Bigbook Spring Cover
Bigbook Spring Cover
Bigbook Spring Cover
Bigbook Spring Cover
Bigbook Spring Cover
Home

Big Book Spring 2013

Nov. 12, 2013
The Security Industry's Product Guide
Incidents of workplace violence have decreased dramatically for Novant Health, including at its flagship hospital, Forsyth Medical Center in Winston-Salem, N.C.
Incidents of workplace violence have decreased dramatically for Novant Health, including at its flagship hospital, Forsyth Medical Center in Winston-Salem, N.C.
Incidents of workplace violence have decreased dramatically for Novant Health, including at its flagship hospital, Forsyth Medical Center in Winston-Salem, N.C.
Incidents of workplace violence have decreased dramatically for Novant Health, including at its flagship hospital, Forsyth Medical Center in Winston-Salem, N.C.
Incidents of workplace violence have decreased dramatically for Novant Health, including at its flagship hospital, Forsyth Medical Center in Winston-Salem, N.C.
Healthcare

Trained and Ready

May 15, 2013
Dealing with workplace violence in the healthcare environment means having the policies, procedures and training in place to respond quickly and effectively
Steve Lasky is the Editorial Director of Southcomm Security Media, which includes print publications SD&I, Security Technology Executive and Locksmith Ledger International – as well as the world’s top security web portal, SecurityInfoWatch.com. He is a 30-year veteran of the security industry and a 26-year member of ASIS. Contact him at slasky@southcomm.com.
Steve Lasky is the Editorial Director of Southcomm Security Media, which includes print publications SD&I, Security Technology Executive and Locksmith Ledger International – as well as the world’s top security web portal, SecurityInfoWatch.com. He is a 30-year veteran of the security industry and a 26-year member of ASIS. Contact him at slasky@southcomm.com.
Steve Lasky is the Editorial Director of Southcomm Security Media, which includes print publications SD&I, Security Technology Executive and Locksmith Ledger International – as well as the world’s top security web portal, SecurityInfoWatch.com. He is a 30-year veteran of the security industry and a 26-year member of ASIS. Contact him at slasky@southcomm.com.
Steve Lasky is the Editorial Director of Southcomm Security Media, which includes print publications SD&I, Security Technology Executive and Locksmith Ledger International – as well as the world’s top security web portal, SecurityInfoWatch.com. He is a 30-year veteran of the security industry and a 26-year member of ASIS. Contact him at slasky@southcomm.com.
Steve Lasky is the Editorial Director of Southcomm Security Media, which includes print publications SD&I, Security Technology Executive and Locksmith Ledger International – as well as the world’s top security web portal, SecurityInfoWatch.com. He is a 30-year veteran of the security industry and a 26-year member of ASIS. Contact him at slasky@southcomm.com.
Home

My Point of View: Half empty or half full?

May 15, 2013
Tech events like ISC West do a lot to promote growth among middle-market companies, but are they enough to overcome our sluggish economy?
Dave Bhavesh 10930976
Dave Bhavesh 10930976
Dave Bhavesh 10930976
Dave Bhavesh 10930976
Dave Bhavesh 10930976
Integrated Security Management Systems & PSIM

The Cure for Security Inconsistency

May 15, 2013
Genzyme, a Sanofi company, may specialize in rare diseases, but its security team of Marvin Washington, Dave Kent and Bhavesh Patel has made integrating disparate systems their...
Onssi Boca Control Room 3 10926664
Onssi Boca Control Room 3 10926664
Onssi Boca Control Room 3 10926664
Onssi Boca Control Room 3 10926664
Onssi Boca Control Room 3 10926664
Video Management Software/VMS

VMS in Action: Technology Enhances Law Enforcement in Boca Raton

May 15, 2013
Police are able to manage and analyze video from daily operations to special events like the third Presidential Debate

More content from May 2013

Terry Gold is Founder of IDanalyst, a vendor-neutral research and advisory firm focused on security, identity and privacy. He is an expert in advanced authentication, digital identity and services over connected devices and has developed core methodologies that assist corporate clients and investors simplify complex technology initiatives and investments. To read a longer white paper-version of this article, please visit www.idanalyst.com/healthcareid.
Terry Gold is Founder of IDanalyst, a vendor-neutral research and advisory firm focused on security, identity and privacy. He is an expert in advanced authentication, digital identity and services over connected devices and has developed core methodologies that assist corporate clients and investors simplify complex technology initiatives and investments. To read a longer white paper-version of this article, please visit www.idanalyst.com/healthcareid.
Terry Gold is Founder of IDanalyst, a vendor-neutral research and advisory firm focused on security, identity and privacy. He is an expert in advanced authentication, digital identity and services over connected devices and has developed core methodologies that assist corporate clients and investors simplify complex technology initiatives and investments. To read a longer white paper-version of this article, please visit www.idanalyst.com/healthcareid.
Terry Gold is Founder of IDanalyst, a vendor-neutral research and advisory firm focused on security, identity and privacy. He is an expert in advanced authentication, digital identity and services over connected devices and has developed core methodologies that assist corporate clients and investors simplify complex technology initiatives and investments. To read a longer white paper-version of this article, please visit www.idanalyst.com/healthcareid.
Terry Gold is Founder of IDanalyst, a vendor-neutral research and advisory firm focused on security, identity and privacy. He is an expert in advanced authentication, digital identity and services over connected devices and has developed core methodologies that assist corporate clients and investors simplify complex technology initiatives and investments. To read a longer white paper-version of this article, please visit www.idanalyst.com/healthcareid.
Identification Solutions

Healthcare: The Benefits of a Federated Identity

May 15, 2013
From better care to stopping fraud, the case for a standardized way to recognize people in the healthcare setting is the key to a secure environment
Bruce Gnatowski is Senior Director of Cybersecurity Consulting at SecureInfo, a HITRUST assessor. For more information, email Bruce.Gnatowski@SecureInfo.com.
Bruce Gnatowski is Senior Director of Cybersecurity Consulting at SecureInfo, a HITRUST assessor. For more information, email Bruce.Gnatowski@SecureInfo.com.
Bruce Gnatowski is Senior Director of Cybersecurity Consulting at SecureInfo, a HITRUST assessor. For more information, email Bruce.Gnatowski@SecureInfo.com.
Bruce Gnatowski is Senior Director of Cybersecurity Consulting at SecureInfo, a HITRUST assessor. For more information, email Bruce.Gnatowski@SecureInfo.com.
Bruce Gnatowski is Senior Director of Cybersecurity Consulting at SecureInfo, a HITRUST assessor. For more information, email Bruce.Gnatowski@SecureInfo.com.
Information Security

No More into the Breach

May 15, 2013
How HITRUST can enable healthcare organizations to ensure the security of its digital information
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
Cybersecurity

Cool as McCumber: Bring Me a Checklist!

May 15, 2013
New technologies are making check-and-go IT security look medieval
Photo courtesy Hofstra University
Mitt Romney and President Obama were protected at the second presidential debate in part by a surveillance system anchored by a Milestone VMS.
Mitt Romney and President Obama were protected at the second presidential debate in part by a surveillance system anchored by a Milestone VMS.
Mitt Romney and President Obama were protected at the second presidential debate in part by a surveillance system anchored by a Milestone VMS.
Mitt Romney and President Obama were protected at the second presidential debate in part by a surveillance system anchored by a Milestone VMS.
Mitt Romney and President Obama were protected at the second presidential debate in part by a surveillance system anchored by a Milestone VMS.
Video Management Software/VMS

VMS in Action: Monitoring the Second Presidential Debate

May 15, 2013
A networked surveillance system had all of Hofstra University covered as the world watched Obama and Romney trade barbs
Darnell Washington
Darnell Washington
Darnell Washington
Darnell Washington
Darnell Washington
Information Security

IT Security: Network Troubleshooting

Six proven steps to figuring out what’s wrong with your IT infrastructure
Fy12 Q3 Initiatives 10915198
Fy12 Q3 Initiatives 10915198
Fy12 Q3 Initiatives 10915198
Fy12 Q3 Initiatives 10915198
Fy12 Q3 Initiatives 10915198
Home

Metrics for Success: What Story Would You Tell?

May 15, 2013
Metrics will help you understand the "why and how" of the data
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Video Surveillance

Tech Trends: Big Data Analytics- Using Video

May 15, 2013
New technology can harness surveillance data to provide greater value for business operations