This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Video surveillance analytics

Video Surveillance and the Evolving Needs of the End-User: Update, Integrate, Analyze, Act

Hank monaco
Hank Monaco
June 14, 2019

Video surveillance has long been a critical component of facility management and security plans, and it is only expected to grow.


Read More
license plate

Follow Local Traffic Laws On Your Drive Home Tonight!

New traffic analytic solutions are so smart, they can detect numerous violations
Aluisio figueiredo
Aluisio Figueiredo
June 11, 2019
Safe driving practices are undoubtedly proven to reduce traffic and pedestrian accidents, which makes roadways safer for all. Abiding by local traffic laws can also keep your car insurance down, as moving traffic violations can dramatically increase your rates, or lead to possible license suspension or revocation. Traffic detection technology just got a whole lot smarter as the result of powerful new surveillance analytics that are about to hit the streets.
Read More
building entrance

Access Control Should Always be the First Layer of Security

Karen evans
Karen Evans
June 11, 2019
Security industry professionals seem to hold differing opinions on whether video surveillance or access control is the predominant platform when implementing an integrated security solution. Truth of the matter is that access control systems are more prevalent in terms of the sheer number of systems deployed, the size and scale of deployments and actual daily engagement by users. And for good reason! When a potentially threatening event unfolds, an access control system can instantly shut down a facility, or specific areas within it, potentially saving lives.
Read More
data theft

Insider Threats: An Underestimated Risk

Bud Broomhead
June 11, 2019
What is an insider threat? Security professionals know that insider threats, by their nature, are a broad-based threat and, more than ever before, can be extremely difficult to defend against. In this article, we will briefly discuss the possible risks, as well as some options for building up your defenses.
Read More
global

What is New (and What Isn’t) in Business Continuity Planning

Kevin alvero 2017 head shot
Kevin Alvero
Wade cassels
Wade Cassels
June 6, 2019
Whether fire, flood, drought, earthquake, hurricane, political unrest or cyberattack, there is no place that organizations can go to be completely safe from disaster.
Read More
cyber cloud

The Top Five Security Cloud App Events for Organizations to Monitor

Mike mason
Mike Mason
June 6, 2019
Of the 15 percent of workers who changed or lost their jobs in the past year, half took confidential company data with them – and 52 percent didn’t view the use of such documents as a crime. A lack of security can impact an organization’s growth and innovation, making it more difficult to meet workforce and customer needs.
Read More
cyber_lock

How CISOs Can Consolidate Security Tools

James semperis
James Doggett
June 6, 2019
There is a need for security teams to consolidate their security solutions to increase visibility, reduce clutter, manage costs and simplify their cybersecurity processes. However, it’s important that we are clear with why security teams are facing this situation.
Read More
Airport at Sunset

Don't Forget Accommodations: Ensuring Traveler Safety 24/7

Matthew bradley
Matthew Bradley
May 30, 2019

For corporate travel managers, understanding Duty of Care is essential for ensuring compliance and establishing a sufficient travel policy for employees.


Read More
facialrecognition

In the Age of Facial Recognition, The Human Element is Still Necessary

Tim lozier
Tim Lozier
May 29, 2019

With San Francisco banning the use of facial recognition technologies for their local agencies, the debate on the efficacy of the technology has risen back into the national debate arena. 


Read More
AI-enews

Automation: Moving Security from Human to Machine Speed, and All its Implications

Part 2 in a 3-Part Series
Dave barton
Dave Barton
May 28, 2019
Security teams today are under-staffed, over-worked, under-funded and struggling to stay abreast of the ever-changing threat landscape. Many security analysts work long hours poring over millions of security events to protect systems and fix vulnerabilities. Simply put, there is too much information and not enough analysts. Fortunately, humans are not the only answer for solving the cybersecurity crisis.
Read More
Previous 1 2 … 169 170 171 172 173 174 175 176 177 … 208 209 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security camera
    Sponsored byAxis

    The power of analytics in surveillance: What can they do for you?

  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • fiserv-forum
    Sponsored byAxis

    Wisconsin’s Deer District scores a winning security plan

Popular Stories

Top cyber security conferences 2023

Top cybersecurity conferences of 2023

Top security conferences of 2023

Top security conferences of 2023

Cyber tactics

2023: The year for contextual cyber threat intelligence

health care data privacy

The outlook for healthcare cybersecurity in 2023

Campus security officer

Considerations for security officer training in healthcare facilities

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

February 16, 2023

Executive Protection for Hospitals and Healthcare Facilities

A head of state needs heart surgery at your facility. High-profile members of a national sports team are getting updated vaccinations. What do you do when you get the call?

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing