No matter how many drills, practices and training exercises an enterprise runs through, nothing can truly prepare security staff for the chaos that results during a security incident such as an active shooter event, which, on average, can last for 12.5 minutes. Given this reality, it only makes sense for the security department to develop standard operating procedures (SOPs) for security staff and operators to follow in an active shooter or other crisis situation.
Blending legacy physical security devices and software with newer products and services often is at the heart of any retrofit project – whether you are a retail business in search of higher resolution camera technology for more accurate images, or you’re the head of a multi-location organization that wants to take advantage of current access control card reader technology without installing completely new door controllers, card readers and wiring.
Access control providers continue to develop innovative new technologies that deliver greater value and control for end users, but technology is only one part of the access control story. Equally important is what happens before, during and after the sale, so that you get the most out of your access control system. What are the 10 things that you should demand and receive from your access control provider?
While there was plenty of security solutions and products discussed at this year's Axis Connect and Converge Conference, the keynotes, panels and breakout sessions frequently featured one major theme: Do you know what your end customer needs?
Dave Aflalo has protected Presidents of the United States, nuclear power plants and CEOs. Over a 35-year career, his work has spanned the industry spectrum and has included senior leadership roles ensuring security and safety in both the public and private sectors.
Born and raised in Silicon Valley, Maloof has always had a fascination with technology, so landing a job at Oracle Corporation and quickly working his way up to Vice President of Global Security there has been a great fit. “Information technology is where it’s at, and I want to be where it’s at. IT is truly a global sector, and our customers and employees are everywhere,” he says.
“Water is the most precious resource in the world. You can live without food for a while, you can live without electricity, you can live without transportation, you can live without internet (despite what my kids say), but you cannot live without clean water. And that’s what makes my position so challenging,” says Scott Starkey, Security Manager for Birmingham Water Works.
Complexity is not our friend. It is the enemy of execution. However, where there is complexity there is also opportunity for technology and service providers who understand the complexity, embrace it and reduce its impact on their client’s organization.
Years ago, installing a new surveillance system often meant finding a comfortable trade-off between improved security and the amount of hardware you were willing to look at on a daily basis.
Security is an around-the-clock job that doesn’t end just because the sun goes down. Many organizations, especially those in commercial industrial sectors such as airports, warehouses or critical infrastructure facilities, require advanced tools to provide perimeter security or monitor buildings and other assets after dark.