window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-141226144-1');

Blog

Emerging threats and trends in venue security

2023-10-30T23:14:23-04:00

Emerging threats and trends in venue security: What unique challenges does the sporting world face when returning to play following a global pandemic? The National Center for Spectator Sports Safety and Security (NCS4) “Venue Security Director Survey” shows that many

Emerging threats and trends in venue security2023-10-30T23:14:23-04:00

Why construction sites need proactive security

2024-04-07T18:37:08-04:00

Why construction sites need proactive security: Construction sites are undoubtedly one of the most challenging environments to protect from a security perspective. Unlike the four walls of a fully completed structure, where workers and visitors can be closely monitored and

Why construction sites need proactive security2024-04-07T18:37:08-04:00

Surveillance cameras optimize security operations

2024-01-16T00:28:04-05:00

Surveillance cameras optimize security operations:  From businesses to schools and communities, how are organizations around the globe deploying security cameras in a cloud-based video management system (VMS)? In its annual report on security cameras, Eagle Eye Networks (EEN) aggregated data

Surveillance cameras optimize security operations2024-01-16T00:28:04-05:00

Securing the perimeter in manufacturing and distribution

2023-07-15T19:48:50-04:00

Securing the perimeter in manufacturing and distribution With large campuses and high vehicle traffic, manufacturing and distribution facilities require a layered approach to securing the perimeter. Author - Adam Stone At the Associated Grocers of New England, perimeter security is

Securing the perimeter in manufacturing and distribution2023-07-15T19:48:50-04:00

How can security teams manage risk if they can’t measure it

2023-08-15T17:03:54-04:00

Author -  Mark Perkins How can security teams manage risk if they can’t measure it? When security professionals are faced with the question of how many unauthorized people are acceptable in their buildings, the answer is always a resounding zero.

How can security teams manage risk if they can’t measure it2023-08-15T17:03:54-04:00

Push-to-talk (PTT) improves physical security operations

2024-01-16T00:35:20-05:00

Push-to-talk (PTT) improves physical security operations: Security leaders must proactively implement technology that improves their physical security operations, emergency preparedness, and team collaboration. Security guards, dispatchers, armed incident response teams, executive protection teams, GSOC analysts, and more all require advanced

Push-to-talk (PTT) improves physical security operations2024-01-16T00:35:20-05:00

Title

Go to Top