From the numerous security industry expositions to the Jones’ wireless home broadband net, today’s overarching buzz percolates with two words – Internet Protocol. For enterprise security operations, it’s IP security
Web-hosted access control solutions allow end-user security to create user directories, which are housed off-site on server farms. The application includes activity logs and other features. Display courtesy of Brivo
Identity theft shakes whole communities. Pictured is a free community shred to combat identity theft. The event, sponsored by Crime Stoppers, Shred-It and Wal-Mart allowed people to dispose of sensitive
From Saflink, the SureAccess all-weather, smart card, biometric reader meets the strict requirements of FIPS 201’s Personal Identity Verification of federal employees and contractors. It’s based on technology previously deployed
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.