Security

The Secret to Keeping Your Employees Safe in an Emergency
By TD Staff · January 11, 2016 • Emergency management situations are some of the most important aspects of a technology decision maker's job. Ensuring that the correct technology is integrated in your office to warn employees and guests that there is an emergency can literally help save lives. Many don't realize, however, that mobile devices can be tied into our emergency management plans. From notification to instruction, mobile devices can display information that can speed up the response process. Download our document to learn more.

Meet the Highest IT Standards for Enterprise AV: 2nd Edition of Enterprise Magazine
By TD Staff · December 8, 2015 • This premiere issue of Enterprise from Crestron provides the insight you need to increase your organization's productivity and efficiency right now. Learn about managed solutions that can be put into place today, leverage your existing infrastructure, security protocols and applications, while expanding your capabilities. This FREE download also covers optimizing workflows, workspace design, resources and uptime, as well as real-world case studies about companies just like yours.

Keep Cyber Threats From Destroying Your Organization
By TechDecisions Staff · September 15, 2015 • Keeping up with the threats and methods of protecting sensitive data places a huge burden on IT departments.

Intelligent Integration of AV and IT: The Premiere Issue of Enterprise
By TD Staff · August 12, 2015 • This premiere issue of Enterprise from Crestron provides the insight you need to increase your organization's productivity and efficiency right now. Learn about managed solutions that can be put into place today, leverage your existing infrastructure, security protocols and applications, while expanding your capabilities. This FREE download also covers optimizing workflows, workspace design, resources and uptime, as well as real-world case studies about companies just like yours.

6 Security Systems Tech Decision Makers Should Be Considering
By Jonathan Blackwood · June 1, 2015 • Whether you want to beef up security a bit or add a whole new suite of security systems, our list can help you get started.

Trends That CIOs and CTOs Need to Pay Attention To
By Jonathan Blackwood · May 27, 2015 • The Enterprisers Project recently conducted a lengthy interview with Mobiquity CTO Ty Rollin about some of the trends that CTOs and CIOs are facing. In a two part interview, Rollin speaks about trends that are putting pressure on CTOs and CIOs and trends that are making their jobs more complex.

Integrators Identify 10 Critical Cybersecurity Challenges
By TD Staff · May 26, 2015 • Be sure your physical security systems integrator addresses these network security issues.

Beware and Barricade Cyber Barbarians at the Gate
By Paul Boucherle · May 22, 2015 • For security integrators and customers who don’t think cybersecurity’s their business, think again.

Social Media’s Impact on PSIM, Mass Notification
By Bob Stockwell · May 20, 2015 • Physical security information management (PSIM) and facial recognition technology will soon rely on social media to help improve safety and security.

Budgets, Buy-in Hot Topics at 2015 Diebold Security Symposium
By Jason Knott · May 13, 2015 • Diebold hosts 75 end users to discuss cybersecurity, cloud surveillance and inter-departmental communication.

Government Agencies Reluctant to Incorporate BYOD
By TD Staff · May 12, 2015 • Bring your own device (BYOD) policies have been utilized more and more often in the private sector. Government agencies, however, have been more reluctant to incorporate such practices. They state that security is a large concern. What does this mean for the corporate tech decision maker?

Local Bank Completes Secure and Quick Extension of LAN/WAN
By TD Staff · May 11, 2015 • With the help of On-Line Communications, Fluidmesh, D+H, and Business Solutions Enterprises, Metuchen Savings Bank in New Jersey was able to upgrade from their outdated laser system in order to extend LAN/WAN between the branch and two administration buildings.

Security Lessons from the Anthem Data Breach
By Jonathan Blackwood · April 29, 2015 • With companies transitioning documents to digital, it’s important to keep that information secure. We can learn a lot from data breaches that have already occurred.

Tech Trends Shaping Mass Notification Emergency Communication
By Glen Marianko, Jason Snow, Mike McCarther, Joyce Essig · April 28, 2015 • Analysis of current mass notification trends and how two-way listing, analog-to-digital and other factors will impact the future of MNEC.

Purchase the Perfect Physical Security Information Management (PSIM) System
By TD Staff · April 20, 2015 • To build a PSIM system you need to tailor it to your company's specific needs. It all depends on what types of security systems you have in place already. More than that, processes and checks and balance systems can also be tied into a PSIM system. Before you purchase one of your own, you want to know what a PSIM system is capable of. That way you can build the perfect solution for your company.

Latest Resource

The Technology Decision Maker’s Guide to Physical Security
Our download gives you the basics on several physical security systems that you need to think about as the technology decision maker for your company.
Corporate TD © 2015 EH Publishing. All Rights Reserved.