• Home >
  • Back Issues >
  • Security Technology Executive >
  • September/October 2015
  • September/October 2015

    More content from September/October 2015

    Image Courtesy of BigStock.com
    From high technology to blunt force, the nature of potential threats and risk from both internal and external sources continues to expand, placing a spotlight on the need to implement new and improved security measures that cross existing security and operational platforms.
    Integrating critical operations onto your management platform provides crucial insights
    Sept. 21, 2015
    Photo Courtesy of BigStock.com
    For almost any region of any industrialized country in the world, SCADA systems represent a great deal of power and an enticing vector for politically motivated criminals. Systems in Europe have been targets over the years and the New Control center of a Power plant Dalkia, Bulgaria must be aware of potential threats.
    As interconnectivity of SCADA and corporate network increase, so does the risk of compromise
    Sept. 21, 2015
    (Image courtesy bigstockphoto.com/marphotography)
    It is imperative to partner law enforcement agencies with social media companies to explore the different measures that each can take to help prevent or contain impending disorder.
    Social media opens a security Pandora's Box
    Sept. 21, 2015
    (File photo)
    Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Mr. Bernard has also provided pivotal strategic and technical advice in the security and building automation industries for more than 23 years.
    Performing security lighting checks a must
    Sept. 21, 2015
    (File photo)
    George Campbell is emeritus faculty of the Security Executive Council and former CSO of Fidelity Investments.
    Risk prevention and response is a core competency in security management service excellence
    Sept. 21, 2015
    When using the card for access requests, one part of the process is that the PACS must authenticate the card’s credential by comparing the hash values of the original with that of the presented card.
    FICAM E-PACS: interoperability in the Federal environment and beyond
    Sept. 21, 2015
    Ray Coulombe is Founder and Managing Director of SecuritySpecifiers and the CONSULT Technical Security Symposium. Email him at ray@SecuritySpecifiers.com, or contact him through LinkedIn at www.linkedin.com/in/raycoulombe or follow him on Twitter: @RayCoulombe.
    SIA's interoperability effort is on track to become a true ANSI standard
    Sept. 10, 2015
    Symmetry Complete Touch Power Image 55d762e8ef00c
    System delivers advanced capabilities such as dynamic video management tools to support and streamline complex enterprise deployments
    Sept. 9, 2015
    DNAFusion and IP Products 564cc38b4a411
    Open Options’ DNA Fusion Version 6.4 is the most customer-centric access control software available, and has been for 17 years. Open Options relies on a strong partnership with...
    Aug. 21, 2015
    Image Courtesy of BigStock.com
    Wireless solutions have become more accessible, more affordable and easier to install in recent years. Today, they no longer require a wire to the door and there are fewer configuration steps than before.
    Cost-effective applications provide users tangible ROI and expansion potential
    Aug. 19, 2015
    (Image courtesy Tyco Security Products)
    A screenshot of Proximex's Surveillint 8 PSIM software.
    (Screenshot courtesy Quantum Secure)
    Quantum Secure's new SAFE Visitor Kiosk solution.
    (Photo courtesy Boon Edam)
    Boon Edam will launch its new Speedlane Lifeline Series access control barriers at ISC West 2015.