This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Physical » Access Management

Access Management
Access Management RSS Feed RSS

videoverification

Video Verification: Use it Wisely!

Joel Jensen
November 29, 2010
The term “video verification” generally applies to the use of a camera to verify whether an intrusion alarm is genuine, false, or a nuisance alarm. A false alarm would indicate an alarm generated by a system that is a result of a malfunction in the alarm system. A nuisance alarm is indicative of a system working properly, but is generated by some kind of user (human) error.
Read More

Trouble Times Three: Theft, Assets and Your Company’s Brand

diane-2016-200.jpg
Diane Ritchey
October 1, 2010
Michael Lynch, chief security officer for DTE Energy, has learned to catch the bad guys and reduce energy theft. “You hear the clichés about working harder and smarter, but we focus on the stuff that makes a difference – we don’t follow the hot thing of the month, we try to keep it simple and hold people accountable,” says Dave Abramson, manager of loss prevention for Hallmark Cards, Inc.
Read More

The Power of Connectivity

diane-2016-200.jpg
Diane Ritchey
September 1, 2010
Jeff Woodward wanted to do it right the first time. After all, you might only have one chance in your career to build a security system from the ground up. 
Read More

Security Innovations Today and Tomorrow: More Personal, Versatile and Mobile

zalud-2016-200px.jpg
Bill Zalud
September 1, 2010
Country Joe McDonald sung his question about war in the 1960s: “It’s 1-2-3, what are we fighting for?” Well, besides freedom and survival and dispatching evil, often one outcome of
Read More

People Tracking: Who, What and Where Are You?

diane-2016-200.jpg
Diane Ritchey
August 1, 2010
These days, if you don’t want to be found, or even if you do, there’s a great likelihood that someone will find you.  For Jeff Schoepf, CPP, security director for
Read More

A “Touchdown” for Security

Mark McCourt
August 1, 2010
At the heart of the New Meadowlands Stadium (NMS) is the deft integration of guest service and security. It is designed to focus on deterrence as a highly secured, hard
Read More

Poor Sister No More: Access Enters Spotlight, Again

zalud-2016-200px.jpg
Bill Zalud
August 1, 2010
Before everyone fell in love with their security video image, before there were millions of cameras from lipstick to megapixel, there were electronic access control systems, which were true revolutionary
Read More

Using Access and ID Control to Prevent Workplace Violence

Bernard J. Scaglione
July 1, 2010
On June 3, 2010 The Joint Commission, the accreditation organization for healthcare issued what they call a “Sentinal Event Alert,” which is an affirmation of a serious event issued by
Read More

The Good and Bad of Protecting the Goods

diane-2016-200.jpg
Diane Ritchey
June 1, 2010
Maybe it’s because the area can often cover thousands of square feet. But securing a warehouse or distribution facility can be challenging and complex. In March, thieves scaled a wall
Read More

Facilities Open Doors to Custom Access

diane-2016-200.jpg
Diane Ritchey
June 1, 2010
At the Met at Warner Center, a large condominium community, standardized access control is managed to 100 main entry doors, 16 telephone entry systems, a visitor management system at the
Read More
Previous 1 2 … 146 147 148 149 150 151 152 153 154 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

  • clouds in sky
    Sponsored byMilestone Systems

    Smaller School Districts are Facing Infrastructure Growing Pains

Popular Stories

Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

criminal-on-laptop.jpg

T-Mobile confirms second data breach in 2023

multicolored text on black screen

ScanSource suffers ransomware attack

globe

Understanding cybersecurity trends and regulations in a global world

drone flies over landscape

Technology hones physical security threat assessments

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 6, 2023

Measure What Matters: The Top 10 Reports Every Security Leader Should Have

Are you ready to elevate your security game and take charge of your data-driven decision-making? As today's industry leaders know, data is key to driving impact and success.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
May 2023 Webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing