Security

Protecting Your Company From a Data Disaster
By TechDecisions Staff · July 23, 2015 • Our partner resource, created by the minds behind LabTech Software, teaches you the ins and outs of data loss prevention and recovery.

Bringing Mobile Devices Into Emergency Management
By TD Staff · June 25, 2015 • Emergency management situations are some of the most important aspects of a technology decision maker's job. Ensuring that the correct technology is integrated in your office to warn employees and guests that there is an emergency can literally help save lives. Many don't realize, however, that mobile devices can be tied into our emergency management plans. From notification to instruction, mobile devices can display information that can speed up the response process. Download our document to learn more.

Keep Cyber Threats From Destroying Your Organization
By TechDecisions Staff · June 1, 2015 • Keeping up with the threats and methods of protecting sensitive data places a huge burden on IT departments.

How to Get the Most Out of a Video Surveillance System
By Jonathan Blackwood · June 1, 2015 • Video surveillance systems are among some of the most specific and unique from system to system that a company will install. A ton of factors go into what type of system you want, and only a security integrator can build the perfect system. But knowing the right questions to ask and factors to consider can help significantly in making the process smooth and procuring the perfect system.

6 Security Systems Tech Decision Makers Should Be Considering
By Jonathan Blackwood · June 1, 2015 • Whether you want to beef up security a bit or add a whole new suite of security systems, our list can help you get started.

Trends That CIOs and CTOs Need to Pay Attention To
By Jonathan Blackwood · May 27, 2015 • The Enterprisers Project recently conducted a lengthy interview with Mobiquity CTO Ty Rollin about some of the trends that CTOs and CIOs are facing. In a two part interview, Rollin speaks about trends that are putting pressure on CTOs and CIOs and trends that are making their jobs more complex.

Integrators Identify 10 Critical Cybersecurity Challenges
By TD Staff · May 26, 2015 • Be sure your physical security systems integrator addresses these network security issues.

Beware and Barricade Cyber Barbarians at the Gate
By Paul Boucherle · May 22, 2015 • For security integrators and customers who don’t think cybersecurity’s their business, think again.

Social Media’s Impact on PSIM, Mass Notification
By Bob Stockwell · May 20, 2015 • Physical security information management (PSIM) and facial recognition technology will soon rely on social media to help improve safety and security.

Budgets, Buy-in Hot Topics at 2015 Diebold Security Symposium
By Jason Knott · May 13, 2015 • Diebold hosts 75 end users to discuss cybersecurity, cloud surveillance and inter-departmental communication.

Government Agencies Reluctant to Incorporate BYOD
By TD Staff · May 12, 2015 • Bring your own device (BYOD) policies have been utilized more and more often in the private sector. Government agencies, however, have been more reluctant to incorporate such practices. They state that security is a large concern. What does this mean for the corporate tech decision maker?

Local Bank Completes Secure and Quick Extension of LAN/WAN
By TD Staff · May 11, 2015 • With the help of On-Line Communications, Fluidmesh, D+H, and Business Solutions Enterprises, Metuchen Savings Bank in New Jersey was able to upgrade from their outdated laser system in order to extend LAN/WAN between the branch and two administration buildings.

Security Lessons from the Anthem Data Breach
By Jonathan Blackwood · April 29, 2015 • With companies transitioning documents to digital, it’s important to keep that information secure. We can learn a lot from data breaches that have already occurred.

Tech Trends Shaping Mass Notification Emergency Communication
By Glen Marianko, Jason Snow, Mike McCarther, Joyce Essig · April 28, 2015 • Analysis of current mass notification trends and how two-way listing, analog-to-digital and other factors will impact the future of MNEC.

Purchase the Perfect Physical Security Information Management (PSIM) System
By TD Staff · April 20, 2015 • To build a PSIM system you need to tailor it to your company's specific needs. It all depends on what types of security systems you have in place already. More than that, processes and checks and balance systems can also be tied into a PSIM system. Before you purchase one of your own, you want to know what a PSIM system is capable of. That way you can build the perfect solution for your company.

Latest Resource

Protecting Your Company From a Data Disaster
Our partner resource, created by the minds behind LabTech Software, teaches you the ins and outs of data loss prevention and recovery.
Corporate TD © 2015 EH Publishing. All Rights Reserved.