Video Verification: Use it Wisely!

Jensen, Joel
December 2010
Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p42
Trade Publication
The article discusses the importance of using video verification efficiently in security management in the U.S. It mentions that the use of video cameras in security systems verify whether an intrustion alarm is false or genuine. It states that video verification in electronic access control minimizes the risk of human errors.


Related Articles

  • Creating Security's Strategic Plan. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p44 

    The author provides tips on how to create a strategic security plan. He cites the importance of considering the important elements in a security plan and defining the responsibilities and functions of the company's security department and personnel. The author advises to create an identification...

  • The Forgotten and Oft-Neglected Door Closer. Johnson, Joel // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p46 

    The author discusses the significance of using door closer. He explains the myriad of uses and functions of the door closer in electronic card access applications and in providing physical security, user convenience and compliance. Moreover, the author emphasizes the benefits of the door closer...

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Why Access Control and Identification is Healthy for Your Organization. Scaglione, Ben // Security: Solutions for Enterprise Security Leaders;Oct2011, Vol. 48 Issue 10, p60 

    The article discusses the significance of access control and identification for the organizations in the U.S. The author mentions that controlling access into and within a building or campus not only detects possible terrorist attacks, but reduces the opportunity for the commission of a crime or...

  • IP-Based Access Strategies: Think Outside the Panel Box. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2013, Vol. 50 Issue 9, p98 

    The article focuses on the internet protocol (IP)-based access control that will open up business enterprises and their security operations to diverse technology options, applications, and business benefits. It states that IP-based access asks for more security strategies that involve a variety...

  • The Second Immutable Law of Security Administration. Bragg, Arnold W. // IT Professional;Nov/Dec2009, Vol. 11 Issue 6, p4 

    The article provides the author's insights regarding the issues in statistical computing addressed in a 50-minute panel discussion. The author relates the experience of a famous statistician, the first speaker in the discussion, in working with that require a high level of security. It notes...

  • The Bs: Barriers, Booths, Badges. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;May2005, Vol. 42 Issue 5, p26 

    Provides tips on how to protect facilities from unauthorized vehicles and visitors in the U.S. Emergence of blast-resistant guard booths; Relevance of visitor identification systems and more versatile guard tour systems; Design of the Sky Watch mobile tower.

  • A guide to access control for installers. Colombo, Allan B. // SDM: Security Distributing & Marketing;Aug98, Vol. 28 Issue 11, p100 

    Presents information on access control relating to the security of business enterprises. Information on the importance of the control of foot traffic in and out of corporations; Suggestions for the installation of an electronic access control system; Definition of the term access control;...

  • Security Goes Online with Web-enabled Features. Hodgson, Karyn // Security: Solutions for Enterprise Security Leaders;Oct2000, Vol. 37 Issue 10, p11 

    Suggests that the Internet is becoming a viable outlet for business security systems in the United States. Advantages of using the Web in business security; Web-enabled devices used by businesses; Use of the internet to accomplish security integration.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics