Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

So, Who’s Using All Those Megapixel Cameras?

Paredes Mig
April 13, 2010
Go to any security media outlet and the talk is about megapixel cameras, even though depending on whom you ask, somewhere around 80 percent of all installations are still analog
Read More

How to Implement Cellular Alarm Solutions in your Security Portfolio

Shawn Welsh
April 6, 2010
In August 2009, The Economist estimated that home phones are being disconnected at a rate of nearly 700,000 lines per month. At that rate, the last phone line in America
Read More

How to Maximize Your DVR and NVR Storage

Mark S. Wilson
March 21, 2010
Surveillance storage solutions can have many challenges, thanks to myriads of DVR and NVR features and benefits that can range from common specifications to helpful elements such as intelligent PTZ
Read More

The Elements of a Successful Security Project

Jason Oakley
March 16, 2010
The complexity of security technology implementations demands a formal project management discipline to ensure success. More project managers in the security industry are pursuing formal qualifications such as CSPM or
Read More

How to Deploy Effective Security Outdoors

John Romanowich
March 9, 2010
Nuisance alarms are the bane of the security industry. Whether false alarms come from burglar alarms, outdoor sensors or some other system component, they can undermine security effectiveness and cause
Read More

Why Physical Keys Should Still Be a Part of your Security Strategy

March 2, 2010
Lost keys, unauthorized duplicate sets of keys and manual tracking of keys are just some of the challenges faced by management using conventional key/lock systems. But given the tremendous range
Read More

PCI COMPLIANCE: What you Don’t Know CAN Hurt You

Larry Wine
February 23, 2010
To some people, the idea of crime against merchants seems like the latest Clint Eastwood movie, but the more modern day characterization is the exploitation of customer’s sensitive payment card
Read More

Before the Alarm Sounds – Developing Effective Monitoring Response Plans

Jacky Grimm
February 16, 2010
An alarm sounds at one of your customer’s locations. It’s time for your monitoring station to spring into action. But will the response be appropriate for the event? Will it
Read More

Reducing the Cost of Storing Video Surveillance Data over Time

Charles Foley
February 9, 2010
The video surveillance world has seen a number of trends that are increasing overall system costs, including increased camera counts for better coverage, increased resolutions that produce better video, and
Read More

Top Security Guarding Companies Report 2010

7th Annual Report: Who made the list?
zalud-2016-200px.jpg
Bill Zalud
January 26, 2010
There are tall orders for security officers at Willis Tower, the nation’s highest building. Security and Life Safety Director Keith Kambic sees strength in a solid partnership.Customer service is
Read More
Previous 1 2 … 266 267 268 269 270 271 272 273 274 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing