Archive



2012  ⏷

November 2012: Feature Articles

  • A converged approach to enterprise security
  • Assets on track
  • Convergence is now
  • Keeping data safe and accessible
  • Video analytics in the spotlight
  • Video analytics: the definitive 5-point guide


October 2012: Feature Articles

  • Do consultants add value?
  • The frustration and dangers of queues
  • Who are you really?
  • You can bank on this


Access & Identity Management Handbook 2013



September 2012: Feature Articles

  • A new approach
  • Camera buyers' guide
  • Challenges and opportunities for the security manager
  • Lighting for network cameras
  • Modular fire alarm
  • More than simple security
  • Secure your business, not only your premises
  • The future of the security manager
  • Wireless networking in security


August 2012: Feature Articles

  • A comprehensive security risk assessment
  • Back to the future: new owners, new drive, new vision
  • Bandwidth and storage considerations
  • Biometrics and future trends in one sitting
  • Defining integration
  • IP integration watches the media
  • It is inside and it is on top
  • Monitoring large-scale events
  • Overall positive vibes at IFSEC SA
  • The role of security manager in 2012
  • Turning the tide on The Gap's darker side
  • Virtual credentials


July 2012: Feature Articles

  • Adding value for customers
  • Beyond conventional security
  • Cengence secures Nissan SA
  • Extracting value from security
  • Five takeouts from IFSEC UK
  • IFSEC UK brings in the crowds
  • innoVIZION set to change national retail operations with CGCSA
  • Keeping tabs offsite
  • Let their finger do the talking
  • Reducing shrinkage
  • There is life in that analogue system


June 2012: Feature Articles

  • Your local proven solutions provider
  • A mix of technology and people
  • A unique challenge
  • IFSEC 2012 preview
  • IFSEC SA is here
  • Integration is the norm
  • Providing overall security
  • Security perception vs reality
  • Turning data into business information


May 2012: Feature Articles

  • Service and track record the differentiators
  • Thinking out of the booklet
  • Tracing and authenticating items


CCTV Handbook 2012



April 2012: Feature Articles

  • Alarms become more interactive
  • Data security is not optional
  • Evaluating CCTV operational performance delivery
  • Gambling on technology
  • Secure data storage
  • Securing IT systems
  • Security begins with the basics
  • The identity conundrum
  • The RSA Security breach


March 2012: Feature Articles

  • Adoption of wireless technology
  • Convergence rules
  • DAS, NAS, SAN, RAID - who cares?
  • DVR/NVR round-up 2012
  • Management 101
  • People versus technology
  • The future of physical access control


February 2012: Feature Articles

  • Eyes open in 2012
  • Identity theft is the new black
  • iLegal 2011
  • Looking ahead
  • Planning, personnel and technology
  • Professional staffing of a CCTV control room
  • Trending fire
  • Video analytics for security