Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2006 August

  • Cover Story
  • Featured Articles
  • Columns
  • All Stories

Cover Story

Back to Top

Cooperative Security

August 1, 2006
Security, enterprise and IT are a cooperative team -- Michael Lagow, Louis Burdulis and David Suttles better protect tech giant BMC Software.When things come together, things work better. That’s the
Read More

Featured Articles

Back to Top

Training: Games to Play

Gary Cunningham and Mike Wallace, Contributing Editor for IFPO Protection Officer News
August 1, 2006
On-the-job experiences can complement structured outside training and education for security executives, supervisors and officers. Photo courtesy of The Conley GroupMany security staff members lose valuable, realistic, training time. These
Read More

Video Surveillance: Catch the Wave

August 1, 2006
IP cameras can pull double duty by providing security services as well as complement operations such as beaches, hotel pools and recreational parks. People can go on the Web to
Read More

Access Control: Simulate an Evacuation--New Business Basic

Carey Borkoski Ph.D.
August 1, 2006
Software can bring together security executives and their CEOs in simulated evacuations that don’t close down the operation but show what’s needed by floor and exit.Read or listen to any
Read More

Integrated Systems: Critical Business Elements and Key Assets

Dr. Anthony Joseph
August 1, 2006
Military, government and private businesses must work together. Corporate CEOs and their security executives must realize that the National Strategy calls for cooperation between the private businesses (who own and
Read More

Visions: Technology and Synergies

August 1, 2006
Security has the best, most important mission. We help protect and save people’s lives, stated GE Security President and CEO Louis Parker during a tour with Security Magazine of the
Read More

Inside the Business: My Turn: Scott Maxson

August 1, 2006
"Clients choose their security level," said Scott Maxson.Security Magazine profiles Scott Maxson, director of building and protective services, Q Center Contemporary Conference Commons in St. Charles, Ill.Security Magazine: What is
Read More

Homeland Security: A Day Without Terrorists

Dean C. Alexander
August 1, 2006
If that day without terrorists never comes – There’s always USAF Captain Clay "Mag" Percle from Clarksville, Tenn., a 1st Fighter Wing Raptor pilot. He recently flew a new 5th
Read More

Video Surveillance: Home’s Where the Casino Is

August 1, 2006
It may surprise some people that the majority of casinos that comprise the billion dollar gaming industry in the United States have not entered the digital video future and still
Read More

Solutions: RFID Is What May Float the Boat

Matt Scherer
August 1, 2006
Homeland security, other government and military agencies as well as private security now cooperate in port protection as well as development of cargo container tracking, according to Coast Guard Captain
Read More

Solutions: Force and Pursuit

John H. Christman, CPP and Charles A. Sennewald, CPP
August 1, 2006
What should chain store CEOs and merchants instruct security with respect to the use of force in detaining and apprehending suspects? Obviously, the first consideration should be to follow the
Read More

Identification: Monitoring Multiple Sites

August 1, 2006
Enterprises that handle money and interact with customers need a diversity of security technologies to protect physical and computer-based facilities.Twenty years ago, bank alarms were typically monitored by what we
Read More

Access Control: IT Infrastructure – Change Changes Everything

Mark Wood
August 1, 2006
Some chief security officers are openly concerned about impact on network bandwidth and whether constant scanning slows systems, says Mark Wood.Albert Einstein once said that technological change is like an
Read More

Business Story: Outsourcing Makes ROI Sense

Pamela S. Singleton
August 1, 2006
Outsourcing security allows enterprises to push off operational costs as well as expertise in protection technologies.In today’s climate of heightened concern for security, chief security officers, building owners and managers
Read More

Access Control: Risk Complexities – Lessons for Everyone

Gary Mech
August 1, 2006
Integrated intrusion detection is a cornerstone of airport and airline security.Within the air transport industry, security invokes many different definitions. Basically, “security” is “freedom from danger.” Protecting airline passengers, cargo
Read More

Columns

Back to Top

Video in Focus: Integrating Integrators From Start To Finish

Cynthia Freschi
August 1, 2006
Thinking of upgrading security video or bringing in a new system? Going to work with an integrator on the project? Just like any relationship, comfort is a significant factor. Take
Read More

Get Into Access: Back Doors and Magic Words

Jeffrey Dingle
August 1, 2006
Access control is a wonderful thing. I can design a system to protect my assets. I decide WHO I want to have access to my facility, and I can have
Read More

Devil in Design Details: Documenting the Preliminary System Design

Michael Khairallah
August 1, 2006
For enterprise security executives, budgeting a first system design is crucial. Concerning the end-point components needed in a security system, count the number of devices by type: Electronic controls Locking
Read More

Business Matters: Data Never Dies

Steve Hunt
August 1, 2006
I walked into a Marriott hotel last week – probably the millionth time I’ve done that in my life – and I felt perfectly anonymous. I always feel that way
Read More

Integrated Systems: Life Without Insurance

Eve Hinman Ph.D.
August 1, 2006
Athough the chance of a truck bombing or other major terrorist attack occurring at your enterprise is small, the consequences can be totally devastating in terms of loss of life,
Read More

Publisher's Letter: A Failure to Communicate

Mark McCourt
August 1, 2006
Nearly five years after the terrorist attacks of September 11, 2001, the number one challenge perplexing security professionals and organizations seeking to execute successful security programs, business continuity and/or risk
Read More

All Stories

Back to Top

Wireless Intruder Alarms to More Than Double by 2009

August 1, 2006
IMS Research’s latest forecasts on the world market for intruder alarms show that the global market was estimated to be worth $2.5 billion in 2005. The ongoing trend from wired
Read More

Videolarm Celebrates 30 Years in Business

August 1, 2006
Videolarm, recently celebrated its 30th anniversary. Videolarm, Inc. has been the lead innovator in the CCTV industry for 30 years. In 1976, Ray Pagano started Videolarm Inc. by developing and
Read More

The $160 Million Laptop

August 1, 2006
Forget the notion that laptops are getting cheaper. The U.S. Department of Veterans Affairs has a laptop and external hard drive, recently recovered by the folks at the FBI, which
Read More

Security Company Gains Government Experience

August 1, 2006
Diebold, Incorporated, one of the nation’s largest security integrators with expertise in the commercial, financial, government and retail markets, has expanded its government security function through the acquisition of Actcom,
Read More

International News: Netherlands Moves to IPTV Platforms

August 1, 2006
From Herzliya, Israel, Optibase tells Security Magazine that it is providing streaming video to ON, an interactive multimedia platform, initiated by Heineken, Sony and New Business Generation. Using the latest
Read More

International News: IP Video Monitors National Rail Network

August 1, 2006
Large distance no problem with IP security video.NS (Nederlandse Spoorwegen), the Dutch rail authority, is one of the world’s busiest rail systems with 25,000 employees operating over one million passenger
Read More

International News: Ah, the Sporting, Spying, Cheating Life

August 1, 2006
Who is spying on whom?They were head-butting and faking injuries at this year’s soccer World Cup. A doping scandal has knocked down some top teams in the Tour de France.
Read More

Protect Your CEO from Mail Threats with Parcel Inspection System

August 1, 2006
American Science and Engineering Inc., Billerica, Mass., offers Gemini, the industry’s most complete non-intrusive parcel inspection system for detecting security threats and contraband in parcels, baggage and mail. Gemini enables
Read More

The Overlooked Gotcha

August 1, 2006
The Rabun Labs’ Model GM/MS is used to monitor and automatically maintain the resistivity of electrical grounding systems. This is accomplished by sensing soil resistivity in the area where the
Read More

Used CDs Made Useless

August 1, 2006
Just throwing a CD in the trash, even after deleting its data, creates risk as that data can often be restored or recovered. Be certain that those business units handling
Read More

Authentic Tagging for Documents

August 1, 2006
With counterfeiters finding every way imaginable to forge documents, adding a tamper-resistant microscopic identifier to important documents is a must. DataLase has come up with an authentication solution that ensures
Read More

2-Megapixel High-Def Network Camera

August 1, 2006
Lumenara Corp., Ottawa, announced its latest Le256 series of network cameras. The cameras offer broadcast quality images in native 16:9 high-definition format. Streaming full 1920x1080 resolution at up to 15
Read More

Zalud Report: Heightened Security Concerns Push Double-digit Salary Growth

zalud-2016-200px.jpg
Bill Zalud
August 1, 2006
What a difference a year makes to some wallets. The nation’s top corporate chief security officers (CSO), those executives in charge of security for global companies in the U.S., are
Read More

Corporate Mobility with DVRs Going Cellular

August 1, 2006
Video Domain Technologies’ new MemoCam DVR with cellular communication capabilities, called D-V58/CELL, enables notification via cell phone and/or e-mail (with option of attached images) whenever recording has been triggered by
Read More

Regulation Needs? ADA Timer Push Button

August 1, 2006
This ADA Compliant, multipurpose pneumatic mushroom button introduced by STI, Waterford, Mich., covers a range of applications both indoors and outdoors. The Stopper Station (SS2408EX) incorporates a unique, patented design
Read More

VehicleGARD

August 1, 2006
Driving around the premises can sometimes end in unfavorable circumstances. Protect law enforcement and security vehicles’ occupants with an impenetrable glass protection film that defend vehicles against terrorism, riot situations
Read More

Business Reliable Rack-Mounted Power Supplies

August 1, 2006
Stealth Laboratories, Hickory, N.C., has an AC and DC series of Rack Mounted multi-output camera power supplies. Available in 8-, 16- and 32-output configurations, they are ideal for creating a
Read More

Emergency Exits Worth Listening To

August 1, 2006
A concern for any business definitely is the safety of its employees and guests. In the case of an emergency, such as a fire, the Onyx ExitPoint exit technology ensures
Read More

Multi-tasking Intelligent IP Network Camera

August 1, 2006
Sparks, Md.-based AxonX, has extended its SigniFire product line to include a standalone IP network camera. This new product embeds the company’s detection algorithms onto a network camera powered by
Read More

Insight on Visitors’ Intentions

August 1, 2006
Concerned about who’s visiting your building? Scan your visitors with EasyLobby, a system that scans a visitor’s driver’s license, passport or business card. Once an ID has been scanned, EasyLobby
Read More

Intelligent Video Recording & Surveillance

August 1, 2006
Vigilant Technology’s Software Matrix replaces the legacy analog Matrix system and delivers more efficiency, flexibility and profitability to the customer. The fully-digital, IP-based video management system provides matrix switch capabilities
Read More

Hand Reader Gets a High Five

August 1, 2006
Access control just keeps getting more simplified with the new installation of biometric hand readers. Hand readers translates into no more lost or stolen access cards, and ensures that the
Read More

Higher Performance Physical Access Biometric Reader

August 1, 2006
Integrated Biometrics’ latest physical access control fingerprint biometric reader (TRU 650) outperforms competing readers due to its combination of a unique patented input sensor technology, one of the fastest match-time
Read More

University Names Newest Addition

August 1, 2006
Greg FeldmanSecurity Magazine recently interviewed Greg Feldman, the new Director of Campus Safety and Security at Johnson & Wales University’s Florida Campus. Feldman joins the University from the South Miami
Read More

ADA-Accessible Hardware Donated to Ronald McDonald House

August 1, 2006
Ingersoll Rand Security Technologies has recently outfitted the Ronald McDonald House of Indiana with new automatic openers and panic bars. The Indiana-based firm donated the Americans with Disabilities Act (ADA)-Accessible
Read More

Better Investment in Tough Video Housing

August 1, 2006
SecureCam is a new all-stainless steel ultra-heavy duty housing by SecureVue Inc. The camera housing safeguards its preset bearing with a double-patented tamper-resistant bracket mount that aligns precisely on horizontal
Read More

Detailed Surveillance

August 1, 2006
Higher-end security measures call for higher-end security applications. LumeneraCorp has released a camera model that is ideal for critical surveillance applications where intimate scene detail is required. The cameras deliver
Read More

Price Sensitive Thermal Imaging

August 1, 2006
RedShift Systems Inc. successfully completed the development and testing of engineering samples of its optical wavelength converter, the Thermal Light Valve. This marks a significant shift in the $2 billion
Read More

Cost Saving with Human Detection Technology

August 1, 2006
Smartvue Corp., Nashville, Tenn., has a next generation IP video surveillance system, Smartvue S3 with new Intellivue human detection technology. The self-configuring plug and play video analytics solution uses leading
Read More

This Net Can See

August 1, 2006
TOA Electronics Inc., South San Francisco, Calif., introduced its complete line of NetCanSee network video products at the ISC West Expo in Las Vegas. The network video cameras simultaneously transmit
Read More

Integral’s Importance

August 1, 2006
Integral’s Ethernet-powered access control solutions have come up with another great solution from the Intelli-M family of products. It maximizes the full power of the Internet while supporting power over
Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing