Security Technology Executive

JAN-FEB 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/107544

Contents of this Issue

Navigation

Page 14 of 35

Coming Soon on Retail: IP Migration Happening at Staggering Rate Here are some results of Te "CCTV in Retail 2012" report conducted by the Loss Prevention Research Council (LPRC) and commissioned by Axis Communications. It examined responses from 47 national and regional retailers: • Nearly 64 percent of stores have some form of IP-connected surveillance system — more than double the amount that said so in a similar 2010 study. • Of stores that still use analog-based surveillance systems, 43% say they have an IP migration strategy in place and another 21.4% say they want to create a plan. • Only 38.5% of respondents with IP systems said they have access to live video via a mobile device, however, 87.5% said they would ënd this capability useful. • 93% that have deployed IP video report a positive impact on operations and 40% report a positive impact on merchandising. • Non-loss prevention analytics were led by people counting (46.3%), dwell time analysis (20%) and heat mapping (18.2%). Slightly more than 38% use video analytics to detect point-of-sale fraud. Read the full story at www.securityinfowatch.com/10854433. Healthcare: 5 Steps to Start a Mobile Security Plan The U.S. Department of Health and Human Services (HHS) has launched a new education initiative and set of online tools to provide healthcare providers tips on ways to protect their patients' protected health information when using mobile devices such as laptops, tablets and smartphones: 1. Decide whether mobile devices will be used to access, receive, transmit, or store patients' health information: Understand the risks before you decide to allow the use of mobile devices. 2. Consider the risks when using mobile devices to transmit the health information: Conduct a risk analysis to identify threats and vulnerabilities. 3. Identify a mobile device risk management strategy: This will help your organization develop and implement mobile device safeguards to reduce risks, including an evaluation and regular maintenance of mobile device safeguards. 4. Develop, document, and implement mobile device policies: Topics to consider include mobile device management; using your own device (BYOD); restrictions on mobile device use; and mobile security or configuration settings. 5. Conduct mobile privacy and security awareness and ongoing training.  Read the full story at www.securityinfowatch.com/10845063. www.SecurityInfoWatch.com An in-depth look at PIAM SIW will examine the evolution of physical identity and access management (PIAM) from several angles, including how an anti-virus software giant used it to streamline access control and improve business operations. Look for this feature in February in our access control section: securityinfowatch.com/ products/access-identity    Webinar: The Benefits of Megapixel Tomas Carnevale, chairman and CEO of IP camera maker Sentry360, will join SIW for a free, one-hour webinar on Feb. 28 at 1 p.m. ET to talk about the beneëts megapixel surveillance and how to pick the right camera to ët your needs. securityinfowatch.com/webinars Webinar: Behavioral Recognition for Urban Safety Rob Clouse of BRS Labs explains behavioral recognition technology, and how to use it to spot suspicious behavior, locate key incidents in video archives and how organizations can use it to slash false alarms and better protect urban areas, government facilities and critical infrastructure. Te live webinar is Jan. 31, but if you miss it, be sure to catch a free replay: securityinfowatch.com/webinars Daily News Updates on Facebook & Twitter SecurityInfoWatch keeps you up to date on all the news that matters to security executives via social media. Search for us on both Facebook and Twitter. SECURITY TECHNOLOGY EXECUTIVE • January/February 2013 15

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JAN-FEB 2013