We’ve all used different types of entrances as we move about in the world: swing doors, sliding doors, revolving doors, gates and turnstiles. Aside from providing access into buildings, how many people consider that certain types of entrances can reduce costs and sometimes create opportunities to make money?
With a global presence of more than 1,400 locations in 45 countries and around 25,000 employees, the security team at Iron Mountain Incorporated, the global leader in storage and information management services, is instrumental to the company’s success.
The cost of a typical cyber breach to an American company is much less than generally estimated, providing one possible explanation for why companies do not invest more to improve computer security, according to a new RAND Corporation study.
Malaysia’s government has proposed to increase security at the country’s international airports in the wake of terrorist attacks at similar facilities overseas, such as Brussels, Belgium; and Ataturk, Turkey.
In Part I of this two-part article, “Defining Basic Tailgating Prevention Capabilities and Goals,” we organized different types of pedestrian security entrances into four distinct Capability Levels for combatting tailgating: Crowd Control, Deterrent, Detection and Prevention. We showed that each level has a different impact on an organization in terms of capital cost and whether security staff are recommended based on the entrance location and the need to respond to jumping over, crawling under, or other tailgating infractions.
Not all security entrances work the same way. Their different capabilities, therefore, have an impact on an organization’s overall anti-tailgating strategy in terms of capital outlay, manpower needed, annual operating costs, ROI, and user education and preparation.
Start off the new year with an exclusive look at the innovative security technology in the U.S. Bank Stadium in Minneapolis in our annual Security Technology & Innovations Report. This issue also includes guides for retail security leaders on video surveillance techniques, tips for retrofitting your access control systems, and recommendations for the new U.S. president on cybersecurity and terrorism.