Enterprise Security Resources

How Open Communication Can Enhance Campus Safety

In this digital age, it’s easy to take technology for granted. As the years go by, it gets harder and harder to remember the days when we used to rely on payphones and letters as standard forms of communication… In fact, many millennials don’t even remember those days. Now, we…

Read Article

Mass Notification: Utilizing Existing Platforms for Mass Notification Messaging

With an increase in awareness of domestic threats – whether it is an active shooter situation, biological threat or weather-related event – there is a growing need to establish effective ways of notifying those that could be directly and indirectly affected. There are several solutions for notifying a population of…

Read Article

Best Practices for PIN & Passcode Management

In virtually all digital environments, passwords, codes and personal identification numbers (PINs) have merged as the veritable currency by which individuals gain access into a company's most critical systems. They also serve as the organization's first line of defense and are critical to the overall success of a security plan.…

Read Article

When to Consider A Hosted Access Control System

Historically, traditional access control systems contained all software and hardware components on a business's premises. Though this approach has served the market well for many years, it can be a burden for a business to maintain. One alternative is a hosted, or cloud-based access control solution. This article outlines what hosted…

Read Article

5 Considerations When Using Digital Phone Service for Wireless Security

Check out this article that highlights 5 considerations when using digital phone services for wireless security.…

Read Article

Key Steps Towards Optimizing Your Perimeter Security

When it comes to Perimeter Security, your strategy should hinge upon a layered approach. However, with so many different types of technology and every location offering different environmental factors to consider, choosing the right security systems for your needs can be a daunting task. To help you make sense of…

Read Article

Intrusion Detection: Hardwire vs. Wireless Alarm Systems

When selecting an alarm system, we are given two choices: hardwire or wireless. This is the decision that leads security professionals to ask, "Which is better?" The answer tends to come down to the individual needs of your facility and which features matter most to you. Is it reliability? Is…

Read Article

How to Ensure Security Platform Success

3 Most Common Reasons for System Failure When it comes to ensuring the success and effectiveness of a security platform, many users are not aware that common points of failure are often key components in supporting edge devices such as locking hardware, cameras, card readers, and other signaling devices. If…

Read Article

Benefits of Enterprise Mass Notification Integration

The last decade has brought many changes to the mass notification system space, including how the technology is addressed in standards and codes, such as NFPA 72 (the latest national fire alarm and signaling code), as well as the technologies deployed to broadcast messages. When considered in its entirety, in…

Read Article

Overcoming the Challenges of an HR Platform & Enterprise Access Control Integration

The advantages of integrating an enterprise access control system with your human resources platform are vast. Through critical integration of both systems, HR administrators are able to deliver real-time information updates to the security platform to more readily grant access to new hires and cancel access when required. Despite the…

Read Article

Protecting and Transitioning Business Credentials

Proximity cards are used extensively as access control systems by organizations of all industries and sizes. While proximity cards provide a level of security, they can be an easy target for cloners, putting facilities at risk. Access control systems are only part of the total security solution, however, risk management…

Read Article

Which Video Storage Option is Right for You?

As you know, video surveillance can be very technically-oriented. As technology becomes more readily accessible to businesses of all shapes and sizes, you face an ever-increasing number of choices, and choosing the right capture method for your camera footage is critical to securing your facility. Unfortunately, there is no easy one-size-fits-all video…

Read Article

Anticipating the Unexpected: Fundamental Strategies for a Successful Emergency Response Program

Anticipating the Unexpected: Fundamental Strategies for a Successful Emergency Response Program When it comes to security, contingency plans aren't just a good idea; they're standard operating procedure. Emergency situations can happen at any time at any place, so having a plan for how to respond to these circumstances is essential,…

Read Article

STANLEY Security Makes the Playoffs with its Surveillance System at the Cell

SDM Magazine, October 2013 Technology @ Work - STANLEY Security Makes the Playoffs with its Surveillance System at the Cell. By Derek Rice, Contributing Writer & Laura Stepanek, Editor   Download this article.…

Read Article

Biometrics Emerging in Mainstream Security

Biometric technologies have been around for a number of years, predominately used for access control and time and attendance. For commercial enterprise and business environments, biometric solutions can enhance security programs by merging physical and logical security into one solution. This enables companies to use the same credentials for both…

Read Article

Integrated Solution for Banker’s Life Fieldhouse

Integrated Installation of the Year, 2010 Security Sales & Integration, July 2010 In a project demanding immense skill, Stanley CSS blends a multitude of old and new systems into a thoroughly integrated solution controllable from a single command point. The company marshals the full measure of its considerable resources to exceed the expectations of Indiana’s Conseco…

Read Article