Archive


2012  ⏷

November 2012: Feature Articles

  • Convergence is now
  • A converged approach to enterprise security
  • Assets on track
  • Keeping data safe and accessible
  • Video analytics in the spotlight
  • Video analytics: the definitive 5-point guide


October 2012: Feature Articles

  • The frustration and dangers of queues
  • Do consultants add value?
  • You can bank on this
  • Who are you really?


September 2012: Feature Articles

  • Challenges and opportunities for the security manager
  • The future of the security manager
  • More than simple security
  • Secure your business, not only your premises
  • Camera buyers' guide
  • Wireless networking in security
  • Lighting for network cameras
  • A new approach
  • Modular fire alarm


August 2012: Feature Articles

  • Back to the future: new owners, new drive, new vision
  • Biometrics and future trends in one sitting
  • Defining integration
  • IP integration watches the media
  • Turning the tide on The Gap's darker side
  • Bandwidth and storage considerations
  • Overall positive vibes at IFSEC SA
  • Monitoring large-scale events
  • Virtual credentials
  • A comprehensive security risk assessment
  • It is inside and it is on top
  • The role of security manager in 2012


July 2012: Feature Articles

  • Adding value for customers
  • Reducing shrinkage
  • innoVIZION set to change national retail operations with CGCSA
  • Extracting value from security
  • Let their finger do the talking
  • Beyond conventional security
  • IFSEC UK brings in the crowds
  • Five takeouts from IFSEC UK
  • Keeping tabs offsite
  • Cengence secures Nissan SA
  • There is life in that analogue system


June 2012: Feature Articles

  • Your local proven solutions provider
  • A mix of technology and people
  • Providing overall security
  • A unique challenge
  • Integration is the norm
  • Turning data into business information
  • IFSEC SA is here
  • IFSEC 2012 preview
  • Security perception vs reality


May 2012: Feature Articles

  • Service and track record the differentiators
  • Tracing and authenticating items
  • Thinking out of the booklet


April 2012: Feature Articles

  • Evaluating CCTV operational performance delivery
  • Gambling on technology
  • Security begins with the basics
  • Alarms become more interactive
  • The identity conundrum
  • Data security is not optional
  • The RSA Security breach
  • Secure data storage
  • Securing IT systems


March 2012: Feature Articles

  • Convergence rules
  • Adoption of wireless technology
  • People versus technology
  • Management 101
  • DAS, NAS, SAN, RAID - who cares?
  • DVR/NVR round-up 2012
  • The future of physical access control


February 2012: Feature Articles

  • Professional staffing of a CCTV control room
  • Eyes open in 2012
  • Looking ahead
  • Video analytics for security
  • Planning, personnel and technology
  • Trending fire
  • iLegal 2011
  • Identity theft is the new black