Visitor management systems - Expert commentary

How to build an insider threat programme

Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emot...

A secured entrance is the first defence against an active shooter

The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018...

How Artificial Intelligence and analytics enhance security and performance

Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated pu...

Importance of establishing security standards for K12 schools

As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards...

Physical and cyber security precautions when travelling

Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity thr...

How access controlled revolving doors can protect businesses from crime

Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot ge...

Safeguarding enterprises against cybersecurity threats is essential for the future

In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organisations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global ente...

Why the security industry is focusing on protecting soft targets in 2018

  2017 was an incredible year for VuTeur and the industry as a whole, as security has become a primary focus for stakeholders, now more than ever. VuTeur introduced its proprietary IRIS (Internal Real-time Intelligence Software) technology this year, which is part of its emergency management and asset protection solution. IRIS leverages real-time location services (RTLS) technology and utilises the existing WiFi infrastructure in a building to create a personal, mobile safety...

Learning to combine the cloud and on-premise security in 2018

This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous authentication experience Demand grew for unified identity and access management systems supporting both cards and mobile devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuous authe...

Going digital: New technologies for emergency management

In recent years, organisations have transformed the way we prepare, respond to and manage emergency situations globally. Through the rapid uptake of new technologies, organisations can accurately account for their individuals in the event of an emergency and maintain the safety of their employees and visitors. In the event of an emergency in an organisation, an efficient and rapid evacuation is of the utmost importance, as hundreds or thousands of people need to be evacuated as quickly as possi...

Facilities are running out of time to comply with “All Hazards” emergency planning

The early October wildfires in Northern California and recent spate of hurricanes in the Southeast and Puerto Rico reinforce the fact that the healthcare community is in need of more stringent attention to organised and community-supported Emergency Management. Regulating healthcare facilities With the potential for catastrophes in the future, the Centers for Medicare and Medicaid Services (CMS) has been working on "All-Hazards" Emergency Preparedness for several years and published CMS-3178 -...

Download: Is your access control system as secure as you think?

Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users.  Find out m...