Skip to main content

Five Steps to a Risk-Free M&A

While most Corporate Security Officers will tell you that no two merger/acquisition scenarios are quite the same, they do agree that there are constants that provide a thread throughout. The risks range from the assimilation of corporate cultures and integration of technology systems – both physical and IT. And of course, there are the financial […]

Unified Physical and Logical Access Using Industry Standards and Protocols

Physical access and logical access have historically been two separate (and likely unequal) silos within an organization.  IT has their password access mechanisms; with some modern improvements. Physical security has their proximity cards, Wiegand wiring, life/safety physical standards, and an ever-increasing smattering of computer and networking standards and protocols.  Logical access is under increased scrutiny […]

Critical infrastructure security in a converged and interconnected world

This article is in response to the release of the U.S. Government Accountability Office (GAO) study in December regarding significant weaknesses in pipeline security program management. As we enter 2019, the global threat to critical infrastructure has reached a critical mass. The seemingly countless attacks against utilities, nuclear facilities, pipeline infrastructure, defense systems, energy grids, […]

10 Technology Game-Changers for 2019

  With public safety, smart city and smart building segments predicted to have an immediate and lasting effect on the North American electronic security market, where are the opportunities for security integrators to move the needle on gross margin? Here are 10 technologies generally outside the “traditional” electronic security industry that represent new opportunities on […]

Geospatial Awareness Could Be the Next Big Thing for VMS

Everything is going geospatial; from Twitter to Google, from Facebook to Pinterest.  Although it may manifest itself under other names: location-based, geo-intelligence, GEOINT, map-based, geo-referencing, geo-analysis, these are all terms referring to the concept of geospatial, which is defined as relating to or denoting data that is associated with a particular location.  It may sound […]

Radar vs. LiDAR: A Technology Toe-to-Toe

BY PAUL ROTHMAN      While both are finding massive demand in the self-driving automotive industry, the advances being made in radar and LiDAR technologies are having a discernible effect on the perimeter surveillance industry, where both technologies are gaining momentum as viable alternatives or enhancements for detection along vast perimeters. To learn more about these […]

America’s Critical Infrastructure: Threats, Vulnerabilities and Solutions

The tragic events of 9/11 awakened America to its critical infrastructure’s vulnerabilities and to the threats to this infrastructure – both physical and cyber. In the almost two decades that passed since then, the ability to monitor, detect and defend against a wide slew of threats to critical infrastructure has increased considerably, as witnessed by […]

Page 2 of 12123...10...Last »
Want to place your system on test with the central station? Click here
Would you like to build your inspection reports? Click here
Read the Red Hawk Observer Newsletter Articles. Click here
Would you like a free, no obligation survey of your business? Click here

*Not all services shown on our website are available in all jurisdictions. Please check with your local Red Hawk office to determine which services can be performed by the Red Hawk office in your area.
logo_ul_listed logo_csaa logo_sia SDM100 FAST50