TITLE

Top View: 'Intelligent' Dawn

AUTHOR(S)
DeFina, Frank
PUB. DATE
June 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, p42
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article presents information on modern surveillance systems. The security industry is on the cusp of a new era in technology that will have a significant impact the way security systems will be designed, implemented and controlled. People believe that systems integration is one of the key areas of development and growth for the security industry, not only the integration of related systems, like video surveillance and access control, but also the integration of other previously unrelated systems such as point-of-sale onto a single control platform. There has been a steady increase in the implementation of IP-based systems for a variety of reasons over the past year.
ACCESSION #
17202267

 

Related Articles

  • Access control with added reserve.  // International Fire & Security Product News;Oct2004, Vol. 29 Issue 5, p4 

    Features the Bewator Entro access control system developed for organisations which require a high level of security but also need a user-friendly system. Advantage of using the reservation facility of the system; Applications of the system; Importance of the access control card.

  • Day Dreaming: What's This World Coming To? Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Jul2007, Vol. 44 Issue 7, p20 

    The article focuses on the significance of best security practices for the future of the security industry. According to the author, cyber crimes are increaing however, video surveillance has been developing and it is more beneficial for the business enterprise as long as it has a standard to...

  • Integrators' TALL ORDER. Bozeman, Bill // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p61 

    The article discusses the challenges facing security system integrators as they face a whole new world with tremendous opportunities. Integrators are finding it more difficult to have the skills and expertise needed to meet the requirements as the technologies such as access control, video...

  • Scattergun approach to IT security leaves holes ripe for exploitation.  // MarketWatch: Global Round-up;Sep2005, Vol. 4 Issue 9, p194 

    The article focuses on the computer security management. Security management is being touted as having the capability to provide integration and control into a technology sector that is already overpopulated with disconnected, point-based, protection products. Today's fragmented delivery of IT...

  • Requirements For Card-to-Exit. Deteinne, Scott // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p18 

    Reports on the evolution of code provisions to indirectly permit use of card-to-exit systems for access-controlled egress doors. Request by owners and managers of secured facilities for a card-to-exit system for select doors in an effort to monitor persons leaving the secured room; Unlocking of...

  • A Blended Solution for a New Threat. Dunkel, Dan // SDM: Security Distributing & Marketing;Mar2009, Vol. 39 Issue 3, p50 

    The article discusses the importance of integrated solutions in managing the global increase of crimes in physical and cyber attacks. The author states that innovative physical security integrators will hire cyber expertise to manage the computer room to broaden the account opportunity for both...

  • CONTROLLING THE GAME. Stepanek, Laura E. // SDM: Security Distributing & Marketing;Jan2013, Vol. 43 Issue 1, p36 

    The article reports on the strategic play in the security market. It is said that just as expanding the security market outside the confines of the economy was not possible in 2012, expanding the playing area is not possible. A new study showed that total annual revenue from the sale, lease,...

  • Foiling the Future Burglar: A Scenario for 2008. Stephens, Gene // Futurist;Mar/Apr88, Vol. 22 Issue 2, p28 

    Presents a fictional scenario illustrating a potential future of technologies designed to prevent crime in the home. Use of lasers in homes as a form of burglary prevention; Description of Conrad, a computer security system that operates on voice recognition technology; Features of Conrad;...

  • Secure homes. Atlas, Randall // Futurist;Mar/Apr88, Vol. 22 Issue 2, p25 

    Discusses future home security measures and devices. Description basic defensible-space strategies, including natural access control, natural surveillance and territorial reinforcement; Current high-technology security systems, including the Kurzweil Voice System, which uses voice recognition...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics