Access Management Information related to the system that enables a security leader to control access to areas and resources in their enterprise.
- Product Spotlight on Risk Monitoringon June 23, 2025 at 4:00 am
Security magazine has highlighted a few recently released risk management products.
- Why Visitor and Contractor Management is Critical in Busy Facilitieson June 4, 2025 at 4:00 am
Though essential to daily operations, temporary populations can become a security blind spot.
- Outdated Security, Overlooked Costs: Why Multifamily Properties Must Modernize Nowon May 29, 2025 at 5:00 am
Many properties still rely on brass keys, manual processes, and disconnected digital tools, all of which appear functional but quietly create operational drag.
- Protecting 14 Campuses, All With Different Needson May 23, 2025 at 5:00 am
Protecting 14 campuses and learning centers is almost herculean. But that’s what the security team of Portland Community College (PCC) in Portland, Oregon does for one of the Northwest’s largest college systems.
- Product Spotlight on Access Controlon May 9, 2025 at 4:00 am
Security magazine highlights a variety of access control products.
- Bored locks with visual status indicators: Elevating security and privacy in 7 key everyday spaceson March 12, 2025 at 3:00 am
Bored locks with visual status indicators elevate security and privacy in everyday spaces.
- Manage external and internal threats to commercial spaceson March 11, 2025 at 3:00 am
An extensive security strategy for commercial buildings must balance defenses against external vulnerabilities with targeted measures to neutralize internal risks.
- The new standard in facility protection: Enhancing perimeter securityon February 28, 2025 at 1:00 pm
Perimeter protection is essential for organizations across all sectors, serving as the first line of defense against potential threats.
- Top challenge for 57% of end users is outdated physical security or ITon January 20, 2025 at 10:00 am
A new report details shifts in the physical security industry, especially in regard to priorities and challenges.
- Keys and vehicle barriers: A unified approach to protectionon January 9, 2025 at 5:00 am
Evaluating and updating vehicle barriers mitigates risk and provides peace of mind.
- Security design: Important points of protection in a buildingon November 6, 2024 at 5:00 am
Just as a chain is only as strong as its weakest link, a building with a single unaddressed weak point is vulnerable no matter how well fortified it is everywhere else.
- 60% of organizations manually gather employee dataon October 11, 2024 at 12:00 pm
According to a recent Envoy report, shifting workplace dynamics such as hybrid work policies have led to outdated data management processes.
- Four cybersecurity best practices for keeping heads above the cloudon September 6, 2024 at 12:57 pm
When organizations rely heavily on their cloud providers’ security controls, IT leaders need a way to decrease the likelihood of a cloud-based breach.
- Managing the invisible risk of non-human identitieson September 4, 2024 at 4:00 am
While organizations often excel at managing human identities, many need to pay more attention to a growing and potentially more hazardous category of digital actors known as non-human identities.
- The future of security and access control for office spacesby algerj@bnpmedia.com (Jordyn Alger) on August 19, 2024 at 4:00 am
Security talks with Andrew Campagnola about emerging threats in office building security and how security leaders can address these concerns.
- Why insider attacks are indicative of a need for security convergenceon August 13, 2024 at 12:00 pm
In order to use security convergence to combat the growing threat of insider attacks, one must first understand key facts about the issue.
- The imperative of fortifying police stations with secured entry solutionson August 6, 2024 at 4:00 am
Law enforcement agencies must prioritize the implementation of tailored solutions to safeguard their personnel, assets and the communities they serve.
- New report identifies top 5 trends in physical access controlon August 2, 2024 at 12:00 pm
A new report reveals five notable trends that may indicate the future of access control technology.
- AI is coming for company credentials — Here’s how to fight backon July 24, 2024 at 4:00 pm
Where businesses see AI as a tool for efficiency and market differentiation, cyber attackers are devising new schemes to exploit undefined learning curves.
- From the stone age to cutting edge: A case study on key managementon July 16, 2024 at 12:00 pm
Learn how Arizona’s largest school district improved operational efficiency through key management.
- Holistic security designon May 6, 2024 at 4:00 am
Security leaders can mitigate vulnerability, reduce risk and keep people safe with thoughtful security design.
- ISC West product previewon April 9, 2024 at 4:00 am
This month, Security magazine highlights some of the products that will be featured at ISC West.
- The role of access control systems in school safetyon February 23, 2024 at 1:00 pm
Access control systems and video surveillance have always played a significant role in campus security. Now, that technology is changing, too.
- Safeguarding municipalities against rising cyber threatson February 22, 2024 at 12:00 pm
In an era marked by the escalating frequency of cyberattacks across industries, the public sector emerges as a particularly enticing target for cybercriminals due to its historical vulnerabilities.
- Creating open yet secure environments for logistics facilitieson February 15, 2024 at 1:00 pm
The for robust security must be balanced against the need for facilities to offer an open and welcoming environment.
- Unlocking efficiency and compliance within medical facilitieson January 26, 2024 at 1:33 pm
Controlling the flow of people in a healthcare facility is essential to keep staff, patients, sensitive documents, medications and equipment secure.
- Disparate systems: The importance of closing the gapon January 12, 2024 at 2:00 pm
Are you getting the most out of your security system? This is a question that many security leaders should be asking themselves and their employees.
- Securing public spaces without a perimeteron January 8, 2024 at 5:00 am
Creating a security strategy in public spaces, especially those without a clear perimeter, is a constant challenge for security leaders.
- 77% of financial organizations detected a cyberattack in the last yearon December 19, 2023 at 2:36 pm
According to a recent Netwrix report, 77% of financial organizations detected a cyberattack in the last year, compared to 68% in other industries.
- Top physical security predictions for 2024on December 13, 2023 at 3:26 pm
After reflecting on top physical security trends in 2023, security leaders share their physical security concerns and predictions for 2024.