Security Enterprise Services

Driving with One Hand: Using a Single Solution for IT Asset Management

Single IT asset management solutions facilitate easier training, more secure devices and happier employees.
Read More

The Perfect Host? It’s a Matter of Choice

No doubt, too many choices can lead to confusion. Still, and obviously, the ubiquitous Web and mobile devices, to a lesser extent, have spurred hosted and managed services, remote intelligent monitoring, software-as-a-service and in-the-cloud solutions that impact access control, security video, mass notification and even security guarding.
Read More

Drive Down Risk by Leveraging Compliance

It’s a scary world out there. Hackers stalk your networks just waiting to access your data. Identity thieves are busily scheming how to take over your assets. Fraudsters look for ways to take advantage of your good graces for personal gain. Maybe you have total confidence in your information security efforts because your IT team is well-versed at protecting networks and data assets. But what about the business processes themselves, or the people responsible for the day-to-day operations of those processes?
Read More

How AlliedBarton’s Security Team Adds Value to Reichhold

Reichhold, Inc. is one of the world’s largest suppliers of unsaturated polyester resins for composites and a leading supplier of coating resins for a wide variety of markets and applications. With its world headquarters in Research Triangle Park, NC, and 19 manufacturing sites and four technology centers located around the world in 13 countries, Reichhold has the widest global reach of any resin supplier today.
Read More

More Broadcast Choices? It’s a Good Thing

That is, if it works. At 2:00 pm one day last November, the U.S. Department of Homeland Security and the Federal Communications Commission held a first-ever nationwide test of the Emergency Alert System. The plan was that all publicly-accessible television and radio stations would run the announcement.
Read More

Infinity Screening: Why Background Checks Should Never End

Learn more about what Nixon says about workplace violence prevention at iSecurity on March 8, 2012. Visit www.isecuritytradeshow.com for more information.


Read More

New Workplace Violence Film Dispels Myths

According to the new documentary "Murder by Proxy: How America Went Postal," workplace violence stems not from one bad apple but rather a toxic workplace culture.


Read More

Security Officers: A Matter of Values

Guarding Special Report and Security's 9th Annual Top Guarding Firms List
Larry McEvoy really digs his job. His firm, CONSOL Energy, a leading diversified energy company, helps generate two-thirds of the nation’s power supply, responsible for mining more high-quality bituminous coal than any other U.S. producer as well as the largest gas producer in Appalachia.
Read More

How to Provide Usable Evidence that Stands Up in Court

When all is said and done, there are three variables in providing the type of recordings that the courts want.
Read More

Social Media, Mobility and the Future of Security Convergence

It is hard to imagine any market sector today that is not impacted by the “Big Three” emerging technologies: Social Media, Mobility and Cloud Computing. The holiday shopping season saw “Cyber Monday” come out of nowhere to replace “Black Friday” as a traditional benchmark for consumer spending. New media and technology are being rapidly indoctrinated into our culture.
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

security 2015 january cover

2015 January

In the January 2015 issue of Security, learn how PTZ and fixed dome cameras do dual duty in video production and surveillance applications, improve security on college campuses, and how to better cope with harsh environments in surveillance. 

Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.