Sign Up to Receive our Blogs

Your email:

Join The Conversation!

TGC logo

Participate in the conversations happening in the LinkedIn Group:
The Great Conversation in Security

Follow The Sage Group

Sage Conversations

Current Articles | RSS Feed RSS Feed

Video Surveillance Ensures Safety, Security, and the Customer Experience


The Ice Palace is a multi-purpose sports and entertainment complex in Saint Petersburg, Russia. Built in 1999, the Ice Palace has served as the home arena for SKA St. Petersburg and been primarily used for ice hockey games. Beyond ice hockey, the arena hosts concerts, fairs, circus shows, exhibitions, and acts as a skating rink. The five-story building can hold up to 12,300 people.

13 Steps to a Successful PSIM Implementation

NICE Systems

Authored by Bob Banerjee, Senior Director, Training and Development, NICE

I was asked a few weeks back to host a webinar. When I was told I could pick my own topic, it got me to thinking. I speak at security conferences throughout the year and host PSIM Workshops as well. The one question that always comes up is:

“What can I do to make my PSIM deployment successful?”

So to answer this question, I went on a fact finding mission. My methodology was simple: I interviewed organizations and consultants that had implemented PSIM to gather the lessons they learned along the way. The result is list of best practices that were common sense but surprisingly insightful as well. I’ve summarized some of these below.

1. Understand the problems you’re trying to solve: Organizations deploy PSIM to achieve specific results. During the visioning process, make sure you identify and clearly articulate your company’s vision for deploying PSIM. Are you trying to achieve better situational awareness? Faster response times? Consistent handling of incidents? Cost savings from consolidation? Fewer false alarms? Compliance with regulations? Operational savings?

Taminco Chemicals Plant Uses Video Monitoring for Security, Compliance and Business Process Optimization


Taminco Chemicals plays a role in nearly everything consumers use as the leading alkyl amines and derivatives producer in the world developing food additives, soaps, fuels, and more. To monitor and record all daily activity in its U.S. manufacturing facilities, Taminco has deployed video management software (VMS) for overseeing employee safety while delivering hazardous chemicals to and from manufacturing and ensuring compliance with federal regulations.

Aligning the Business Case With Safety & Security Video Surveillance and Stakeholder Value

Ridley college blog

Ridley College is an internationally recognized co-educational boarding school in Ontario, Canada, noted for inspiring leadership, igniting creativity, and nurturing the human spirit in a world of infinite possibilities. Ridley College currently has an enrollment of more than 600 students from 40 countries.

Practice Leader Weighs In On Insider Threats

Dr. Gelles

Dr. Michael Gelles is a riveting speaker with big ideas supported by a firm that cultivates great ideas. At Deloitte Consulting LLP, Mike is a director with the Federal Practice in Washington, D.C. His focus areas are in human capital management, systems, and operations.

Best Choice for Video Surveillance at International Port

Arecont Jebel Ali Port


Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics, and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hemisphere. It is a technologically advanced facility, employing state-of-the-art equipment and is a model for the industry and the region in everything from size to efficiency and security.


The DP World marine control tower at Jebel Ali is an important facility for monitoring and controlling the movement of vessels in and out of the port. Physical security at the control tower was in need of upgrading and, in keeping with requirements mandated by Jebel Ali Port Security, DP World conducted a security risk assessment to determine how best to improve security at the site. Based on the assessment, DP World recommended an external video surveillance system.

A basic design was developed that included 13 analog day/night box cameras and two outdoor pan-tilt-zoom (PTZ) cameras. Upon review, DP World concluded that the installation of this analog video surveillance system would also require the services of civil and electrical personnel for cabling and power needs. These additional services would add to the overall system costs as well as potentially increase the time frame for completion.

Do You Want to Know How to Think About Big Data for Security?

incident management PPM

By Frank Kennedy, Director of Global Sales, PPM

What is “big data?”

Every day, we create 2.5 quintillion bytes of data—so much that 90% of the data in the world today has been created in the last two years alone. This data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase transaction records, and cell phone GPS signals to name a few. This data is big data, and it is more than simply a matter of size; it is an opportunity to find insights into new and emerging types of data and content, to make your business more agile and to answer questions that were previously considered beyond your reach.1

According to IDC, it is imperative that organizations and IT leaders focus on the ever-increasing volumevariety and velocity of information that forms big data.2

Protecting Data Centers

Data Center Image for eShot

By: Danny Garrido, President, Traka USA

Protecting Data Centers provides a unique challenge for security professionals. Access control to these areas is important because they house highly sensitive business information.
Data is growing at an exponential rate, which means Data Centers and security surrounding that data is growing alongside with it. As companies in all sectors—including health care, retail, finance, and government—build these infrastructures, there are many standards to choose from when it comes to how to best secure that data and the facility that houses it. Yet as data centers continue to grow to keep up with the demand, seemingly, the security measures to protect companies’ most sensitive information are not receiving the same priority.

