Skip to main content

Executive Perspectives

Last month, ASIS International announced that it would be changing the name of its flagship annual security conference from the ASIS Annual Seminar and Exhibits to the Global Security Exchange (GSX). The name change is intended to reflect the ongoing shift that is occurring both inside the organization and the industry as a whole, which has gone […]

Perimeter Protection in the Great Outdoors

 ·Perimeters of buildings and grounds can vary significantly, from suburban areas with open space surrounded only by trees and landscaping to industrial sites with fenced-in facilities or to urban environments bordered by sidewalks, roadways and parking lots. Technology for protecting these facilities varies as widely as the perimeters themselves, but the key to detecting and […]

Building a Stronger Security Culture to Mitigate Risk

By Lance Hayden. According to Lance Hayden, Managing Director of Berkeley Research Group, harnessing the power of people and culture is the next great frontier for information security. Security culture reflects the beliefs and values of the people that make up your organization. They are intangible and embedded in thoughts and minds. An organization can’t […]

Rack Rate

When warehouse managers are told they need to install in-rack sprinklers, they usually react with trepidation and dismay. Who can blame them? Although in-rack sprinklers have been successfully used to protect storage racks for more than five decades, protection guidelines have historically required the installation of a large number of sprinklers, making this type of […]

How to Reap RMR From the Cloud

. You are building your integration business but the security industry and the world continues to change underneath you, making it a bit harder. The move from analog to digital cameras changed your business. Physical security information management (PSIM) systems did not change your business. Best-of-breed integrations vs. all-in-one systems allowed you to expand your […]

Real words or buzzwords?: True Cloud

I first heard the words “True Cloud” at a security conference where Dean Drako, founder and owner of Eagle Eye Networks and owner of Brivo Systems, explained why he coined the term. Previously, there was no terminology to make a distinction between a simple server application being hosted in the cloud, and a server application […]

10 Triggers for Transition

A key area where organizations need help from security integrators is in the assessment of their current access control solutions and whether and when to make the transition to new technology.  Organizations often delay transitions over budget concerns or because of worries that the process will adversely impact productivity and workflow.  But these delays can […]

Page 1 of 9123...Last »
**Red Hawk responds to customers impacted by Hurricane Harvey** Click here
Want to place your system on test with the central station? Click here
Would you like to build your inspection reports? Click here
Read the Red Hawk Observer Newsletter Articles. Click here
logo_ul_listed logo_csaa logo_sia SDM100