Physical Security Executive Commentary

  1. Top 5 Tech Trends Universities Use To Enhance Student Security

    It is only fitting that institutions of higher learning, where innovation is encouraged, are leading the way in advancements related to confirming student identity and controlling access to campus buildings. While student identification (ID) cards have evolved over the years, some colleges and universities have truly gone high-tech in the ways students can prove who they are.

  2. The Role Of Video In Your IT Clients’ Business Intelligence

    According to Cisco's recent Visual Networking Index Report, video is now the fastest growing type of data in the world.  The report estimates by 2019, nearly one million minutes of video content will cross the network every second. Of course, video generated by security and surveillance systems is included in these numbers. This represents an enormous amount of unstructured data – or Big Data – that can potentially be mined for business intelligence.  However, generating any kind of actionable information from endless amounts of video content can seem overwhelming, which is why surveillance video is often overlooked when it comes to Big Data and generating business intelligence.

  3. The Top 5 Ways Universities Confirm Student Identity Through Access Control

    As students return to school, packing lecture halls and moving into dorm rooms in the colleges and universities, officials behind the scenes look for ways to safeguard the students, faculty, and assets. To accomplish this feat, today’s higher education organizations look for a combination of policies and new technology solutions.

  4. 2015: The Year of Mobile

    As you have probably heard, mid April of this year, Google made big changes to their search engine algorithm, giving priority to websites that are optimized for mobile devices. Over the past few months, many companies (our clients included) have started taking a closer look at their site traffic and refreshing their websites to make them mobile friendly.

  5. How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

  6. The Growing Value Of Video Data: Ensure Your IT Clients’ Video Investment Is Protected

    Today’s IT and surveillance leaders are constantly on the lookout for new ways to gather, manage and store data to run their departments more efficiently, as well as maintain budgets and contribute to the overall success of the business. Video surveillance is a valuable tool to help maintain a secure environment, and as such, the amount of video surveillance tools deployed continues to increase.

  7. What SMBs Are Looking For From Their IT Solutions Providers

    I do coaching for one of our member’s sales executives. Their owner asked for some feedback on a blog we were reviewing. One of the sales executives replied with the following...

  8. MSP Sales Teams Are Not Just From IT Backgrounds Anymore

    I read an interesting interview by Jill Konrath of Brent Adamson, coauthor of “The Challenger Sale.” In the interview, Mr. Adamson talks about some of the research they have done around the point in the sale when the purchaser engages with the supplier.

  9. What To Consider When Planning Your Business Exit Strategy (Part II)

    In the first post of this series, I talked about the financial preparation required to maximize your outcome when you exit your business. Of course, that assumes you will sell or value the company at exit.

  10. Managing Risks In Utility And Substation Physical Security

    Traditionally, electrical substation security was aimed only at preventing access to stop vandalism and improve safety. But today, security efforts have been redefined to address new threats in order to protect critical infrastructure. Substations are a critical element in the distribution of high-voltage electrical networks, and any disruption can have a severe negative impact on society.