Corporate Security


Products

  • VIGIL Client

    Now VIGIL Client users monitoring large volumes of sites, can locate a desired Server Site, Camera, Audio Channel or Relay among thousands of potential Sites via a traditional, easy-to-use search platform. Simply type in a keyword from the name of a desired Site, Camera, Audio Channel or Relay and VIGIL Client will return all matching results. more

  • Incident Reporting Software

    Addressing the needs of both security operations and investigation management, Perspective EIM delivers an end-to-end solution for responding to, reporting on, and investigating incidents. It starts at the beginning with incident response, capturing complete details for further investigation and future reference. During the incident, it’s about managing resources, minimizing impact, and gathering intelligence. After the incident, it’s about security metrics and incident prevention. Featuring real-time dispatching, in-depth analytics, sophisticated data segregation, automated workflows, and PSIM integration. more

  • Security Insight and Business Intelligence Platform

    STANLEY Security’s eServices 2.0 provides real-time transparency on customers’ security systems, including intrusion, video surveillance, access control, fire detection and integration – offering full, mobile visibility and business insight. more

  • IP Video Management Software

  • HALO


Webinars


Podcasts

  • Podcast: Cisco Systems

    An interview with Bill Stuntz, vice president and general manager of the physical security business unit at Cisco Systems. more


Whitepapers

  • Understanding CFATS: What It Means to Your Business

    Whitepaper: Understanding CFATS

    In 2006, the U.S. Congress mandated that “High Risk” chemical facilities develop and implement security plans to guard against the possibility of terrorism. Congress authorized the Department of Homeland Security to develop and administer the appropriate regulations. Congress established fines of $25,000 per day and closure of the facility as the penalties for any company found to be out of compliance. In 2008, DHS began the rollout of the regulation with the most significant and complicated portion of the implementation beginning now. more

  • Policy-Based Physical Security Management

    Practically all facility-based physical security systems, devices and services operate in silos, very loosely connected with each other. Obtaining a comprehensive view of physical security operations for all corporate locations worldwide is very challenging. The problem further gets exasperated with localized security processes, ad-hoc event handling, countless alarms and a lack of holistic reporting from multi-vendor proprietary systems. more

  • Building Enterprise Secure File Transfer Processes that Improve Your Security and Compliance

    Virtually all businesses today have work processes that dictate the need to share critical business information with people outside as well as inside the organization. The information may be highly confidential intellectual property, patient health records, sensitive customer data, financial information or the like. This presents a challenge. more


Free e-News Subscription

I agree to this site's Privacy Policy