Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Kim Rahfaldt

Articles by Kim Rahfaldt

visitor pass
Integrated Solutions

Leveraging visitor management data for enterprise safety

Security teams can use visitor management data to proactively improve enterprise safety.
Kim Rahfaldt
June 6, 2023

Visitor management systems can help organizations of all sizes by enhancing security, improving efficiency and increasing accountability.


Read More
Big data

How Leveraging Big Data Changes the Perception of Security

Kim Rahfaldt
August 22, 2019

Security professionals are often challenged by the view that physical security is a cost, more than a benefit. How can big data change that perception?


Read More
card-enews

How to Deliver Secure, Compliant Environments through Better Onboarding

Which access management approach is best for your organization?
Kim Rahfaldt
November 26, 2018
To provide a more secure environment, security directors must transition from controlling access to doors and buildings to managing the identities that walk through those doors.
Read More
airport-enews

How to Overcome Airport Identity Management Challenges

Kim Rahfaldt
May 8, 2018
No matter the size, airports are responsible for the security of all workers who are employed within their walls, on the tarmac, and grounds. The challenge is that 90 percent of those people don’t work for the airport. They work for the airlines, TSA or different vendors that reside as tenants within the airport.
Read More

4 Stages to Evaluating and Choosing a New Security System

Kim Rahfaldt
March 11, 2014
It’s time to invest in a security system or upgrade that legacy system from 1990. How does an organization decide what system to choose? What are the steps to take? Who should be involved?
Read More

How to Find Solutions for Legacy Systems

Kim Rahfaldt
January 14, 2014
The signs are there. Your system is slow, you are working with outdated technology and your software has reached maximum capacity.
Read More

How to Evaluate Your Choices for Legacy Systems

Kim Rahfaldt
November 26, 2013
You’ve reached the stage where it’s time to consider a new security system. The system you have works well enough; it might be outdated, slow or at its maximum capacity for growth, but it still does the job.
Read More

Five Ways to Optimize Your Security Management System, Part 5 of 5

Kim Rahfaldt
July 10, 2012
Embracing professional services and lifecycle management programs offered by manufacturers can help you optimize your security system and save you time, frustration and money in the long run.
Read More

Five Ways to Optimize your Security Management System, Part 4 of 5

Kim Rahfaldt
June 26, 2012
In the last article, we learned how a lifecycle management program offers detailed analysis about your security management system implementation and maximization. System audits identify trends so you can plan for expansion, resolve issues and optimize your system. Is there anything else a lifecycle management program can do for you?
Read More

Five Ways to Optimize your Security Management System, Part 3 of 5

Kim Rahfaldt
June 12, 2012
Planning for maintenance costs assists with budgeting and cost containment. Implementing a disaster recovery plan ensures the safety of your premises, people and assets. A lifecycle management program can help you with these critical aspects of your system and more.
Read More
Previous 1 2 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing