window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-141226144-1');
(416) 550 8458,       (905) 612 1672        [email protected]      

Blog

Push-to-talk (PTT) improves physical security operations

2024-01-16T00:35:20-05:00

Push-to-talk (PTT) improves physical security operations: Security leaders must proactively implement technology that improves their physical security operations, emergency preparedness, and team collaboration. Security guards, dispatchers, armed incident response teams, executive protection teams, GSOC analysts, and more all require advanced

Push-to-talk (PTT) improves physical security operations2024-01-16T00:35:20-05:00

Impact of Diversity, Equity and Inclusion (DEI) on security career

2023-05-16T23:28:29-04:00

Impact of Diversity, Equity, and Inclusion (DEI) on security career A security leader’s decisions and actions when it comes to the impact of Diversity, Equity, and Inclusion (DEI) practices can send a powerful message to the organization and the security

Impact of Diversity, Equity and Inclusion (DEI) on security career2023-05-16T23:28:29-04:00

Securing perimeter – manufacturing and distribution

2023-07-06T21:53:46-04:00

Author - Adam Stone Securing perimeter - manufacturing, and distribution: With large campuses and high vehicle traffic, manufacturing and distribution facilities require a layered approach to securing the perimeter. At the Associated Grocers of New England, perimeter security is top

Securing perimeter – manufacturing and distribution2023-07-06T21:53:46-04:00

Onboarding next-generation PSIM platform

2024-01-16T00:20:38-05:00

Onboarding a next-generation PSIM platform: It’s time for organizations to improve their security, from detection to response and forensic follow-up, using next-generation physical security information management (PSIM) systems. However, the system’s many capabilities may leave some security professionals believing the

Onboarding next-generation PSIM platform2024-01-16T00:20:38-05:00

Securing public gatherings strategies

2024-04-15T20:37:45-04:00

Securing public gatherings strategies: Public gatherings have become targets for security threats and acts of violence in recent years. In the United States, attacks on schools, religious institutions, and large events have spurred evaluations of organizational security posture. The Cybersecurity

Securing public gatherings strategies2024-04-15T20:37:45-04:00

Streamlining security operations centers

2024-01-16T00:33:07-05:00

Streamlining security operations centers (SOC): The transition from a security operations center to a threat collaboration environment. There is an onslaught of security data – generating information in different formats, storing it in different places, and forwarding it to different

Streamlining security operations centers2024-01-16T00:33:07-05:00
Go to Top