Case Studies (Services)

Learn how security services, such as background checks, applicant screening, security uniforms and more, can add to your enterprise and your security program.

ARTICLES

Using Insurance Credits to Justify Security Investments

Your insurer is your partner in the risk business. The more insurers understand how security products can impact risk mitigation, the more effectively they will be able to price premiums. Your company’s insurance rates are commensurate with your risk exposure,” says Neil Lakomiak, Business Development Director, Building and Life Safety Technologies for UL LLC.


Read More

Enhancing Public Safety with Video Surveillance Integration

Launched in 2007, Operation Shield is an initiative of the Atlanta Police Foundation and the Atlanta Police Department (APD) to generate effective communication between the APD and both the public and private sectors and create a force multiplier for crime prevention and emergency preparedness. Through the Operation Shield Video Integration Center (VIC), APD officers are able to use software to monitor video feeds from both public and private sector cameras.


Read More

"Fair Chance" Legislation Changes Background Check Rules in San Francisco

The San Francisco Board of Supervisors passed the Fair Chance Ordinance, which limits when and to what extent employers can inquire into an applicant or employee’s criminal history

Employers cannot inquire into or run background checks involving criminal history until after the first live interview (including telephone or videoconference) or a conditional offer of employment. Employers cannot seek criminal conviction information on job applicants.


Read More

How Canines Can Boost Security and Detection

In the ever-changing world of security, staying one step ahead of the enemy is paramount.

With the collapse of the World Trade Center in 2001, a pilot program called Puppies Behind Bars entered the War on Terror. First, the Bureau of Alcohol, Tobacco, Firearms and Explosives, one of the country’s largest Contract Working Dog (CWD) employers, came knocking.


Read More

Top 10 Background Check Trends for 2014

Background screening is often the first line of defense against insider threats in an enterprise,

Background screening is often the first line of defense against insider threats in an enterprise, but according to Employment Screening Resources CEO and Founder, attorney Lester Rosen, “2014 promises to be the year of challenges in screening.”


Read More

The Due Diligence of Effective Background Screening

The days of basing a hiring decision on gut instinct are long gone, with the need for pre-employment background checks a must in the process.

 Most companies understand that one negative workplace incident can cripple a business; therefore an effective background check is vital to the well-being of the organization and staff. Moreover it is the imperative of Chief Security Officers and Human Resources to work together to ensure the due diligence of comprehensive background screening. 


Read More

Trust but Verify

 The business of hiring is a minefield of potential loopholes and pitfalls that culminate with one simple truth: “Everyone can lie.” It often falls to the security team to verify the backgrounds of potential employees, to ensure that applicants are being honest about where they’ve worked, what they’ve done and who they are. 


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

April 2015 security magazine cover

2015 April

In this April 2015 issue of Security, find out how to keep your enterprise resilient after a disaster in 2015. Also discover how to strike a balance between design basis threats and active shooter threats and see what's in store for the 2015 RSA Conference.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.