Feb-March 2019

Photo Courtesy of ERC
Using video systems in conjunction with a fast-food drive-thru POS set up can help with theft deterrence.
Video Surveillance

How QSRs can benefit from integrating video surveillance with POS systems

Aug. 1, 2019
Fast-food restaurant owners have more tools to deter theft and fraud with an integrated video surveillance and POS solution
Image Courtesy of BigStock.com
Computer and networked systems have evolved over time to leverage standards.
Access & Identity

Unified Physical and Logical Access Using Industry Standards and Protocols

March 25, 2019
As systems and processes converge, a unified approach to systems ensures security
Image Courtesy of BigStock.com
One of the biggest benefits of cloud-based platforms is the opportunity for more flexible access-control service subscription models. An example of this is mobile ID issuance.
Access Control

Wide Array of Cloud-Based Technologies Accelerate Access Options

March 25, 2019
Security executives will play growing role in workplace transformation using cloud-based access control platforms

More content from Feb-March 2019

Image Courtesy of BigStock.com
Fundamentally, the use of video and analytics connected to AI (machine and deep learning) now has a shifted infrastructure that supports the entire domain into a cloud environment.
Video Surveillance Storage

Surveillance’s Shift to the Datacenter: How to Leverage the Cloud and AI

March 25, 2019
The growth of the surveillance industry requires an infrastructure that can handle its storage needs
Image Courtesy of BigStock.com
Potential hacks into EAC systems is becoming a real threat for users and integrators and they are looking to the vendors for answers.
Access Control

Defending Physical Security Devices from Hackers

March 25, 2019
Understand your organization’s threat and plan accordingly
Image Couresy of BigStock.com
bigstock 195553009 5bf4a5b27d4c4
Video Surveillance

Understanding the Impact of Predictive Analytics on Security Operations

March 25, 2019
Milestone's Jeremy Scott shares his insights on how predictive analytics has emerged as a key part of any risk mitigation strategy
Image Courtesy of BigStock.com
Employees who are unaware of the risks associated with oversharing on social media can endanger the company’s intellectual property, reputation, clients, and fellow employees.
Information Security

The Security and Social Media Dilemma

March 25, 2019
Today’s CSO must be aware of risks posed by insiders and possess potential mitigation strategies
Image Courtesy of BigStock.com
Studies show that IoT-enabled smart cities bring the benefits of enhanced time management, rapid crisis response time, reduced traffic congestion and improvements for general city administrative duties.
IP Network Surveillance Cameras

Smart Cities Security and Uptime Through Secure Access

March 25, 2019
While IoT technology is the core of Smart City evolution, it also remains its greatest security threat
Image Courtesy of BigStock.com
The FBI admitted as much earlier this year when they acknowledged that government entities and multiple U.S. critical infrastructure sectors, including energy, nuclear, commercial facilities, water, aviation, and critical manufacturing have been targeted by Russian threat actors.
Breach Detection

The Pending IoT Doomsday

March 25, 2019
Network breaches can substantially impact the physical security of myriad facilites
Image Courtesy of BigStock.com
Bigstock 165753800
Video Surveillance

Industry Voice: Assessing the State of Video Surveillance Device Security

March 25, 2019
JCI’s Williamson provides insights into security system fact and fiction
Chart Courtesy of RBC, Inc.
Figure 1. Difference between a simple neural network and a deep learning neural network
Video Analytics

Deep Learning to the Rescue

This question about video analytics touches on an area where Deep Learning is making a real impact: security video analytics.Q: I keep reading that today’s video analytics are...
John Mc Cumber Headshot 2 Mb
Information Security

Cybersecurity by the Numbers, Part Deux

March 25, 2019
In our last installment, I talked about those huge numbers representing the implied costs of data breaches to individual business and society. In this column, I want to talk about...
Steve Lasky 2011
Security Executives

Reflections of a (Retired) CSO

March 25, 2019
What I find most amazing after more than 30 years in the security industry is that while advancing technology and heightened global threats have elevated the role of security ...
Image Courtesy of BigStock.com
Bigstock Security Framework Line Icon C 269589193
Information Security

The Effective CISO Needs More Than a Control Framework

March 25, 2019
Chief Information Security Officers (CISOs) often talk about reducing the risk of financial loss to their organizations – whether it be through reducing the likelihood of unauthorized...
Hubbcom Product Line
Intercom Solutions

HUBBCOM IP Devices

March 8, 2019
general and point-to-point audio/video intercom
Qid Security Info Watch
Locks

Securitech’s QID Deadbolt Lock

March 8, 2019
GSX 2019 Booth #1432
The DuraVision FDF4627W-IP comes equipped with decoding technology that ensures that images are displayed with no delay and are true to the original source data. This eliminates the need for an additional decoder, simplifying the installation area.
Monitors & Video Walls

DuraVision FDF4627W-IP

March 7, 2019
EIZO Corporation (TSE:6737) announced the DuraVision FDF4627W-IP, a 46-inch IP decoding monitor for security and surveillance environments.The DuraVision FDF4627W-IP comes equipped...
Brian Coulombe is Principal and Director of Operations at DVS, a division of Ross & Baruzzini. Brian can be reached at bcoulombe@dvssecurity.com, through Linked in at www.linkedin.com/in/brian-coulombe, or on Twitter @DVS_RB.
Access Control

Tech Trends: The OSDP Awareness Campaign

Feb. 14, 2019
Support for the access control standard is growing among integrators, but there is still a ways to go
Hid Beeks Duress Badge
Badges

HID Global’s BEEKs Duress Badge Beacon

Feb. 12, 2019
Company helps hospitals keep doctors, nurses and staff safe from workplace violence with new IoT-based duress badge
Hid Safe Enterprise Isc West Product Preview
Access Control

HID SAFE Enterprise software

Dec. 13, 2011
ISC West 2019 Booth #11063