September 2014

Retail security
Bigstock Newspaper Headlines T 11686618
Bigstock Newspaper Headlines T 11686618
Bigstock Newspaper Headlines T 11686618
Bigstock Newspaper Headlines T 11686618
Bigstock Newspaper Headlines T 11686618
Secured Cities

New terror threats haunt in 9-11's shadow

Sept. 2, 2014
Whether it is Godzilla or jihadists, Gotham must stay vigilant to all threats
Bigstock Rozafa Castle Wall Ru 11671493
Bigstock Rozafa Castle Wall Ru 11671493
Bigstock Rozafa Castle Wall Ru 11671493
Bigstock Rozafa Castle Wall Ru 11671493
Bigstock Rozafa Castle Wall Ru 11671493
Physical Hardening

Keeping the Bad Guys Out

Aug. 27, 2014
Perimeter intrusion detection systems remain a dominant technology for A&Es in almost every market
(Image Courtsey of BigStock.com)
Like anything else, there are advantages and risks that come with having your security data in the cloud.
Like anything else, there are advantages and risks that come with having your security data in the cloud.
Like anything else, there are advantages and risks that come with having your security data in the cloud.
Like anything else, there are advantages and risks that come with having your security data in the cloud.
Like anything else, there are advantages and risks that come with having your security data in the cloud.
Home

Best Practices for Sales Professionals: How to Get Cloud Products and Services Specified

Aug. 27, 2014
Following tested best practices can help improve your A&E and consultant relationships
George Campbell is emeritus faculty of the Security Executive Council (SEC) and former CSO of Fidelity Investments. His book, Measures and Metrics in Corporate Security, may be purchased at www.securityexecutivecouncil.com. The SEC draws on the knowledge of security practitioners, experts and strategic partners to help other security leaders initiate, enhance or innovate security programs and build leadership skills.
George Campbell is emeritus faculty of the Security Executive Council (SEC) and former CSO of Fidelity Investments. His book, Measures and Metrics in Corporate Security, may be purchased at www.securityexecutivecouncil.com. The SEC draws on the knowledge of security practitioners, experts and strategic partners to help other security leaders initiate, enhance or innovate security programs and build leadership skills.
George Campbell is emeritus faculty of the Security Executive Council (SEC) and former CSO of Fidelity Investments. His book, Measures and Metrics in Corporate Security, may be purchased at www.securityexecutivecouncil.com. The SEC draws on the knowledge of security practitioners, experts and strategic partners to help other security leaders initiate, enhance or innovate security programs and build leadership skills.
George Campbell is emeritus faculty of the Security Executive Council (SEC) and former CSO of Fidelity Investments. His book, Measures and Metrics in Corporate Security, may be purchased at www.securityexecutivecouncil.com. The SEC draws on the knowledge of security practitioners, experts and strategic partners to help other security leaders initiate, enhance or innovate security programs and build leadership skills.
George Campbell is emeritus faculty of the Security Executive Council (SEC) and former CSO of Fidelity Investments. His book, Measures and Metrics in Corporate Security, may be purchased at www.securityexecutivecouncil.com. The SEC draws on the knowledge of security practitioners, experts and strategic partners to help other security leaders initiate, enhance or innovate security programs and build leadership skills.
Security Executives

Metrics for Success: Who Goes There?

Aug. 26, 2014
Access control safeguards, policies and awareness are keys to securing the workplace
John McCumber is a security and risk professional, and author of Assessing and Managing Security Risk in IT Systems: A Structured Methodology, from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of Assessing and Managing Security Risk in IT Systems: A Structured Methodology, from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of Assessing and Managing Security Risk in IT Systems: A Structured Methodology, from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of Assessing and Managing Security Risk in IT Systems: A Structured Methodology, from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
John McCumber is a security and risk professional, and author of Assessing and Managing Security Risk in IT Systems: A Structured Methodology, from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
Information Security

Cool as McCumber: A Season for Hacking All the Things

Aug. 26, 2014
I hope the summer has been as eventful for you as it has been for me. We’ve just closed out what has been jokingly described as Security Summer Camp (SSC). This major unified ...

More content from September 2014

Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
Video Surveillance

Tech Trends: A Panoramic View

Aug. 26, 2014
Advances in image processing has breathed life into the panoramic IP camera market
Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS) at www.go-rbcs.com, a firm that provides security management and technology support for public and private facilities. For more information about Ray Bernard and RBCS go to www.go-rbcs.com or call 949-831-6788. Mr. Bernard is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS) at www.go-rbcs.com, a firm that provides security management and technology support for public and private facilities. For more information about Ray Bernard and RBCS go to www.go-rbcs.com or call 949-831-6788. Mr. Bernard is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS) at www.go-rbcs.com, a firm that provides security management and technology support for public and private facilities. For more information about Ray Bernard and RBCS go to www.go-rbcs.com or call 949-831-6788. Mr. Bernard is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS) at www.go-rbcs.com, a firm that provides security management and technology support for public and private facilities. For more information about Ray Bernard and RBCS go to www.go-rbcs.com or call 949-831-6788. Mr. Bernard is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS) at www.go-rbcs.com, a firm that provides security management and technology support for public and private facilities. For more information about Ray Bernard and RBCS go to www.go-rbcs.com or call 949-831-6788. Mr. Bernard is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Video Surveillance

Convergence Q&A: Packaging Your Video

The truth about network and storage capacities for video
Bigstock Balance 6635987 11666063
Bigstock Balance 6635987 11666063
Bigstock Balance 6635987 11666063
Bigstock Balance 6635987 11666063
Bigstock Balance 6635987 11666063
Home

Finding the Right Balance

Aug. 25, 2014
Technological security advancements vs. human engineering in Loss Prevention
(Image Courtesy of BigStock.com)
Retail crime is not new, and neither are effective deterrents.
Retail crime is not new, and neither are effective deterrents.
Retail crime is not new, and neither are effective deterrents.
Retail crime is not new, and neither are effective deterrents.
Retail crime is not new, and neither are effective deterrents.
Home

Taking the Bite Out of Organized Retail Crime

Aug. 22, 2014
Information sharing and solid loss prevention management strategies can help deter gang-related store theft
(Image Courtsey of iStock.com)
Today, the frustration of losing access to mission-critical processes is still as pervasive as ever, but the issue has moved far beyond the boundaries of an occasional inconvenience.
Today, the frustration of losing access to mission-critical processes is still as pervasive as ever, but the issue has moved far beyond the boundaries of an occasional inconvenience.
Today, the frustration of losing access to mission-critical processes is still as pervasive as ever, but the issue has moved far beyond the boundaries of an occasional inconvenience.
Today, the frustration of losing access to mission-critical processes is still as pervasive as ever, but the issue has moved far beyond the boundaries of an occasional inconvenience.
Today, the frustration of losing access to mission-critical processes is still as pervasive as ever, but the issue has moved far beyond the boundaries of an occasional inconvenience.
Information Security

Network Downtime is a Bad Time

Aug. 21, 2014
No longer just a network inconvenience, inevitable system downtime can undermine a company
(Image Courtesy of BigStock.com)
Bigstock Technology Human 5325 11665723
Bigstock Technology Human 5325 11665723
Bigstock Technology Human 5325 11665723
Bigstock Technology Human 5325 11665723
Bigstock Technology Human 5325 11665723
Information Security

Proactive Cybersecurity: An Exclusive IT Roundtable

Aug. 21, 2014
Because adversaries are constantly finding new ways to attack, organizations must go beyond traditional product-driven approaches
(Image Courtesy of BigStock.com)
When talking storage, stable, flexible, scalable, high-availability, easy to deploy and affordable are all attributes that should be in the surveillance solution equation. Simple management and serviceability can be achieved by looking for things like hot swappable drive bays and redundant power supplies which eliminate unscheduled downtime.
When talking storage, stable, flexible, scalable, high-availability, easy to deploy and affordable are all attributes that should be in the surveillance solution equation. Simple management and serviceability can be achieved by looking for things like hot swappable drive bays and redundant power supplies which eliminate unscheduled downtime.
When talking storage, stable, flexible, scalable, high-availability, easy to deploy and affordable are all attributes that should be in the surveillance solution equation. Simple management and serviceability can be achieved by looking for things like hot swappable drive bays and redundant power supplies which eliminate unscheduled downtime.
When talking storage, stable, flexible, scalable, high-availability, easy to deploy and affordable are all attributes that should be in the surveillance solution equation. Simple management and serviceability can be achieved by looking for things like hot swappable drive bays and redundant power supplies which eliminate unscheduled downtime.
When talking storage, stable, flexible, scalable, high-availability, easy to deploy and affordable are all attributes that should be in the surveillance solution equation. Simple management and serviceability can be achieved by looking for things like hot swappable drive bays and redundant power supplies which eliminate unscheduled downtime.
Integrators

Troubleshooting Video’s Worst Performance Bottlenecks

Aug. 21, 2014
With more functionality being placed on video systems, better planning is crucial for successful deployments
(Image Courtesy of BigStock.com)
Retailers now have access to a multitude of easy-to-use tools for data search, mining and visualization. Every manager should now be thought of as a data scientist, able to decipher data with an eye for patterns and outliers.
Retailers now have access to a multitude of easy-to-use tools for data search, mining and visualization. Every manager should now be thought of as a data scientist, able to decipher data with an eye for patterns and outliers.
Retailers now have access to a multitude of easy-to-use tools for data search, mining and visualization. Every manager should now be thought of as a data scientist, able to decipher data with an eye for patterns and outliers.
Retailers now have access to a multitude of easy-to-use tools for data search, mining and visualization. Every manager should now be thought of as a data scientist, able to decipher data with an eye for patterns and outliers.
Retailers now have access to a multitude of easy-to-use tools for data search, mining and visualization. Every manager should now be thought of as a data scientist, able to decipher data with an eye for patterns and outliers.
Home

Contextual Analytics Harnesses Retail’s Big Data

Aug. 21, 2014
Combination of surveillance tech with big data analytics provides businesses with actionable intelligence
The Nova Scotia Liquor Corporation (NSLC), which is responsible for all beverage alcohol sales within the province of Nova Scotia through its 105 stores and 58 agency stores operating in smaller communities, is a great example of an integrated strategy..
The Nova Scotia Liquor Corporation (NSLC), which is responsible for all beverage alcohol sales within the province of Nova Scotia through its 105 stores and 58 agency stores operating in smaller communities, is a great example of an integrated strategy..
The Nova Scotia Liquor Corporation (NSLC), which is responsible for all beverage alcohol sales within the province of Nova Scotia through its 105 stores and 58 agency stores operating in smaller communities, is a great example of an integrated strategy..
The Nova Scotia Liquor Corporation (NSLC), which is responsible for all beverage alcohol sales within the province of Nova Scotia through its 105 stores and 58 agency stores operating in smaller communities, is a great example of an integrated strategy..
The Nova Scotia Liquor Corporation (NSLC), which is responsible for all beverage alcohol sales within the province of Nova Scotia through its 105 stores and 58 agency stores operating in smaller communities, is a great example of an integrated strategy..
Home

Keeping an Eye on the Bad Guy

Aug. 19, 2014
Incident tracking and intelligence strategies drive technology to help reduce retail losses
(Photo Courtesy of iStock.com)
Figures from the recent Hayes loss prevention industry survey show that shoplifting apprehensions were up 2.5 percent and recovery dollars increased by 4.5 percent. When it came to cracking down on internal theft, the survey revealed that apprehensions for dishonest employees rose 6.5 percent and recovery dollars rose 2.5 percent.
Figures from the recent Hayes loss prevention industry survey show that shoplifting apprehensions were up 2.5 percent and recovery dollars increased by 4.5 percent. When it came to cracking down on internal theft, the survey revealed that apprehensions for dishonest employees rose 6.5 percent and recovery dollars rose 2.5 percent.
Figures from the recent Hayes loss prevention industry survey show that shoplifting apprehensions were up 2.5 percent and recovery dollars increased by 4.5 percent. When it came to cracking down on internal theft, the survey revealed that apprehensions for dishonest employees rose 6.5 percent and recovery dollars rose 2.5 percent.
Figures from the recent Hayes loss prevention industry survey show that shoplifting apprehensions were up 2.5 percent and recovery dollars increased by 4.5 percent. When it came to cracking down on internal theft, the survey revealed that apprehensions for dishonest employees rose 6.5 percent and recovery dollars rose 2.5 percent.
Figures from the recent Hayes loss prevention industry survey show that shoplifting apprehensions were up 2.5 percent and recovery dollars increased by 4.5 percent. When it came to cracking down on internal theft, the survey revealed that apprehensions for dishonest employees rose 6.5 percent and recovery dollars rose 2.5 percent.
Home

Survey Sez: Shoplifting and Employee Theft on the Rise

Aug. 19, 2014
Retailers apprehend shoplifters and dishonest employees in record numbers
(Photo Courtesy of BigStock.com)
Bigstock Electrical Substation 11653751
Bigstock Electrical Substation 11653751
Bigstock Electrical Substation 11653751
Bigstock Electrical Substation 11653751
Bigstock Electrical Substation 11653751
Home

Sniper Spurs Substation Standards

New FERC rules change the landscape of utilities’ risk picture
(Image Courtesy of iStock.com)
Historically, the largest concern facing many supply chain managers has been securing the products in their warehouses against threats ranging from deceptive pick-up, driver theft, facility robbery, and facility burglary.
Historically, the largest concern facing many supply chain managers has been securing the products in their warehouses against threats ranging from deceptive pick-up, driver theft, facility robbery, and facility burglary.
Historically, the largest concern facing many supply chain managers has been securing the products in their warehouses against threats ranging from deceptive pick-up, driver theft, facility robbery, and facility burglary.
Historically, the largest concern facing many supply chain managers has been securing the products in their warehouses against threats ranging from deceptive pick-up, driver theft, facility robbery, and facility burglary.
Historically, the largest concern facing many supply chain managers has been securing the products in their warehouses against threats ranging from deceptive pick-up, driver theft, facility robbery, and facility burglary.
Home

Managing Supply Chain Risk Takes a Collaborative Effort

Aug. 19, 2014
With a mixture of technology, joint business initiatives and law enforcement partners, retailers battle cargo thieves
(Image courtesy of BigStock)
For integrators, hosted and managed services provides them with an opportunity to establish a recurring revenue model. Of course, there are still a number of challenges involved in providing these services, not the least of which can include reassuring skeptical customers of the security of managed and hosted platforms given the ever-increasing number of high-profile data breaches.
For integrators, hosted and managed services provides them with an opportunity to establish a recurring revenue model. Of course, there are still a number of challenges involved in providing these services, not the least of which can include reassuring skeptical customers of the security of managed and hosted platforms given the ever-increasing number of high-profile data breaches.
For integrators, hosted and managed services provides them with an opportunity to establish a recurring revenue model. Of course, there are still a number of challenges involved in providing these services, not the least of which can include reassuring skeptical customers of the security of managed and hosted platforms given the ever-increasing number of high-profile data breaches.
For integrators, hosted and managed services provides them with an opportunity to establish a recurring revenue model. Of course, there are still a number of challenges involved in providing these services, not the least of which can include reassuring skeptical customers of the security of managed and hosted platforms given the ever-increasing number of high-profile data breaches.
For integrators, hosted and managed services provides them with an opportunity to establish a recurring revenue model. Of course, there are still a number of challenges involved in providing these services, not the least of which can include reassuring skeptical customers of the security of managed and hosted platforms given the ever-increasing number of high-profile data breaches.
Access Control

Integrator Roundtable: The benefits and challenges of selling hosted, managed security services

Aug. 6, 2014
Industry execs offer their opinions on how the technology has evolved and the increasing tech savviness of end users
(Image Courtesy of BigStock.com)
One of the primary pitfalls consultants face when dealing with end user clients is a lack of expectation or perception of what they do. It is imperative that all project partners develop a consensus about why the consultant is needed, what the deliverables will be and what the project roadmap and timetable look like.
One of the primary pitfalls consultants face when dealing with end user clients is a lack of expectation or perception of what they do. It is imperative that all project partners develop a consensus about why the consultant is needed, what the deliverables will be and what the project roadmap and timetable look like.
One of the primary pitfalls consultants face when dealing with end user clients is a lack of expectation or perception of what they do. It is imperative that all project partners develop a consensus about why the consultant is needed, what the deliverables will be and what the project roadmap and timetable look like.
One of the primary pitfalls consultants face when dealing with end user clients is a lack of expectation or perception of what they do. It is imperative that all project partners develop a consensus about why the consultant is needed, what the deliverables will be and what the project roadmap and timetable look like.
One of the primary pitfalls consultants face when dealing with end user clients is a lack of expectation or perception of what they do. It is imperative that all project partners develop a consensus about why the consultant is needed, what the deliverables will be and what the project roadmap and timetable look like.
Dealers, Integrators & Installing Companies

The Straw That Stirs the Drink

June 13, 2014
Security consultants often are the glue binding systems projects together