From the stone age to cutting edge: A case study on key management

From the stone age to cutting edge: A case study on key management

When Allen Moore, Director of Security for Mesa Public Schools (MPS) in Arizona, was alerted that the state’s auditor general’s office was coming to visit, he wasn’t sure what to think. It was the first time in his 16 years with the district they had announced they’d be stopping by. “It felt like the IRS was coming,” Moore said. But his apprehension was put to rest after he began to show them all of the…

Read More

Unlocking innovation: 4 trends in access control technology

Unlocking innovation: 4 trends in access control technology

Access control technology is changing, older systems are being switched out for newer, more accessible systems. More and more, people are asking for all-in-one solutions that incorporate video, audio and analytics. These new, unified solutions are increasingly possible thanks to advancements in system architecture, mobile technology, artificial intelligence and cybersecurity. Here, we discuss four of the biggest trends in access control that security leaders should pay attention to and the opportunities they present. SYSTEM ARCHITECTURE…

Read More

Product spotlight on access control

Product spotlight on access control

Managing access to both physical and digital spaces is essential to securing an organization. Security magazine highlights physical and cyber access control solutions. ALTRONIX Electronically Manage Multiple Doors The Altronix T2RM7F8S pre-configured kit utilizes Altronix power distribution and combines Mercury platform controllers for access control deployment. The rack drawer allows for ease of installation, service and maintenance to simplify board layout. Units include tamper switch, an integrated Z-bracket to facilitate wire management and network power…

Read More

How can security teams manage risk if they can’t measure it?

How can security teams manage risk if they can’t measure it?

How can security teams manage risk if they can’t measure it? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Are security teams equipped to handle overexposed data?

Are security teams equipped to handle overexposed data?

Are security teams equipped to handle overexposed data? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More