September / October 2024

  • Optimizing Security and Business Performance with Clarity and Control
  • Why Communication is Key in an Emergency
  • Beyond Analytics
  • Leveraging Smart Sensors
  • Unlocking the End-user Perception
  • Trust But Verify


Cover Story

Optimizing Security and Business Performance with Clarity and Control

The Essential Role of Digital Platforms in Security Management

By Tony Byerly

In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification.


Features

Why Communication is Key in an Emergency

By Monique Merhige

During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery.


Trust But Verify

It is time to start holding your software and hardware vendors accountable

By Tom Pace

Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks.


Impact on Digital Transformation

By Charles Pitman

A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries.


Address Evolving Threats

By Dave Baker

Event season is well underway, with organizations across industries hosting bustling customer conferences, flagship brand events and exclusive meetups for their top VIPs. As security leaders’ partner with events teams, and brand leaders ensure the safety of all attendees, there is a major consideration they must plan for: The upcoming election.


Enhancing Security and Business Intelligence

Modern ALPR software running on the edge

By Ralph C. Jensen

From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security.


Leveraging Smart Sensors

By Brad Cary

The integration of smart sensors with data-driven video technology provides schools with a comprehensive solution to enhance safety and security. This combination offers advanced capabilities such as environmental monitoring, audio analytics, vape detection and unified data management, empowering schools to create a secure and healthy learning environment for students and staff.


Unlocking the End-user Perception

By Heidi Hunter

An observation as a creator of identity verification solutions is that while industry leaders are often excited by the opportunity to leverage biometrics, there are often concerns raised about the end-user mindset during the conversation. Primarily, what are end-users’ expectations of biometric technology? What concerns might they have about its usage to authenticate and protect their access?


Sharp as a Hawkeye

Enhancing security at the University of Iowa through integrated systems and key management

By Dirk Welch

The security engineering services team at the University of Iowa recently underwent a process that many institutions of higher education face – integrating innovative technology with its existing security system, specifically with key management solutions. Understandably, they were hesitant at first and ran into challenges. Still, when they identified the correct technology to communicate with their existing ecosystem, the immediate results necessitated expanded adoption.


Creating Value for Security Integrators

By Monique Merhige

In recent years, we have seen an influx of security systems integrators getting on the recurring monthly revenue (RMR) bandwagon post-pandemic. During this time, the security industry has experienced a high demand for as-a-service offerings, not only from customers, but on the integration side.


Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3