From the numerous security industry expositions to the Jones’ wireless home broadband net, today’s overarching buzz percolates with two words – Internet Protocol. For enterprise security operations, it’s IP security
Web-hosted access control solutions allow end-user security to create user directories, which are housed off-site on server farms. The application includes activity logs and other features. Display courtesy of Brivo
Identity theft shakes whole communities. Pictured is a free community shred to combat identity theft. The event, sponsored by Crime Stoppers, Shred-It and Wal-Mart allowed people to dispose of sensitive
From Saflink, the SureAccess all-weather, smart card, biometric reader meets the strict requirements of FIPS 201’s Personal Identity Verification of federal employees and contractors. It’s based on technology previously deployed
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.