Over lunch recently, a former Secretary of the Department of Homeland Security asked me, “How long do you think it will be until mobile credentials fully replace plastic badges and cards?”
Agencies and authorities that provide water, wastewater and dam services don’t face the same regulatory hurdles as power utilities, but they’re also often smaller and have fewer resources, housed as they generally are within municipal governments or other smaller entities.
We’ve all used different types of entrances as we move about in the world: swing doors, sliding doors, revolving doors, gates and turnstiles. Aside from providing access into buildings, how many people consider that certain types of entrances can reduce costs and sometimes create opportunities to make money?
Often considered a victimless crime, the presence of graffiti can do immense harm to homes and businesses. The perception of criminal activity – whether accurate or inaccurate – can ultimately deter potential customers from visiting a business, leading to less foot traffic and revenue loss.
Today, businesses of all sizes and types rely on research, obtained through data mining, to help them see the big picture and identify trends and patterns that can help create operational efficiencies. With the concept of "Big Data," every piece of data (from digital to conventional) is a potential piece of information that can be tracked, collected, sorted and analyzed.
As the age of the Internet is hitting a crescendo, cyber vulnerability is no longer a growing concern; it is a reality most businesses will face in the near future without adequate network protection.
The FAA projects a 30x growth of commercial drone use to 600,000 over the next year, which could pose a significant threat to physical security and critical infrastructure.
All Hollywood blockbusters capture images in an action-oriented environment and use those images to tell a story. In the Theater of Surveillance, deployment of new technologies in lights, cameras and action-analytics produce blockbuster results, improving safety and security for people and property.
Contactless card-based access control systems were developed to better protect facilities from unauthorized visitors, but it didn't take long for hackers to learn how to fool the system.