White Papers for Security Products and Technology

  • Experts on Proactive vs. Reactive Perimeter Security

    Anybody can be a victim of crime. The level of risk comes down to socio-economic triggers and local crime rates. However, even commercial properties in low-risk areas can be targeted and, once that happens, they immediately become high-risk. In this Mighty Guide, we've pulled in 8 Experts in the...
  • Genesee Valley School District

    Emergency Preparedness Goes Next Level Thanks to AtlasIED IPX Endpoints
  • Keep Your Employees Safe: 7 Ways To Prepare For Workplace Emergencies

    Millions of workplace injuries documented. This year's flu season the worst in nearly a decade. Dangerous perpetrators flooding headlines. Yet, statistics can’t prepare managers or employees for what to do when their workplace becomes a target for any type of critical issue. Crisis...
  • Fact or Fiction: How Crime Scene Investigations Really Work

    We’ve all seen movies and television shows like Law and Order that show how crime scene investigations work. Hollywood depicts the investigation process as seamless and the general public tends to get the wrong idea of how it actually works. Where does Hollywood get it right? Where do they tend...
  • National Renewable Energy Lab Strives for Safety, Security and Sustainability

    The National Renewable Energy Laboratory’s Campus of the Future blueprint calls for buildings that emphasize safety, security and sustainability. ASSA ABLOY is helping the National Renewable Energy Laboratory (NREL) meet challenges on these fronts by supplying door and hardware products in all...
  • Benefits of Announcements on the Login Portal for Education

    Let’s be honest: the benefits of announcements are nothing new in the world of education.  Many applications and service providers have the option to implement announcements. However, these features often do not integrate well with the login process. On top of that, announcements are often lost...
  • Opportunities in Access Control: Capitalizing on New RFID Applications

    Like most businesses, those in the security industry are constantly looking to increase revenue. For integrators, dealers, installers and manufacturers willing to think outside the box, a world of new access control opportunities are available. Access control now encompasses more than a card...
  • Flood Improvement and LID Modeling Using XPSWMM — a Case Study

    Rice University is located within the Harris Gully watershed, which covers a drainage area of approximately 5 square miles, consisting mostly of fully‐developed residential and light commercial land use. The area is also home to Hermann Park and Texas Medical Center, the largest medical center...