Consolidation and technological advances are changing the face of the guarding industry. How will this affect enterprise security leaders? Learn more about changes to the security officer services industry as well as the Top Guarding Firms Listing in the December 2016 edition. Also in this issue: a new financial focus on cybersecurity, what to do in your first three months as a new CSO, the ostrich style of security management, and more.
If you are a CSO or head of security, you will inevitably face the day when a senior business executive will ask you for a detailed analysis of your strategy including the level of service you provide and how it will scale over time.
In order to help enterprise cybersecurity leaders reduce the amount of time spent integrating threat management and monitoring solutions, this solution provides application testing to add proven tool options to IntellaStore II for security, analysis, forensics, or network and application performance monitoring.
One hundred ninety-three individuals suspected of traveling with airline tickets bought using stolen, compromised or fake credit card details have been detained in a major international law enforcement operation targeting airline fraudsters.
More than $460 million in cash and bearer negotiable instruments (BNIs) and some 300 weapons have been seized in a global counter-smuggling operation coordinated by the World Customs Organization (WCO) and INTERPOL.
Searchlight™ for Retail Software from March Networks and RFID Technology from Zebra Technologies
December 1, 2016
The integration of high-definition surveillance video and data from RFID-tagged items allows enterprise security personnel to quickly search events by data, time, brand, product type, serial number of Electronic Product Code, allowing them to see exactly when and how an item entered or left a location.
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.