This isn’t just access to the building or protecting the data from hacking; critical server access, limited data center access, and visitors/contractors access is all part of the process to ensure the physical security of a data center is in line with customer expectations and business requirements. This of course includes a lot of hardware, software, wires, and complicated technology that must continue to run to ensure their customers don’t see the problems associated with a disruption in service.
These facilities house redundant utilities and various security devices. Things like HIPPA, PCI, and SOX compliance play a major role in planning a data center. You can imagine what happens if any of these services go down. Going down for a day or more hits the bottom line of profits. You can easily lose customers. At a minimum, your business brand looks negatively impacted to current and future customers and your reputation sours.
Protecting a data center and its contents is critical to the bottom line of any modern business.  That means controlling access, not only knowing who goes in and out of the area but also tracking the types of activities taking place inside. Security companies need to think about several issues in these types of installations. For example, one of the first steps to consider in protecting these facilities is understanding the challenges. Data Centers have server rack keys, highly sensitive facility keys, and vendor badges to control. Providing access and the ability to audit movement in and out of the area must be part of the solution. Because a variety of employees must go in and out of this sensitive area, protecting and tracking access, as well as protecting and tracking the use of keys inside, is critical to the security considerations.  More importantly, the ability to ensure those keys do not leave the facility is proving invaluable.
Installers may want to consider things such as key curfews that include software notifications via email or text message when a key has not been returned by curfew (out too long). While this does not prevent someone from leaving a facility or area with an important key or asset, it does provide a level of control and notification so the business knows when the key has not been returned.  This allows an organization to be proactive and potentially prevent a major disruption rather than being reactive the next time someone needs that key.
This type of key management solution can also be integrated into the existing access control system. It prevents an employee from “badging out” until they have returned their key or asset safely.
This type of security feature/installation is called anti-pass-back. Simply put, it means preventing someone from leaving a facility or area based on the status of a particular key or asset. The individual’s badge access can be granted or revoked ensuring they cannot pass through the access point without properly returning keys. This not only ensures  only authorized personnel gets in and out; but equally as important, it drives the appropriate process to ensure risk is mitigated and a tired, vengeful, or forgetful employee isn’t the reason for a disruption in service or workflow.
More than ever, business and government organizations are scrutinizing data centers to a higher degree in areas such as security, availability, environmental impact, and adherence to standards. With so many of these centers housing an endless amount of valuable assets with critical information, essential security is always a vital need and focus. In addition, things like key management and the corresponding processes present security challenges for the installer/integrator, as the use of conventional key rings and access control systems can be both vulnerable and costly. IT operations are a crucial aspect of most organizations around the world and it is necessary to provide a reliable infrastructure for IT operations in order to minimize any chance of disruption. Information security is also a concern, and for this reason a data center has to offer a secure environment which minimizes the chances of any type of security breach. Security installers/integrators can help ensure data centers keep high standards for assuring the integrity and functionality of its hosted computer environment by protecting the assets through a quality electronic key management program.
Danny Garrido has been President of TRAKA, USA since 2013.  He has been in the security industry for 15 years, both as an integrator and as a corporate executive, heading up Brink’s Home Security and Broadview Security Dealer program, before joining ADT Security as Director after the acquisition of Broadview Security.
About Traka
Traka is the leading global specialist in intelligent key and asset management solutions. We manufacture secure systems that allow you to control and audit who has access to sensitive areas of your facility and assets (such as data racks), keeping them out of the wrong hands.
Traka’s key management systems are intelligent solutions that allow you to restrict rack access to authorized users only. Furthermore, it allows you to maintain a full audit of who has accessed a rack, and when. Traka’s innovation goes one step further through integration into your existing access control system, ensuring personnel with keys do not leave a facility until those particular keys are returned.

A Ring of Protection Recipe for Secure City Collaboration

Milestone logo

Eight cities covering more than 200 square miles around the greater Minneapolis area have created a unique collaboration that may be a recipe for success that others might follow.

The eight cities formed a valuable relationship by connecting the municipalities’ video surveillance to protect citizens and quickly resolve incidents that can cross between their borders. They now have city-specific control over their monitoring but can quickly
connect with neighboring cities at the time and context of need.

The process included the following steps:

  1. Identify a cross functional team that can be trusted to protect city specific interests while expanding their potential usage and value
  2. Use the team to assess and document city-specific needs
  3. Aggregate the results and identify common interests between cities identifying a sense of urgency to accelerate momentum
  4. Identify or conceptually propose a common IT architecture platform that can be leveraged across multiple cities
  5. Choose a software application foundation, such as a video management system, that provides easy and intuitive administration, a scalable architecture for rapid expansion, and an open architecture to ensure rapid integration at the program and technology level
  6. Provide ownership and control to each city while leveraging the entire ecosystem when and if needed
  7. Document and communicate to city and community stakeholders the value of city to city collaboration to reduce risk, promote confidence in city services, and drive value while reducing long term costs

1. Identify a cross functional team that can be trusted to protect city specific interests while expanding their potential usage and value

The greater Minneapolis/St. Paul, Minnesota area is composed of 45 municipalities. One integrator began to work with each city earning their trust. In effect, the integrator acted as on behalf of the collective, forming a guiding coalition.

The Right Level of Door Security Part 3: Online Access Control

Security Continuum Chart updated 2014

Article contributed by: Peter Boriskin, Director of Product Management - EAC, ASSA ABLOY Americas

In the last of this three-part series, we'll explore the considerations for selecting online access control. Online systems are located to the far right on the security continuum and represent the highest level of security. Online systems give you real-time communications between the device and the security management system.

Offering a much higher level of authentication, these systems are capable of:

All Posts