Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2012 February

Check out our February content!
  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top

Top Security Guarding Companies Report 2012

Security Officers: A Matter of Values
zalud-2016-200px.jpg
Bill Zalud
February 1, 2012
Larry McEvoy really digs his job. His firm, CONSOL Energy, a leading diversified energy company, helps generate two-thirds of the nation’s power supply, responsible for mining more high-quality bituminous coal than any other U.S. producer as well as the largest gas producer in Appalachia.
Read More

Featured Articles

Back to Top

The Joint Venture and Security’s Role

Jill Knesek
February 1, 2012
Back in October, I was speaking as part of a panel discussion when someone asked about the role security issues should play when an organization is entering into a joint venture. It’s an interesting question and an area where I’ve had some experience.
Read More

Megapixels Can Business-Dazzle, Too

February 1, 2012
So what if Jose Ruano and Steve Weatherly were “blown away,” in Weatherly’s own words, by megapixel cameras. But that wasn’t really justification for a hard-nosed business decision when it came to a next generation of security video technology at the University of Miami, located in Coral Gables in south Florida.
Read More

Columns

Back to Top

Keeper of the Security Team

February 1, 2012
Evan Dabby knows soccer. He also knows security. As Senior Director of Operations for Major League Soccer, he oversees security, game and medical operations and team travel for all MLS teams and venues. He is the stadium operations lead for MLS Special Events, such as the All-Star and Cup games.
Read More

The “16x Growth” Business of Ultra High-Definition Surveillance

Keven Marier
February 1, 2012
In today’s surveillance market we exceedingly judge ourselves by the number of megapixels of a camera. However, when trying to display all of those pixels the reality gets lost. This didn’t stop Avigilon from recently announcing plans for their 29MP camera, and it became apparent that our market is going to continue to run toward megapixel technology regardless of the practical usage.
Read More

As Consumer Electronics Go, So Goes Security Tech

February 1, 2012
The biggest advances in electronic security, in the past, came after World War II and the Vietnam War. No doubt, homeland security efforts and America’s involvement in Iraq and Afghanistan have also spurred technology advances. However, what happens in consumer electronics is more influential to the technology and pricing when it comes to enterprise security solutions.
Read More

Core Security Values: Do You Have Them?

Joel Jensen
January 30, 2012
I’ve written previously about the need to embrace our corporate or institutional culture and the language of business into enterprise physical security. All too often, we practical folks engaged in the day-to-day operations of our departments dismiss these concepts as superfluous or mere hoops to jump through to please some higher authority. As I’ve been known to preach about, regularly, is the need to market our services to our customers, both internal and external. One “corporate speak” method of marketing our work with the value added benefit of guiding our decision making is in the form of value statements.
Read More

Look to the Clouds and Ask, “Why?”

February 1, 2012
As Cloud Computing becomes the new platform for many aspects of our lives, from Google Mail to iTunes to banking and more, the discussion specific to security tends to focus on the What. It may be helpful to look at the Why.
Read More

Risk at High Velocity

Marleah Blades
February 1, 2012
In last month’s column, we argued that the next generation of security leaders will be challenged more than previous leaders to run their function as a business; they will be expected to align with the organization and build value through security. As they work toward these goals, they will also be faced with new risks, some of which have the potential to escalate at a stunning pace.
Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding

Epstein File Data Security Update: Raw Code Found in Emails

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing