Skip to main content

Defending Physical Security Devices from Hackers

Hacking has evolved as a serious threat and protecting access control systems from hackers has become imperative. Potential bad actors comprise sophisticated government-backed entities to teenage mischief makers. Hackers look for the easiest path in, leveraging many different physical assets, including those within the enterprise-class security system itself. They typically start with hardware, such as […]

Risks on the Rise in Healthcare Sector

     Healthcare security is one of the most challenging missions, and a look at recent trends reveals it is getting more difficult every year. States are getting more involved in establishing parameters for workplace violence prevention programs, but it does not seem to be enough to stem the trends, and violence is underreported. Effectively […]

The New Paradigm of Converged Security and Risk

  The next-level technology evolution is coming. Long-awaited and discussed, the full convergence of all systems has now been made feasible by Artificial Intelligence, secured communication, and advancements in physical security technology, or more simply, IP-based technology on the network. Initially, this meant that devices could be connected to one another and, to some limited […]

Five Steps to a Risk-Free M&A

While most Corporate Security Officers will tell you that no two merger/acquisition scenarios are quite the same, they do agree that there are constants that provide a thread throughout. The risks range from the assimilation of corporate cultures and integration of technology systems – both physical and IT. And of course, there are the financial […]

Unified Physical and Logical Access Using Industry Standards and Protocols

Physical access and logical access have historically been two separate (and likely unequal) silos within an organization.  IT has their password access mechanisms; with some modern improvements. Physical security has their proximity cards, Wiegand wiring, life/safety physical standards, and an ever-increasing smattering of computer and networking standards and protocols.  Logical access is under increased scrutiny […]

Critical infrastructure security in a converged and interconnected world

This article is in response to the release of the U.S. Government Accountability Office (GAO) study in December regarding significant weaknesses in pipeline security program management. As we enter 2019, the global threat to critical infrastructure has reached a critical mass. The seemingly countless attacks against utilities, nuclear facilities, pipeline infrastructure, defense systems, energy grids, […]

10 Technology Game-Changers for 2019

  With public safety, smart city and smart building segments predicted to have an immediate and lasting effect on the North American electronic security market, where are the opportunities for security integrators to move the needle on gross margin? Here are 10 technologies generally outside the “traditional” electronic security industry that represent new opportunities on […]

Page 1 of 12123...10...Last »
Want to place your system on test with the central station? Click here
Would you like to build your inspection reports? Click here
Read the Red Hawk Observer Newsletter Articles. Click here
Would you like a free, no obligation survey of your business? Click here

*Not all services shown on our website are available in all jurisdictions. Please check with your local Red Hawk office to determine which services can be performed by the Red Hawk office in your area.
logo_ul_listed logo_csaa logo_sia SDM100 FAST50