June 2017

SD&I June '17 Cover Story - 'Ransomware: The Risk is Real' details the integrator’s new role in cyber threat detection
SD&I June '17 Cover Story - 'Ransomware: The Risk is Real' details the integrator’s new role in cyber threat detection
SD&I June '17 Cover Story - 'Ransomware: The Risk is Real' details the integrator’s new role in cyber threat detection
SD&I June '17 Cover Story - 'Ransomware: The Risk is Real' details the integrator’s new role in cyber threat detection
SD&I June '17 Cover Story - 'Ransomware: The Risk is Real' details the integrator’s new role in cyber threat detection
Information Security

Ransomware: The Risk is Real

June 12, 2017
WannaCry shines the light on the integrator’s new role in cyber threat detection
Photo: iStock
The recent ransomware attack should raise awareness for both security companies and clients
The recent ransomware attack should raise awareness for both security companies and clients
The recent ransomware attack should raise awareness for both security companies and clients
The recent ransomware attack should raise awareness for both security companies and clients
The recent ransomware attack should raise awareness for both security companies and clients
Information Security

Tech Trends: Your Money or Your (Digital) Life

June 12, 2017
The recent ransomware attack should raise awareness for both security companies and clients
Photo: iStock
Cybersecurity best practices for both integrators and end-users
Cybersecurity best practices for both integrators and end-users
Cybersecurity best practices for both integrators and end-users
Cybersecurity best practices for both integrators and end-users
Cybersecurity best practices for both integrators and end-users
Video Management Software/VMS

Cyber Defense for Physical Security

June 12, 2017
Best practices for both integrators and end-users
Photo: PSA
CEO Bill Bozeman has spearheaded PSA Security Network's move into the cybersecurity space. Now, he is faced with the challenge of vetting the products and services that will give integrators the tools to be successful.
CEO Bill Bozeman has spearheaded PSA Security Network's move into the cybersecurity space. Now, he is faced with the challenge of vetting the products and services that will give integrators the tools to be successful.
CEO Bill Bozeman has spearheaded PSA Security Network's move into the cybersecurity space. Now, he is faced with the challenge of vetting the products and services that will give integrators the tools to be successful.
CEO Bill Bozeman has spearheaded PSA Security Network's move into the cybersecurity space. Now, he is faced with the challenge of vetting the products and services that will give integrators the tools to be successful.
CEO Bill Bozeman has spearheaded PSA Security Network's move into the cybersecurity space. Now, he is faced with the challenge of vetting the products and services that will give integrators the tools to be successful.
Information Security

The Crossroads of Awareness and Adoption

June 12, 2017
SD&I goes 1-on-1 with Bill Bozeman on PSA Security Network’s struggle to find the cybersecurity products that will make their integrators profits
Photo: iStock
Encryption can help stop the hacking of card-based physical security systems
Encryption can help stop the hacking of card-based physical security systems
Encryption can help stop the hacking of card-based physical security systems
Encryption can help stop the hacking of card-based physical security systems
Encryption can help stop the hacking of card-based physical security systems
Access Control

Access Control Encryption 101

June 12, 2017
How to stop the hacking of card-based physical security systems

More content from June 2017

(Image courtesy bigstockphoto.com/weerapat)
According to NTT Security's 2017 Global Threat Intelligence Report, business email compromise attacks were the second most common form of phishing attacks that the company's incident response engagement teams encountered in 2016, just behind ransomware.
According to NTT Security's 2017 Global Threat Intelligence Report, business email compromise attacks were the second most common form of phishing attacks that the company's incident response engagement teams encountered in 2016, just behind ransomware.
According to NTT Security's 2017 Global Threat Intelligence Report, business email compromise attacks were the second most common form of phishing attacks that the company's incident response engagement teams encountered in 2016, just behind ransomware.
According to NTT Security's 2017 Global Threat Intelligence Report, business email compromise attacks were the second most common form of phishing attacks that the company's incident response engagement teams encountered in 2016, just behind ransomware.
According to NTT Security's 2017 Global Threat Intelligence Report, business email compromise attacks were the second most common form of phishing attacks that the company's incident response engagement teams encountered in 2016, just behind ransomware.
Information Security

New Study Outlines Top Cybersecurity Threat Vectors

June 12, 2017
Business email compromise, ransomware awareness and other trends highlight NTT Security’s ‘Global Threat Intelligence Report’
Photo: Bigstock
A look at the ramifications of the ADT vs. Baker class action settlement
A look at the ramifications of the ADT vs. Baker class action settlement
A look at the ramifications of the ADT vs. Baker class action settlement
A look at the ramifications of the ADT vs. Baker class action settlement
A look at the ramifications of the ADT vs. Baker class action settlement
Residential Technologies

Legal Watch: Baker vs. ADT Resolved

June 12, 2017
A look at the ramifications of the class action settlement
Photo: Bigstock
How advanced power management solutions can help integrators develop new RMR streams
How advanced power management solutions can help integrators develop new RMR streams
How advanced power management solutions can help integrators develop new RMR streams
How advanced power management solutions can help integrators develop new RMR streams
How advanced power management solutions can help integrators develop new RMR streams
Power Systems & Supplies

Profits in Power

June 12, 2017
How advanced solutions can help integrators develop new RMR streams
SDI new products1 54dbcd6e9c4cf
SDI new products1 54dbcd6e9c4cf
SDI new products1 54dbcd6e9c4cf
SDI new products1 54dbcd6e9c4cf
SDI new products1 54dbcd6e9c4cf
Video Surveillance

SD&I New Products: June '17

June 12, 2017
The latest from security equipment manufacturers, including a special product spotlight on video surveillance storage and playback
Photo: iStock
Peeling back the layers of data center access control.
Peeling back the layers of data center access control.
Peeling back the layers of data center access control.
Peeling back the layers of data center access control.
Peeling back the layers of data center access control.
Access Control

Data Center Access Control

June 12, 2017
Peeling the layers of security
(Photo courtesy stock.xchng/jodax)
There are six layers to securing a typical data center.
There are six layers to securing a typical data center.
There are six layers to securing a typical data center.
There are six layers to securing a typical data center.
There are six layers to securing a typical data center.
Physical Hardening

Data Center Security Best Practices

June 12, 2017
More on the layers of security needed
Photo: iStock
How integrators can harness video surveillance data to provide the services their clients demand
How integrators can harness video surveillance data to provide the services their clients demand
How integrators can harness video surveillance data to provide the services their clients demand
How integrators can harness video surveillance data to provide the services their clients demand
How integrators can harness video surveillance data to provide the services their clients demand
Video Surveillance

Embracing IT in Video Surveillance

June 12, 2017
How integrators can harness the data to provide the services their clients demand
Six years after installing this type of Emergency Door Release, one fire alarm company had to deal with some code issues raised by the local fire inspector.
Six years after installing this type of Emergency Door Release, one fire alarm company had to deal with some code issues raised by the local fire inspector.
Six years after installing this type of Emergency Door Release, one fire alarm company had to deal with some code issues raised by the local fire inspector.
Six years after installing this type of Emergency Door Release, one fire alarm company had to deal with some code issues raised by the local fire inspector.
Six years after installing this type of Emergency Door Release, one fire alarm company had to deal with some code issues raised by the local fire inspector.
Control Buttons & Switches

Fire & Life Safety: Request to Exit Compliance

How a code interpretation might lead to a mandated change in RTE hardware
Paul Rothman is Editor-in-Chief of Security Business magazine. Email him your comments and questions at prothman@securitybusinessmag.com. Access the current issue, full archives and apply for a free subscription at www.securitybusinessmag.com.
Paul Rothman is Editor-in-Chief of Security Business magazine. Email him your comments and questions at prothman@securitybusinessmag.com. Access the current issue, full archives and apply for a free subscription at www.securitybusinessmag.com.
Paul Rothman is Editor-in-Chief of Security Business magazine. Email him your comments and questions at prothman@securitybusinessmag.com. Access the current issue, full archives and apply for a free subscription at www.securitybusinessmag.com.
Paul Rothman is Editor-in-Chief of Security Business magazine. Email him your comments and questions at prothman@securitybusinessmag.com. Access the current issue, full archives and apply for a free subscription at www.securitybusinessmag.com.
Paul Rothman is Editor-in-Chief of Security Business magazine. Email him your comments and questions at prothman@securitybusinessmag.com. Access the current issue, full archives and apply for a free subscription at www.securitybusinessmag.com.
Integrators

Editor's Note: The Complacency Battle

June 12, 2017
Our efforts for the security and safety of people and facilities are working, but vigilance against terrorism remains the key
Photo: iStock
9 ways for owners and managers to set and achieve objectives for their business
9 ways for owners and managers to set and achieve objectives for their business
9 ways for owners and managers to set and achieve objectives for their business
9 ways for owners and managers to set and achieve objectives for their business
9 ways for owners and managers to set and achieve objectives for their business
Integrators

Your Business: Get Goal-Oriented

June 12, 2017
9 ways for owners and managers to set and achieve objectives for their business
(Photo courtesy Vivint)
Best Buy has entered into a partnership with Vivint to launch a new smart home service that will allow customers to consult with a smart home expert inside their stores, design a system that fits their needs and have it installed and monitored. SecurityInfoWatch.com recently caught up with Colby Winegar, vice president of strategic business development for Vivint, to learn more about the inner workings of the partnership and the potential advantages of this new go-to-market strategy.
Best Buy has entered into a partnership with Vivint to launch a new smart home service that will allow customers to consult with a smart home expert inside their stores, design a system that fits their needs and have it installed and monitored. SecurityInfoWatch.com recently caught up with Colby Winegar, vice president of strategic business development for Vivint, to learn more about the inner workings of the partnership and the potential advantages of this new go-to-market strategy.
Best Buy has entered into a partnership with Vivint to launch a new smart home service that will allow customers to consult with a smart home expert inside their stores, design a system that fits their needs and have it installed and monitored. SecurityInfoWatch.com recently caught up with Colby Winegar, vice president of strategic business development for Vivint, to learn more about the inner workings of the partnership and the potential advantages of this new go-to-market strategy.
Best Buy has entered into a partnership with Vivint to launch a new smart home service that will allow customers to consult with a smart home expert inside their stores, design a system that fits their needs and have it installed and monitored. SecurityInfoWatch.com recently caught up with Colby Winegar, vice president of strategic business development for Vivint, to learn more about the inner workings of the partnership and the potential advantages of this new go-to-market strategy.
Best Buy has entered into a partnership with Vivint to launch a new smart home service that will allow customers to consult with a smart home expert inside their stores, design a system that fits their needs and have it installed and monitored. SecurityInfoWatch.com recently caught up with Colby Winegar, vice president of strategic business development for Vivint, to learn more about the inner workings of the partnership and the potential advantages of this new go-to-market strategy.
Joe Colosimo
Joe Colosimo
Joe Colosimo
Joe Colosimo
Joe Colosimo
Dealers, Integrators & Installing Companies

Guardian Protection Services announces organizational changes

Joe Colosimo resigns as president, CFO Bryan Cipoletti to serve as acting president
(Photo courtesy bigstockphoto.com/monkeybusinessimages)
According to the 2017 Healthcare Crime Survey conducted by the IAHSS Foundation, which analyzed the responses of security professionals at 222 U.S. hospitals, 'Workplace Violence Type 2' assaults, which are acts of violence committed against hospital staff by patients and visitors, accounted for 89 percent of all assaults and aggravated assaults at hospitals from 2012 to 2016.
According to the 2017 Healthcare Crime Survey conducted by the IAHSS Foundation, which analyzed the responses of security professionals at 222 U.S. hospitals, 'Workplace Violence Type 2' assaults, which are acts of violence committed against hospital staff by patients and visitors, accounted for 89 percent of all assaults and aggravated assaults at hospitals from 2012 to 2016.
According to the 2017 Healthcare Crime Survey conducted by the IAHSS Foundation, which analyzed the responses of security professionals at 222 U.S. hospitals, 'Workplace Violence Type 2' assaults, which are acts of violence committed against hospital staff by patients and visitors, accounted for 89 percent of all assaults and aggravated assaults at hospitals from 2012 to 2016.
According to the 2017 Healthcare Crime Survey conducted by the IAHSS Foundation, which analyzed the responses of security professionals at 222 U.S. hospitals, 'Workplace Violence Type 2' assaults, which are acts of violence committed against hospital staff by patients and visitors, accounted for 89 percent of all assaults and aggravated assaults at hospitals from 2012 to 2016.
According to the 2017 Healthcare Crime Survey conducted by the IAHSS Foundation, which analyzed the responses of security professionals at 222 U.S. hospitals, 'Workplace Violence Type 2' assaults, which are acts of violence committed against hospital staff by patients and visitors, accounted for 89 percent of all assaults and aggravated assaults at hospitals from 2012 to 2016.
Healthcare

Study: Workplace violence continues to plague hospitals

May 16, 2017
'2017 Healthcare Crime Survey' reveals crime trends at hospitals across the country
(Photo courtesy istockphoto.com/sturti)
With the summer door-to-door sales season set to get underway, the Better Business Bureau (BBB) has partnered once again with The Monitoring Association, the Electronic Security Association, and ADT to help raise consumer awareness about deceptive sales tactics used by some alarm companies.
With the summer door-to-door sales season set to get underway, the Better Business Bureau (BBB) has partnered once again with The Monitoring Association, the Electronic Security Association, and ADT to help raise consumer awareness about deceptive sales tactics used by some alarm companies.
With the summer door-to-door sales season set to get underway, the Better Business Bureau (BBB) has partnered once again with The Monitoring Association, the Electronic Security Association, and ADT to help raise consumer awareness about deceptive sales tactics used by some alarm companies.
With the summer door-to-door sales season set to get underway, the Better Business Bureau (BBB) has partnered once again with The Monitoring Association, the Electronic Security Association, and ADT to help raise consumer awareness about deceptive sales tactics used by some alarm companies.
With the summer door-to-door sales season set to get underway, the Better Business Bureau (BBB) has partnered once again with The Monitoring Association, the Electronic Security Association, and ADT to help raise consumer awareness about deceptive sales tactics used by some alarm companies.
Integrators

Alarm industry continues its crackdown on deceptive sales

May 11, 2017
BBB, industry associations seek to raise awareness about the issue
(Photo courtesy Wikimedia Commons)
The 43rd President of the United States and author of the bestselling memoir Decision Points (2010)—a candid account of the defining decisions in his presidency and personal life— will be a lead keynote at ASIS International's annual conference and will share insights on his eight years in the White House, his experiences with world leaders, the nature of public leadership and decision making, and his perspective on current domestic and international issues. Sponsored by Altronix, this session is closed to media.
The 43rd President of the United States and author of the bestselling memoir Decision Points (2010)—a candid account of the defining decisions in his presidency and personal life— will be a lead keynote at ASIS International's annual conference and will share insights on his eight years in the White House, his experiences with world leaders, the nature of public leadership and decision making, and his perspective on current domestic and international issues. Sponsored by Altronix, this session is closed to media.
The 43rd President of the United States and author of the bestselling memoir Decision Points (2010)—a candid account of the defining decisions in his presidency and personal life— will be a lead keynote at ASIS International's annual conference and will share insights on his eight years in the White House, his experiences with world leaders, the nature of public leadership and decision making, and his perspective on current domestic and international issues. Sponsored by Altronix, this session is closed to media.
The 43rd President of the United States and author of the bestselling memoir Decision Points (2010)—a candid account of the defining decisions in his presidency and personal life— will be a lead keynote at ASIS International's annual conference and will share insights on his eight years in the White House, his experiences with world leaders, the nature of public leadership and decision making, and his perspective on current domestic and international issues. Sponsored by Altronix, this session is closed to media.
The 43rd President of the United States and author of the bestselling memoir Decision Points (2010)—a candid account of the defining decisions in his presidency and personal life— will be a lead keynote at ASIS International's annual conference and will share insights on his eight years in the White House, his experiences with world leaders, the nature of public leadership and decision making, and his perspective on current domestic and international issues. Sponsored by Altronix, this session is closed to media.
Industry Trade Associations

Former President George W. Bush to keynote 63rd ASIS Conference

May 10, 2017
Top security event to showcase global thought leaders and technology visionaries
PSA has announced that TEC will be changing its long-used venue in Westminster, Col., to downtown Denver in 2018.
PSA has announced that TEC will be changing its long-used venue in Westminster, Col., to downtown Denver in 2018.
PSA has announced that TEC will be changing its long-used venue in Westminster, Col., to downtown Denver in 2018.
PSA has announced that TEC will be changing its long-used venue in Westminster, Col., to downtown Denver in 2018.
PSA has announced that TEC will be changing its long-used venue in Westminster, Col., to downtown Denver in 2018.
Integrators

TEC Report: PSA Announces New Location for 2018 Conference

May 9, 2017
Conference/expo to move to downtown Denver; vendors honored on Tuesday
(Photo courtesy Delta Scientific)
Portable barriers, such as Delta Scientific's MP5000 pictured above, can be towed into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required.
Portable barriers, such as Delta Scientific's MP5000 pictured above, can be towed into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required.
Portable barriers, such as Delta Scientific's MP5000 pictured above, can be towed into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required.
Portable barriers, such as Delta Scientific's MP5000 pictured above, can be towed into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required.
Portable barriers, such as Delta Scientific's MP5000 pictured above, can be towed into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required.
Home

Stopping vehicle-borne terror attacks

May 5, 2017
Recent spike in attacks has left scores of people killed and injured
(Photo courtesy bigstockphoto.com/alexskopje)
HireRight recently released its 10th annual “Employment Screening Benchmark Report,” which highlighted several areas where organizations are still falling short when it comes to screening both potential and current employees.
HireRight recently released its 10th annual “Employment Screening Benchmark Report,” which highlighted several areas where organizations are still falling short when it comes to screening both potential and current employees.
HireRight recently released its 10th annual “Employment Screening Benchmark Report,” which highlighted several areas where organizations are still falling short when it comes to screening both potential and current employees.
HireRight recently released its 10th annual “Employment Screening Benchmark Report,” which highlighted several areas where organizations are still falling short when it comes to screening both potential and current employees.
HireRight recently released its 10th annual “Employment Screening Benchmark Report,” which highlighted several areas where organizations are still falling short when it comes to screening both potential and current employees.
Security Executives

Study reveals shortcomings in background check due diligence

May 3, 2017
Failing to rescreen employees post-hire could come back to haunt some organizations
Convergint Technologies has announced the acquisition of OSS out of Atlanta.
Convergint Technologies has announced the acquisition of OSS out of Atlanta.
Convergint Technologies has announced the acquisition of OSS out of Atlanta.
Convergint Technologies has announced the acquisition of OSS out of Atlanta.
Convergint Technologies has announced the acquisition of OSS out of Atlanta.
Dealers, Integrators & Installing Companies

Convergint Technologies acquires Operational Security Systems

Operational Security Systems brings long-term customer relationships in both the Atlanta and Orlando area to Convergint