The traditional notion of security systems operating independently of various building systems started becoming obsolete several years ago, as many end users developed the expectation that their security systems should work in conjunction with other building systems such as their heating, ventilation and air conditioning (HVAC), secondary fire and lighting.
In December 2010, the Puerto Rico Ports Authority (PRPA) issued a proposed regulation that would require all inbound cargo containers, regardless of whether the container was shipped from a company located in the United States or from a company located in a foreign country, to be scanned for contraband. If enacted, the proposed scanning regulation would increase costs and result in supply chain delays. The cost would range from $58 to $70 per container (depending on the size of the container).
As video surveillance systems continue to grow in size and functionality with new technologies driving even higher levels of performance, there’s still one basic premise that applies to each and every one of them: if the power goes down, your system is of little practical value.
As the number of solutions available in the cloud grows and an increasing number of organizations turn to SaaS-based solutions to improve operations while reducing their costs, an increasing amount of sensitive information is being communicated via the Internet. IT professionals are rightly concerned with uptime, privacy risks and overall security.
According to the Global Retail Theft Barometer, retail shrink accounted for $107.284 billion in 2010. As retailers begin to determine their goals and initiatives for 2011, they need to consider how to identify and prevent the margin-robbing activities that are cutting into their bottom lines. Here are a few commonly missed fraudulent activities and operational errors, along with some tips on how to combat them.
Two educational tracks at ISC West, April 5-8, 2011 in Las Vegas, will provide information on collaboration between public and private organizations and security for houses of worship.
You can substitute any threat or compliance challenge, for any industry, and come to the same conclusion. With the advent of IP-based security and the widespread use of non-proprietary servers and storage, solving problems through security is no longer simply the domain of the Security group. Because IT has subject matter expertise, and often holds the budget reins, IT now has a head seat at the table.
At most school districts, the word “security” is synonymous with “surveillance.”
It has always been and still is the most popular security technology used in schools. In fact, school video security continues to expand faster than the overall security market.