Featured Stories

Top Security Technology and Innovations in 2014

Technology has become ingrained in enterprise security operations.
No Comments

Like most other segments of the business world, technology has become ingrained in enterprise security operations. With that increased use of technology comes a new set of risks.


Read More

How Mesh Networks Form the Backbone of Smart Cities

Wireless mesh networking is not for everyone. But, when it makes business sense, it works the best.
By Bill Zalud
No Comments

Overall, a wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways.


Read More

How Emergency Messaging Aids Access Strategies

Getting the word out, correctly, in time and to the right people, is an important mission for colleges and universities.
By Bill Zalud
No Comments

Mass notification has become a key element of campus safety and security. John Dellacontrada, assistant vice president of media relations at the University of Buffalo, New York, says he sought a “solution that we could deploy quickly and consistently, one that would work on desktop and mobile devices to get a message broadcast via various ways and that could work with our existing emergency public address system.”


Read More

The Future of Big Data for Retail and Property

As interesting as Big Data can be for finding patterns in the past, its biggest promise for security lies in being able to predict the future.
By Steve Van Till
No Comments

As interesting as Big Data can be for finding patterns in the past, its biggest promise for security lies in being able to predict the future.


Read More

Security 500: How Security’s Risk Mitigation Focus Creates a Risk-Nado!

What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
No Comments

Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.


Read More

2013 Security 500 Sector Reports

Use Sector-Specific Benchmarking to Compare Your Enterprise’s Focuses to Those of Your Peers
No Comments

What are security’s top critical issues? What department does security report to? How are budgets changing? What responsibilities do security leaders shoulder within their organization? Compare your enterprise’s focuses to those of your peers in the Security 500’s sector-specific analysis.


Read More

2013 Security 500 Report Methodology

Get the Background on the Security 500 Sources, Key Metrics and Feedback.
No Comments

The Security 500 tracks 17 vertical markets and collects unique data where appropriate (such as patients in healthcare) and applies this data to key metrics.


Read More

2013 Security 500 Rankings

Compare Security 500 Company Rankings Sector-by-Sector in this Benchmarking Tool.
No Comments

Where does your enterprise stand? Compare security rankings sector-by-sector in this benchmarking tool to determine who the frontrunners and thought-leaders are in your enterprise’s field. 


Read More

Migrating from Keys: It’s All in the Journey

When “Do Not Duplicate” is not working as a key control strategy, perhaps it’s time to consider switching to electronic access control solutions.
By Bill Zalud
No Comments

 Among the worst things to hear: “I can’t find the master key.” Whether lost or stolen, that situation triggers a long and expensive process of rekeying. Perhaps this is the last straw pushing your enterprise toward an electronic access control solution. 


Read More

How Video Recorders Provide Critical Support to the Enterprise

While cameras are becoming a critical enabler of operational excellence, reliable video storage is the absolute necessity to ensure that the tool is there when you need it.
By Bill Zalud
No Comments

 More cameras, storage, sharing of security video and more uses…all of which leads to an expanding array of storage choices: digital video recorders (DVRs), hybrid DVRs and hybrid network video recorders (NVRs), pure NVRs, virtual storage, storage in the cloud and, for some, especially retail, storage to analytics by a specializing third party. 


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+