See Security magazine's editors' picks for this year's best in show.
November 5, 2013

The 2013 ASIS International Exhibition in Chicago was abuzz with new and renewed security solutions and technology. Hungry for the highlights? Check out Security magazine’s editors’ picks for some of the best products of the show.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

THE MAGAZINE

Security Magazine

April 2014

2014 April

In the April issue of Security magazine, read about integration partnerships and their growing success. The Boston Marathon bombing has changed the way integrators look at security for sporting events, see where they are one year after the tragic incident. Read about the 2014 RSA conference and this year's theme of "Threat Intelligence. Also, read about the latest products and news in the security industry.

Table Of Contents Subscribe

Background Checks

Who conducts background checks on new employees and contractors in your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13