This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Authors » Bill Zalud

Articles by Bill Zalud

migrating feat

Migrating from Keys: It’s All in the Journey

When “Do Not Duplicate” is not working as a key control strategy, perhaps it’s time to consider switching to electronic access control solutions.
Zalud 2016 200px
Bill Zalud
November 5, 2013

 Among the worst things to hear: “I can’t find the master key.” Whether lost or stolen, that situation triggers a long and expensive process of rekeying. Perhaps this is the last straw pushing your enterprise toward an electronic access control solution. 


Read More
video feat

How Video Recorders Provide Critical Support to the Enterprise

While cameras are becoming a critical enabler of operational excellence, reliable video storage is the absolute necessity to ensure that the tool is there when you need it.
Zalud 2016 200px
Bill Zalud
November 5, 2013

 More cameras, storage, sharing of security video and more uses…all of which leads to an expanding array of storage choices: digital video recorders (DVRs), hybrid DVRs and hybrid network video recorders (NVRs), pure NVRs, virtual storage, storage in the cloud and, for some, especially retail, storage to analytics by a specializing third party. 


Read More
cards feat

Adding Value by Adding Functions to Cards and Badges

More is never less when it comes to enhancing an enterprise security access control system with features that complement both security and business goals.
Zalud 2016 200px
Bill Zalud
October 1, 2013

More is never less when it comes to enhancing an enterprise security access control system with features that complement both security and business goals.


Read More
zalud feat

Concerns of Fed Phone, Internet Surveillance Lead to Privacy Discussion

The NSA’s data collection has proven troubling, and many Americans’ privacy concerns grow.
Zalud 2016 200px
Bill Zalud
September 1, 2013

In a New York Times/CBS NewsPoll, a week after the Boston Marathon attack, which was unraveled after the release of video footage of the two suspects flushed them out of hiding, 78 percent of people said surveillance cameras were a good idea.


Read More
smart card feat

Smart Card Solutions to 8 Security Headaches

Keep your head out of the technology razzle-dazzle – focus on furthering your enterprise’s business needs.
Zalud 2016 200px
Bill Zalud
September 1, 2013

 For enterprises considering higher level and more integrated physical and logical security, identity and access management solutions through smart cards or more sophisticated credentialing, keep your head out of the technology razzle-dazzle. 


Read More
ip feat

Measuring the Next Step in IP-Based Access Control

IP-based access calls for strategies involving diverse stakeholders and beyond-security applications.
Zalud 2016 200px
Bill Zalud
September 1, 2013

 Wireless. At the edge. Firmware. Multi-technology readers. Near field communication (NFC). In the cloud. Leveraging the network. Scalability. Video integration. Seamless analytics. 


Read More
supply chain feat

Building Strong Links in Supply Chain Security

How can video management systems help strengthen the links in your enterprise’s supply chain?
Zalud 2016 200px
Bill Zalud
August 1, 2013

The supply chain is a long and complex one. And one that needs protection along the way. At BJ’s Wholesale Club, there is everything from pallets of goods to choice steaks along the chain.


Read More
cameras feat

Uncovering Mega-Purpose Uses for Megapixel Cameras

Peter Knight has the “Big Bertha” and likes it.
Zalud 2016 200px
Bill Zalud
July 1, 2013

Peter Knight has the “Big Bertha” and likes it. In fact, he’s thinking of getting another 29-megapixel security camera. 


Read More
video feat

Retail Video Balances Security and Sales

James Connolly wanted to significantly cut losses while having better images for liability and prosecution use.
Zalud 2016 200px
Bill Zalud
June 1, 2013

 

It’s a balancing act. James Connolly wanted to significantly cut losses while having better images for liability and prosecution use. Tatiana Fokina, on the other hand, wanted to create a secure shopping experience that matches her inventory and customer profile.


Read More
feat

Developing Multi-Tasking Security for Unique Lobbies

Movie star Drew Barrymore’s grandfather, old-time actor John Barrymore was dead wrong when he once said that “happiness often sneaks in through a door you didn’t know you left open.”
Zalud 2016 200px
Bill Zalud
June 1, 2013

Movie star Drew Barrymore’s grandfather, old-time actor John Barrymore was dead wrong when he once said that “happiness often sneaks in through a door you didn’t know you left open.”


Read More
Previous 1 2 3 4 5 6 7 8 9 … 41 42 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security camera
    Sponsored byAxis

    The power of analytics in surveillance: What can they do for you?

  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • fiserv-forum
    Sponsored byAxis

    Wisconsin’s Deer District scores a winning security plan

Popular Stories

Top cyber security conferences 2023

Top cybersecurity conferences of 2023

Top security conferences of 2023

Top security conferences of 2023

Cyber tactics

2023: The year for contextual cyber threat intelligence

health care data privacy

The outlook for healthcare cybersecurity in 2023

Campus security officer

Considerations for security officer training in healthcare facilities

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

February 16, 2023

Executive Protection for Hospitals and Healthcare Facilities

A head of state needs heart surgery at your facility. High-profile members of a national sports team are getting updated vaccinations. What do you do when you get the call?

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing