• Home >
  • Back Issues >
  • Security Technology Executive >
  • September/October 2015
  • September/October 2015

    Image Courtesy of BigStock.com
    Today’s available toolset – or Situational Awareness 4.0 – further leverages Big Data and Predictive Analytics into the mix, offering greater awareness and valuable insights not previously available with its predecessors. By pulling the combination of Big Data and Predictive Analytics through a PSIM, public safety can easily manage and monitor not only social media activities but also GIS, 911 calls, CAD data, LPR, Video monitoring and analytic data, incident management data and many others.
    Integrated Security Management Systems & PSIM

    Situational Awareness 4.0

    Sept. 21, 2015
    Managing Public Safety’s information overload by integrating video surveillance, Big Data and PSIM
    Illustration Courtesy of BigStock.com
    Fully functioning PSIM gives you the ability to aggregate all the disparate silos of data and present everything in one place and provides a workflow engine to help automate how people respond to situations based on company policies and procedures. VMS systems have PSIM like functionality but are very limited in their ability to consume all pertinent data from third party siloed data sources.
    Integrated Security Management Systems & PSIM

    Managing and Mitigating Business Risk with Security Software

    Sept. 21, 2015
    PSIM and VMS weigh cost factors against improved business analytics and compliance
    Photo Courtesy of the Public Transport Authority of Western Australia
    Transit Authority employee monitors video from PTA’s integrated surveillance system. The integrated video surveillance system has contributed to a significant decrease in complaints against transit officers as well as a 97 percent rate of successful prosecution of offenders
    Networking Equipment and Cabling

    Expanded Video Surveillance Solution Ensures Transportation Security

    Sept. 21, 2015
    Public Transport Authority of Western Australia takes video surveillance to a new level to ensure public safety and security
    While ultra high resolution imagery enhances surveillance and provides multiple benefits for security personnel, the increase in resolution can also pose challenges to the video wall processors and systems behind the monitors. Here operators monitor the grounds of the Statue of Liberty.
    Video Surveillance

    New Video Wall Capabilities Enable Innovative Security Applications

    Sept. 21, 2015
    A video wall processor should be easy to operate and provide a range of control options

    More content from September/October 2015

    Image Courtesy of BigStock.com
    From high technology to blunt force, the nature of potential threats and risk from both internal and external sources continues to expand, placing a spotlight on the need to implement new and improved security measures that cross existing security and operational platforms.
    Integrated Security Management Systems & PSIM

    PIAM: The New Science of Security

    Sept. 21, 2015
    Integrating critical operations onto your management platform provides crucial insights
    Photo Courtesy of BigStock.com
    For almost any region of any industrialized country in the world, SCADA systems represent a great deal of power and an enticing vector for politically motivated criminals. Systems in Europe have been targets over the years and the New Control center of a Power plant Dalkia, Bulgaria must be aware of potential threats.
    Information Security

    SCADA Attacks: Raising Awareness for Security’s Hidden Threat

    Sept. 21, 2015
    As interconnectivity of SCADA and corporate network increase, so does the risk of compromise
    (Image courtesy bigstockphoto.com/marphotography)
    It is imperative to partner law enforcement agencies with social media companies to explore the different measures that each can take to help prevent or contain impending disorder.
    Information Security

    Private spaces, public concerns

    Sept. 21, 2015
    Social media opens a security Pandora's Box
    (File photo)
    Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Mr. Bernard has also provided pivotal strategic and technical advice in the security and building automation industries for more than 23 years.
    Video Surveillance

    Convergence Q&A: Keeping the Lights On

    Performing security lighting checks a must
    (File photo)
    George Campbell is emeritus faculty of the Security Executive Council and former CSO of Fidelity Investments.
    Protective Operations & Guard Services

    Metrics for Success: Measuring Security Management Performance

    Sept. 21, 2015
    Risk prevention and response is a core competency in security management service excellence
    When using the card for access requests, one part of the process is that the PACS must authenticate the card’s credential by comparing the hash values of the original with that of the presented card.
    Access Control

    Second Generation FICAM PACS are Fast Evolving

    FICAM E-PACS: interoperability in the Federal environment and beyond
    Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
    Access Control

    Tech Trends: OSDP - An Access Control Standard with Staying Power

    Sept. 10, 2015
    SIA's interoperability effort is on track to become a true ANSI standard
    Symmetry Complete Touch Power Image 55d762e8ef00c
    Video Management Software/VMS

    Symmetry CompleteView 4.5 Video Management System

    Sept. 9, 2015
    System delivers advanced capabilities such as dynamic video management tools to support and streamline complex enterprise deployments
    DNAFusion and IP Products 564cc38b4a411
    Access Control Software & Management Systems

    DNA Fusion v6.4 from Open Options

    Open Options’ DNA Fusion Version 6.4 is the most customer-centric access control software available, and has been for 17 years. Open Options relies on a strong partnership with...
    Image Courtesy of BigStock.com
    Wireless solutions have become more accessible, more affordable and easier to install in recent years. Today, they no longer require a wire to the door and there are fewer configuration steps than before.
    Access Control

    Benefits of Wireless Ignite Growth

    Aug. 19, 2015
    Cost-effective applications provide users tangible ROI and expansion potential
    (Screenshot courtesy Quantum Secure)
    Quantum Secure's new SAFE Visitor Kiosk solution.
    (Photo courtesy Boon Edam)
    Boon Edam will launch its new Speedlane Lifeline Series access control barriers at ISC West 2015.
    DVTEL Image ioi Thermal Camera 55d7746ecadc8
    Video Surveillance

    DVTel's ioimage Thermal Cameras

    Feb. 4, 2014
    ASIS 2015 Booth #609