Complexity is not our friend. It is the enemy of execution. However, where there is complexity there is also opportunity for technology and service providers who understand the complexity, embrace it and reduce its impact on their client’s organization.
Bike thefts, drug abuse, assaults and other violent crimes, protest-counterprotest melees, and cyber hackers are crowding onto the ever-expanding plates of college and university police and security forces. But those in the field say they’re up to those myriad challenges thanks to the combination of equipment, technology and training they can bring to bear.
It’s the time of year, after all, when extended families gather to celebrate the season with warm embraces and holiday cheer – up until the moment when we realize that, while we love each other, we don’t really enjoy being in the same room together for very long.
With a global presence of more than 1,400 locations in 45 countries and around 25,000 employees, the security team at Iron Mountain Incorporated, the global leader in storage and information management services, is instrumental to the company’s success.
Contactless card-based access control systems were developed to better protect facilities from unauthorized visitors, but it didn't take long for hackers to learn how to fool the system.
The security system in a typical small to medium business (SMB) will likely include surveillance cameras, a recorder, access control software with cards and card readers, and intrusion sensors with an alarm panel.