Sign Up to Receive our Blogs

Your email:

Join The Conversation!

TGC logo

Participate in the conversations happening in the LinkedIn Group:
The Great Conversation in Security

Follow The Sage Group

Sage Conversations

Current Articles | RSS Feed RSS Feed

Taminco Chemicals Plant Uses Video Monitoring for Security, Compliance and Business Process Optimization


Taminco Chemicals plays a role in nearly everything consumers use as the leading alkyl amines and derivatives producer in the world developing food additives, soaps, fuels, and more. To monitor and record all daily activity in its U.S. manufacturing facilities, Taminco has deployed video management software (VMS) for overseeing employee safety while delivering hazardous chemicals to and from manufacturing and ensuring compliance with federal regulations.

Aligning the Business Case With Safety & Security Video Surveillance and Stakeholder Value

Ridley college blog

Ridley College is an internationally recognized co-educational boarding school in Ontario, Canada, noted for inspiring leadership, igniting creativity, and nurturing the human spirit in a world of infinite possibilities. Ridley College currently has an enrollment of more than 600 students from 40 countries.

Practice Leader Weighs In On Insider Threats

Dr. Gelles

Dr. Michael Gelles is a riveting speaker with big ideas supported by a firm that cultivates great ideas. At Deloitte Consulting LLP, Mike is a director with the Federal Practice in Washington, D.C. His focus areas are in human capital management, systems, and operations.

Best Choice for Video Surveillance at International Port

Arecont Jebel Ali Port


Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics, and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hemisphere. It is a technologically advanced facility, employing state-of-the-art equipment and is a model for the industry and the region in everything from size to efficiency and security.


The DP World marine control tower at Jebel Ali is an important facility for monitoring and controlling the movement of vessels in and out of the port. Physical security at the control tower was in need of upgrading and, in keeping with requirements mandated by Jebel Ali Port Security, DP World conducted a security risk assessment to determine how best to improve security at the site. Based on the assessment, DP World recommended an external video surveillance system.

A basic design was developed that included 13 analog day/night box cameras and two outdoor pan-tilt-zoom (PTZ) cameras. Upon review, DP World concluded that the installation of this analog video surveillance system would also require the services of civil and electrical personnel for cabling and power needs. These additional services would add to the overall system costs as well as potentially increase the time frame for completion.

Do You Want to Know How to Think About Big Data for Security?

incident management PPM

By Frank Kennedy, Director of Global Sales, PPM

What is “big data?”

Every day, we create 2.5 quintillion bytes of data—so much that 90% of the data in the world today has been created in the last two years alone. This data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase transaction records, and cell phone GPS signals to name a few. This data is big data, and it is more than simply a matter of size; it is an opportunity to find insights into new and emerging types of data and content, to make your business more agile and to answer questions that were previously considered beyond your reach.1

According to IDC, it is imperative that organizations and IT leaders focus on the ever-increasing volumevariety and velocity of information that forms big data.2

Protecting Data Centers

Data Center Image for eShot

By: Danny Garrido, President, Traka USA

Protecting Data Centers provides a unique challenge for security professionals. Access control to these areas is important because they house highly sensitive business information.
Data is growing at an exponential rate, which means Data Centers and security surrounding that data is growing alongside with it. As companies in all sectors—including health care, retail, finance, and government—build these infrastructures, there are many standards to choose from when it comes to how to best secure that data and the facility that houses it. Yet as data centers continue to grow to keep up with the demand, seemingly, the security measures to protect companies’ most sensitive information are not receiving the same priority.

This isn’t just access to the building or protecting the data from hacking; critical server access, limited data center access, and visitors/contractors access is all part of the process to ensure the physical security of a data center is in line with customer expectations and business requirements. This of course includes a lot of hardware, software, wires, and complicated technology that must continue to run to ensure their customers don’t see the problems associated with a disruption in service.
These facilities house redundant utilities and various security devices. Things like HIPPA, PCI, and SOX compliance play a major role in planning a data center. You can imagine what happens if any of these services go down. Going down for a day or more hits the bottom line of profits. You can easily lose customers. At a minimum, your business brand looks negatively impacted to current and future customers and your reputation sours.
Protecting a data center and its contents is critical to the bottom line of any modern business.  That means controlling access, not only knowing who goes in and out of the area but also tracking the types of activities taking place inside. Security companies need to think about several issues in these types of installations. For example, one of the first steps to consider in protecting these facilities is understanding the challenges. Data Centers have server rack keys, highly sensitive facility keys, and vendor badges to control. Providing access and the ability to audit movement in and out of the area must be part of the solution. Because a variety of employees must go in and out of this sensitive area, protecting and tracking access, as well as protecting and tracking the use of keys inside, is critical to the security considerations.  More importantly, the ability to ensure those keys do not leave the facility is proving invaluable.
Installers may want to consider things such as key curfews that include software notifications via email or text message when a key has not been returned by curfew (out too long). While this does not prevent someone from leaving a facility or area with an important key or asset, it does provide a level of control and notification so the business knows when the key has not been returned.  This allows an organization to be proactive and potentially prevent a major disruption rather than being reactive the next time someone needs that key.
This type of key management solution can also be integrated into the existing access control system. It prevents an employee from “badging out” until they have returned their key or asset safely.
This type of security feature/installation is called anti-pass-back. Simply put, it means preventing someone from leaving a facility or area based on the status of a particular key or asset. The individual’s badge access can be granted or revoked ensuring they cannot pass through the access point without properly returning keys. This not only ensures  only authorized personnel gets in and out; but equally as important, it drives the appropriate process to ensure risk is mitigated and a tired, vengeful, or forgetful employee isn’t the reason for a disruption in service or workflow.
More than ever, business and government organizations are scrutinizing data centers to a higher degree in areas such as security, availability, environmental impact, and adherence to standards. With so many of these centers housing an endless amount of valuable assets with critical information, essential security is always a vital need and focus. In addition, things like key management and the corresponding processes present security challenges for the installer/integrator, as the use of conventional key rings and access control systems can be both vulnerable and costly. IT operations are a crucial aspect of most organizations around the world and it is necessary to provide a reliable infrastructure for IT operations in order to minimize any chance of disruption. Information security is also a concern, and for this reason a data center has to offer a secure environment which minimizes the chances of any type of security breach. Security installers/integrators can help ensure data centers keep high standards for assuring the integrity and functionality of its hosted computer environment by protecting the assets through a quality electronic key management program.
Danny Garrido has been President of TRAKA, USA since 2013.  He has been in the security industry for 15 years, both as an integrator and as a corporate executive, heading up Brink’s Home Security and Broadview Security Dealer program, before joining ADT Security as Director after the acquisition of Broadview Security.
About Traka
Traka is the leading global specialist in intelligent key and asset management solutions. We manufacture secure systems that allow you to control and audit who has access to sensitive areas of your facility and assets (such as data racks), keeping them out of the wrong hands.
Traka’s key management systems are intelligent solutions that allow you to restrict rack access to authorized users only. Furthermore, it allows you to maintain a full audit of who has accessed a rack, and when. Traka’s innovation goes one step further through integration into your existing access control system, ensuring personnel with keys do not leave a facility until those particular keys are returned.

A Ring of Protection Recipe for Secure City Collaboration

Milestone logo

Eight cities covering more than 200 square miles around the greater Minneapolis area have created a unique collaboration that may be a recipe for success that others might follow.

The eight cities formed a valuable relationship by connecting the municipalities’ video surveillance to protect citizens and quickly resolve incidents that can cross between their borders. They now have city-specific control over their monitoring but can quickly
connect with neighboring cities at the time and context of need.

The process included the following steps:

  1. Identify a cross functional team that can be trusted to protect city specific interests while expanding their potential usage and value
  2. Use the team to assess and document city-specific needs
  3. Aggregate the results and identify common interests between cities identifying a sense of urgency to accelerate momentum
  4. Identify or conceptually propose a common IT architecture platform that can be leveraged across multiple cities
  5. Choose a software application foundation, such as a video management system, that provides easy and intuitive administration, a scalable architecture for rapid expansion, and an open architecture to ensure rapid integration at the program and technology level
  6. Provide ownership and control to each city while leveraging the entire ecosystem when and if needed
  7. Document and communicate to city and community stakeholders the value of city to city collaboration to reduce risk, promote confidence in city services, and drive value while reducing long term costs

1. Identify a cross functional team that can be trusted to protect city specific interests while expanding their potential usage and value

The greater Minneapolis/St. Paul, Minnesota area is composed of 45 municipalities. One integrator began to work with each city earning their trust. In effect, the integrator acted as on behalf of the collective, forming a guiding coalition.

The Right Level of Door Security Part 3: Online Access Control

Security Continuum Chart updated 2014

Article contributed by: Peter Boriskin, Director of Product Management - EAC, ASSA ABLOY Americas

In the last of this three-part series, we'll explore the considerations for selecting online access control. Online systems are located to the far right on the security continuum and represent the highest level of security. Online systems give you real-time communications between the device and the security management system.

Offering a much higher level of authentication, these systems are capable of:

Security Metrics That Matter

ASIS logo

INQUIRE Our stakeholders, extended networks, and community members often ask: “What are the metrics that matter most for security risk mitigation?" The answer(s), like our clients, are diverse and varied. Performance measurement relevancy, like beauty, is often “in the eye of the beholder.” Oft credited to the likes of Shakespeare or Benjamin Franklin, the phrase intuitively represents a more ancient truth. Beauty, or what matters most, is subject to the cultural lens and values of your client organization.

CONSIDER Leadership imperatives are arguably job one. What are the goals and aspirations of the institution? How are they communicated in annual reporting? How are you enabling strategic objectives? Projects and programs which quantifiably and qualitatively align to achieve leadership goals, get funded.

QUANTIFY Corporations rely on profit. Enable improvement of key P&L performance indicators (KPIs) including revenue, net profit, cash over/short, inventory over/short, credits, discounts, mark-outs, and returns to determine the health or weakness of the business. Controllable expenses including claims, labor, rent, and utilities are often in the picture. The highly prized “consumer and stakeholder experiences” begin with a perceived value of care and translate readily to brand value estimations.

A Scorecard for IP Video for Mobile Applications


By Samsung Techwin America

Buses, subways, trains, police cars, and other transit vehicles can be a challenging environment to capture video. The changing landscape of our security has required owners and operators to take a hard look at their vehicle and determine if they need video evidence to mitigate risk. In the past, there were not many camera and recording systems tailored specifically to the mobile market, leading to installation or maintenance issues.

The first challenge is power. A mobile recorder must support 12-24vDC input from the vehicle battery with a wide range of tolerance for fluctuations from starting the vehicle and temperature variations. Next, when the vehicle powers off, the NVR should power off safely, finishing off the current recording. In addition, some customers want to continue operating off of the battery for a specific period of time so that there is a recording of the driver leaving the vehicle. This also provides continued recording in the event of the ignition turning off for short periods, such as a package delivery vehicle.

All Posts