Threshold
Logo for: Threshold Visitor Management Systems

About this blog

We write articles mainly about visitor management, which helps you to know who is (or has been) in your facility. It is just part of an organization’s physical security processes that protect people and property within and around a building or campus.

Categories

Search

Meet the bloggers

Paul Kazlauskas About me › My posts ›

Andrew Jones About me › My posts ›

Blog

"He had no visitor's badge"

Wednesday, April 23, 2014 by Andrew Jones

Placeholder"A Campus Response to Crisis," an article by Gregory Richter in the April 2014 issue of Security Management magazine, explains how a campus response team helps implement a university's violence prevention plan. "One typical sunny afternoon in south Florida in 2013," Mr. Richter's story begins, "a man entered the administration building of a private university. The man walked straight by the receptionist, announcing the name of the university employee he came to see, and emphatically stating ...

Read more 

"Secretaries Rule!"

Tuesday, April 22, 2014 by Andrew Jones

Wednesday, April 23, 2014, is Administrative Professionals Day (right in the middle of Administrative Professionals Week). Eight years ago Dave Arnold, a custodian at Brownstown Elementary School in Illinois, published a column titled "Secretaries Rule!" on the website of the National Education Association. It honored secretaries in general and his school's secretary, Shelly Thomason, in particular. "My neighborhood mechanic's five-year-old granddaughter use to help him file reports and ...

Read more 

10 Steps to Creating A Campus Security Master Plan

Friday, February 14, 2014 by Paul Kazlauskas

PlaceholderStep 1: Assemble Your Committee It is important to obtain support from those who will benefit and/or be affected by the introduction of new processes or change to existing procedures. Step 2: Determine What Must be Protected Committee members must classify what is critical to the operation of the campus. Step 3: Think About Your Long-term Needs The security master plan’s development should also include long-term system compatibility, communication infrastructure, product obsolescence ...

Read more 

Strong security measures adopted by Enfield, CT, schools

Monday, October 14, 2013 by Andrew Jones

Placeholder To improve security in its schools, the town of Enfield, CT, has adopted the principles of Crime Prevention Through Environmental Design (CPTED), as well as hired retired police officers as armed guards, according to Enfield Police Chief Carl Sferrazza. Chief Sferrazza spoke about these measures at last week’s Law Enforcement Appreciation Dinner in Plantsville, CT, sponsored by the Connecticut chapter of ASIS International, an organization for security professionals founded in 1955, ...

Read more 

The Basics of Internet Protocol Video

Monday, October 14, 2013 by Paul Kazlauskas

PlaceholderWhat Is IP Video? Internet protocol (IP) video uses the computer network infrastructure to transmit security video to recording and viewing stations and dispatch centers. In IP video systems, network cameras output a digitally encoded signal that can be transmitted over the network as data for viewing, storage and integration with other security solutions. Video management systems or software (VMS) allows the user to view the live video, call up recorded video, control the cameras connected ...

Read more 

«  previous  |  35 36 37 38 39 40 41 42 43 44  |  next  »Displaying posts 206 – 210 of 220