The latest version of this unified IP security platform offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control software.
As Hurricane Iselle barreled down on the island of Oahu in early August, Alexander Ubiadas was prepared. He had already invested in ruggedized security equipment at isolated facilities, built long-term recovery plans and worked with his staff to get facilities as ready as possible for the storm. Because while people might survive for a while without electricity, they truly need safe, clean water, no matter the weather.
Washington state has flunked its disaster preparedness test. According to the American College of Emergency Physicians’ State-by-State Report Card, Washington state received an overall grade of “D+” and an “F” in disaster preparedness.
In the wake of recent high-profile shootings and incidents, access control, video surveillance and armed guards have become the discussion of the day to deter future attacks. But what can enterprise security leaders do about threats that cannot be prevented? How can you plan for the golden minutes following an incident?
The University of Hawaii has partnered with Ohio company Battelle to market an unmanned robotic vessel capable of exploring disaster zones in harbor ports before first-responder personnel, according to Pacific Business News.
A special task force created after Hurricane Sandy recommends that new construction be built to withstand the force of increasingly dangerous storms, USA Today reports. The Hurricane Sandy Rebuilding Force also urged hardening of existing infrastructure to ward off power failures and fuel shortages, and to maintain cellular service during future catastrophes.
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.