This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Keywords » value added security

Items Tagged with 'value added security'

ARTICLES

SEC0818-gsx-clinton-prod6-feat-slide_900px

Combines Digital Signage and Theft Deterrence

August 10, 2018
One Comment
Dave Tyson

How to Become a Customer-Facing Security Executive

Diane 2016 200
Diane Ritchey
May 1, 2015
No Comments

In early April, Wall Street’s oversight committee announced that bank’s oversight of cybersecurity measures at outside firms it does business with remains a work in progress, at best. It cited a survey of 40 banks that found that only about a third require their outside vendors to notify them of any breach to their own networks, which could in turn compromise confidential information of the bank and its customers.


Read More
Jamie Bumgardner, Chief Operating Officer of Prime Communications, Inc. (left) and Greg Boettger, Director of Technology for Bellevue Public Schools

The Security Enterprise and Integrator Game Plan

Diane 2016 200
Diane Ritchey
March 1, 2015
No Comments

Walk through the show floor at ISC West in Las Vegas next month and you’ll see hundreds of security products peddled by vendors wanting to sell you the “latest and greatest” in security technology. But sometimes, you don’t need technology as much as you need someone to sit down with you and have a frank and honest conversation about what you should or should not install in your enterprise. Then you can talk technology, right? Of course, it all depends upon your situation, your environment and the risks that you are trying to mitigate, but who wants to be sold something that they don’t need or can’t use?


Read More
Enterprise Benefits from Security 500

Enterprise Benefits from the Security 500

The Security 500 Benchmark Program is your tool to enter your security-related data and receive a confidential and free benchmarking report.
July 1, 2014
No Comments

New this year is that all participating enterprises have the option to be included in the Security 500 rankings numerically or to be listed alphabetically. We have made this change to allow those concerned with numerical rankings to be included and recognized among the best security leaders in the world.


Read More
Government facility and the ID

Adding Badges to Save Budgets in Local Governments

Badging several thousand employees in several hundred different facilities can prove to be very complex.
Diane 2016 200
Diane Ritchey
March 1, 2014
No Comments

Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.


Read More
Security Officer

How to Build Ownership of a Contracted Security Officer Program

As enterprises are forced to cut budgets and adapt to leaner times, proprietary security forces are often one of the first things to shrink.
Claire Meyer
February 1, 2014
No Comments

At Columbia College, a 16-building private liberal arts college in Chicago’s South Loop neighborhood, Bob Koverman, the associate vice president of campus safety and security, says there is no silo or separation between the 70-75 contracted security officers and supervisors and the in-house security staff on campus.


Read More
RFID technology

How RFID and NFC Technology Enhances the Enterprise

RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.
Claire Meyer
January 6, 2014
No Comments

In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.


Read More
profiles feat

Joseph Perchetti: Tomorrow’s Leaders

“I believe our greatest contribution to every student, staff member, parent and community member is the availability of services from our security department.”
November 5, 2013
No Comments

“We treat everyone, from kindergarten on up, with respect,” says Joseph Perchetti, Supervisor of Security for the Radnor, Penn., Public School District. “They are our customers, and their taxes pay our salaries. We go the extra mile to make sure they are secure and to ensure that they can focus on education.”


Read More
most influential feat

The Most Influential People in Security 2013

Nominated by their colleagues and associates, these top enterprise security executives are changing the security landscape for the better.
September 1, 2013
No Comments

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.


Read More
smart card feat

Smart Card Solutions to 8 Security Headaches

Keep your head out of the technology razzle-dazzle – focus on furthering your enterprise’s business needs.
Zalud 2016 200px
Bill Zalud
September 1, 2013
No Comments

 For enterprises considering higher level and more integrated physical and logical security, identity and access management solutions through smart cards or more sophisticated credentialing, keep your head out of the technology razzle-dazzle. 


Read More
More Articles Tagged with 'value added security'
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Sponsored content bnp covid  3j9fmqpy3i  1
Sponsored By
SureView Operations

How command centers are responding to COVID-19

In recent months, I’ve had many different conversations with our customers about how the COVID pandemic has impacted their security operations—from global companies with hundreds of thousands of employees to much smaller organizations with control rooms responsible for local operations and campuses. The overwhelming feedback is that everyone has needed, in one way or another, to change their processes, and expect to continue having to do so for the foreseeable future.

Popular Stories

twitter

Dutch police confirm hack of Donald Trump's Twitter account

SEC1120-Protests-Feat-slide1_900px

Terrorism and security threat trends in 2021

SEC0719-Privacy-Feat-slide1_900px

5 cybersecurity predictions for 2021

Suburbs of Chicago install gunshot detection solution

Kankakee and North Chicago in Illinois deploy gunshot detection solution for patrol

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

CISA updates emergency directive for SolarWinds Orion compromise

2.16_SEC_SBS_360X180_customcontent.png

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing