\u003c/p>"},"cl":"text pW2KkHRgsz","type":"text"},{"key":"e3jKqZnamkg","cl":"section","type":"section","children":["e8ZZSo_Y-32"]},{"key":"encrWUEHiic","content":{"text":"\u003cp >\u003cstrong >By Adam Stone,\u003c/strong> Contributing Writer\u003c/p>"},"cl":"text pW2KkHRgsz","type":"text"},{"key":"ecrYeoZEvsh","content":{"text":"\u003ch2 >With large campuses and high vehicle traffic, manufacturing and distribution facilities require a layered approach to securing the perimeter.\u003c/h2>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"e88Fz6B5Ene","content":{"text":"\u003ch1 >Securing the Perimeter in Manufacturing and Distribution\u003c/h1>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"e4ByVCiMXtB","cl":"section","type":"section","children":["encrWUEHiic","ecrYeoZEvsh","e88Fz6B5Ene"]},{"key":"epRTbMhJ6sH","content":{"src":{"key":"gOj_7c1rno","src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg"}},"cl":"image","type":"image"},{"key":"eAWExUFVSLj","content":{"text":"\u003cp >jackaldu / iStock / Getty Images Plus via Getty Images\u003c/p>"},"cl":"text pHfe1CCeee8","type":"text"},{"key":"eo5agDXXaPi","cl":"section","type":"section","children":["epRTbMhJ6sH","eAWExUFVSLj"]},{"key":"eyOLg8DUZTb","content":{"text":"\u003cp >At the Associated Grocers of New England, perimeter security is top of mind. With a nearly half-million square foot distribution center covering more than 70 acres, there’s a lot that can go wrong. “In addition to theft, we’re trying to prepare for many different threats,” says Jim Gaudet, CPP, Loss Prevention Assistant Manager.\u003c/p>\u003cp >“Some years back, we saw a big PETA demonstration against an egg farm up in Maine. It makes you think: What happens if they decide to show up here? Because we’re carrying those eggs in the warehouse,” he says.\u003c/p>\u003cp >For manufacturing and distribution facilities, the sheer size of the physical footprint, combined with constant vehicular and human movement, can make perimeter security a challenge. Experts in the field point to a number of key strategies for success.\u003c/p>\u003ch4 >Good Neighbors\u003c/h4>\u003cp >Gaudet thinks a lot about perception at the perimeter.\u003c/p>\u003cp >“You don’t want security so loud and aggressive that people are kind of turned off by it,” he says. “We are the largest employer in our town, and we don’t want to be seen as the biggest bully in town. We want to have a professional look; the guard booth is there and it’s obvious that it’s a guard booth, but it’s not ‘Fortress America.’ We don’t have armed guards. We don’t have dogs patrolling the perimeter.”\u003c/p>\u003cp >When strategizing his perimeter measures, Gaudet relies in part on the physical layout of the facility. This is an approach to crime prevention through environmental design, taking advantage of the campus’ natural features.\u003c/p>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"eSIz9yZBbeg","cl":"section","type":"section","children":["eyOLg8DUZTb"]},{"key":"ewiVoFXA_mo","content":{"text":"\u003cp >Charles LeBlanc, Principal and Project Executive, IMEG Corp. \u003cem >Image courtesy of LeBlanc\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"e8zvSPH9Oh9","content":{"src":{"ratio":0.75,"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pUAXdE57xN.jpg","key":"pUAXdE57xN"}},"cl":"image","type":"image"},{"key":"eY2wyjgeXiE","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F7Aw_X-41d.jpeg","ratio":1.3333333333333333,"key":"F7Aw_X-41d"}},"cl":"image","type":"image"},{"key":"ehWdrlNcEsO","content":{"src":{"ratio":0.6351531291611185,"key":"a_4-u57qHN","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a_4-u57qHN.jpg"}},"cl":"image","type":"image"},{"key":"erafTOOv1Id","content":{"src":{"key":"x9vmCusG53","url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x9vmCusG53.jpg","ratio":1.107645875251509}},"cl":"image","type":"image"},{"key":"eOhZSmCrKch","content":{"text":"\u003cp >James McDonald, Vice President of Global Security, Ceva Logistics\u003cem >. Image courtesy of McDonald\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"e5oXoL1noli","content":{"text":"\u003cp >Jim Gaudet, Loss Prevention Assistant Manager, Associated Grocers of New England\u003cem >. Image courtesy of Gaudet\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"eIOOwRhd3R7","content":{"text":"\u003cp >Brian Harrell, Chief Security Officer, AVANGRID\u003cem >. Image courtesy of Harrell\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"eGgG8Wi6Oez","content":{"text":"\u003cp >David Weingot, CEO, DMAC Security\u003cem >. Image courtesy of Weingot\u003c/em>\u003c/p>"},"cl":"text pJc0f1yT2IX","type":"text"},{"key":"eVfJPyklsu8","content":{"src":{"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X6HJe6eL38.png","ratio":1,"key":"X6HJe6eL38"}},"cl":"image","type":"image"},{"key":"e_GPIJthzYU","cl":"section","type":"section","children":["ewiVoFXA_mo","e8zvSPH9Oh9","eY2wyjgeXiE","ehWdrlNcEsO","erafTOOv1Id","eOhZSmCrKch","e5oXoL1noli","eIOOwRhd3R7","eGgG8Wi6Oez","eVfJPyklsu8"]},{"key":"eGLVtOHC-3o","content":{"text":"\u003cp >“We’re in a good place design-wise because we built this place on an old sandpit bordered by a river that runs down below our property. Those physical features give us a natural boundary,” he says. “We also have big chunks of granite creating a natural border on a hill.”\u003c/p>\u003cp >The Associated Grocers of New England campus has other perimeter security defenses in place as well, including a guardhouse that is set up so security personnel face the traffic coming into the property. “Whether it’s truck traffic bound for the back of the building or visitors or employees heading for the front — that’s monitored from the guard booth all the time, and it’s recorded on video,” he says.\u003c/p>\u003cp >In addition, the campus security staff have established policies and procedures with an eye toward managing what happens at the perimeter. “You can’t just come in. You have to have an appointment to show up here, to get past the guardhouse,” Gaudet says. “Trucks are loaded or offloaded and they’re checked out on the way out. Our drivers can’t even drive their own vehicles out back. So perimeter security becomes part of the protection in depth.”\u003c/p>\u003ch4 >Creating Sight Lines\u003c/h4>\u003cp >The nature of manufacturing and distribution is such that the perimeter demands special attention. That fence or property line can be sprawling, making it impractical for security teams to rely solely on human inspection or guard tours. Additionally, the pace and activity at many manufacturing and distribution centers necessitate 24/7 perimeter protection — a difficult task for security professionals to manage. \u003c/p>\u003cp >“In security, we try to create sight lines that increase the chances for detecting when someone is doing something nefarious,” says Charles LeBlanc, P.E., CPP, Principal and Project Executive with engineering design company IMEG Corp.\u003c/p>\u003cp >“Loading docks and fence lines represent a significant challenge to securing manufacturing and logistics facilities and are often a significant security concern for these facilities since the trucks obstruct sight lines and can hide nefarious activity,” he says.\u003c/p>\u003cp >Technology can help here, expanding the range of view while also reducing the need for guard tours. At Ceva Logistics, which operates some 180 facilities in North America, Vice President of Global Security James McDonald leans heavily on technology to secure the perimeter.\u003c/p>\u003cp >“We are leveraging technology and automation to significantly reduce or eliminate recurring contract guard spend,” McDonald says. “We use a reputable enterprise camera manufacturer that is heavily into video analytics, artificial intelligence (AI) technology and facial recognition. The cameras use cutting-edge technology to geo-fence a particular area by utilizing self-learning analytics that never sleeps.”\u003c/p>\u003cp >Ceva Logistics surveillance technology constantly reviews multiple camera feeds for potential events or exceptions. “Once the site is learned through the AI technology and analytics, if there’s an exception, the system notifies our Global Security Operation Center (GSOC) so a member of our staff can easily determine whether a true threat exists and take immediate action if needed,” he says.\u003c/p>\u003cp >In pursuing this approach, McDonald has seen a strong return on investment. “With this type of cutting-edge technology, we are able to implement a much better solution at a lower cost,” he says.\u003c/p>\u003ch4 >Vetting Process\u003c/h4>\u003cp >At DMAC Security, which secures container yards, warehouses and other logistics and manufacturing sites, Founder and Chief Executive Officer (CEO) David Weingot is using technology at the perimeter specifically in support of tagging and tracking incoming and outgoing people, products and vehicles.\u003c/p>\u003cp >“It’s critical to have a vetting process in place that identifies who belongs there and who doesn’t, whether that be vehicle traffic or pedestrian traffic,” Weingot says. The vetting process can be as simple as window decals to identify approved visitors.\u003c/p>\u003cp >“That’s great for routine, recurring traffic. The process provides a quick identifier for the officer and security team to quickly vet who’s coming and going, and to stop the vehicle and inquire why they’re here, if that is what is needed,” he says.\u003c/p>\u003cp >Technology, such as license plate readers, can also help manage access at the perimeter, particularly with facilities that have high vehicle traffic, Weingot says. He adds that license plate technology should be integrated with do not enter lists or those people that have been identified as threats. “It [should also be] integrated with the human operation, so that if there’s an exception, the officer is alerted and can respond,” he says.\u003c/p>\u003cp >Weingot also uses AI and analytics integrated with camera systems to augment human security teams. “In cases where personnel are limited, the AI enables the officers to be used at the right time, in the right place,” he says. “We’ve seen facilities that have gone from six full-time officers down to four by using technology integrated into the overall security program.”\u003c/p>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"e8UfU9KaNVp","cl":"section","type":"section","children":["eGLVtOHC-3o"]},{"key":"e-Ga9m9Z_di","content":{"src":{"key":"90JYc1i8qc","ratio":1.454292343387471,"url":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/90JYc1i8qc.jpg"}},"cl":"image","type":"image"},{"key":"epyBaNHoFnu","content":{"text":"\u003cp >1933bkk / [iStock / Getty Images Plus via Getty Images\u003c/p>"},"cl":"text pHfe1CCeee8","type":"text"},{"key":"emmae8i1FtI","cl":"section","type":"section","children":["e-Ga9m9Z_di","epyBaNHoFnu"]},{"key":"epFud-LgHUh","content":{"text":"\u003ch4 >The Human Role\u003c/h4>\u003cp >Even with all this technology in place, humans still have a key role in the perimeter operation.\u003c/p>\u003cp >At AVANGRID, an energy firm that owns 10 utility companies, Chief Security Officer (CSO) Brian Harrell says security personnel are the backbone of the perimeter efforts.\u003c/p>\u003cp >“Because of regulatory mandates, we constantly inspect our walls, gates and fencing. We discovered early on that we needed to use quality components given the harsh weather associated with New England,” he says.\u003c/p>\u003cp >To ensure those components are up to snuff, “we regularly patrol our infrastructure with proprietary staff, guard contractors, private security and law enforcement resources,” Harrell says.\u003c/p>\u003cp >Gaudet, too, looks to regular patrols as a key element of his defensive apparatus. “You can put up all the physical features you want, but the security team still needs to be monitoring that,” he says.\u003c/p>\u003cp >“We have traditional security fencing around with barbed wire and some access gates along the way. But the officers still have to patrol that perimeter on a regular basis, check the locks, and make sure they’ll open if we need them to open,” he says. “You can design tour descriptions to say, ‘This is what you should be looking at.’ For instance, when you look at the fence, you can sometimes tell if someone was on the opposite side trying to scale it because you’ll see the impression with chain link fences.”\u003c/p>\u003cp >In his organizations, personnel drive the perimeter at least once a day, with at least one additional tour at night and one during the day. “They have set tours, a schedule that they’re supposed to hit. They’re checking the integrity of the perimeter, looking physically at the barriers, looking at the fence and the gates. They’re also looking for other things like product staged on the other side of the fence,” he says.\u003c/p>\u003ch4 >Nuts and Bolts\u003c/h4>\u003cp >Finally, though it certainly should be one of the first considerations, rather than the last — is looking at the integrity of the actual fence or perimeter surrounding the campus. Often overlooked, the integrity of the fence line can be a make-or-break element in an effective perimeter security strategy. For manufacturing and distribution facilities with such large footprints, the fence serves as the first line of defense.\u003c/p>\u003cp >“The fence line creates a clear, secure boundary and allows security staff to focus on this critical boundary,” LeBlanc says. “And yet, fence lines are hard to maintain because they get damaged. Drainage, for example, will undermine the foundations underneath the fence line or create gaps in the fence line.”\u003c/p>\u003cp >With this in mind, “it’s important to create a fence line that’s secure in the first place and will stay secure. When you’re building the fence, think about how the water will come off the facility and off of all the pavement,” he says. “Whenever we do assessments, we look for damaged fences or erosion gaps under the fence that are big enough where people can climb underneath them and get into the facility undetected.”\u003c/p>\u003cp >Conventional wisdom has long held that “good fences make good neighbors.” While a strong personnel deployment strategy and robust technology are essential, this fundamental truth remains the bedrock of perimeter security for manufacturing and distribution.\u003c/p>"},"cl":"text pd3XDPpkiFS","type":"text"},{"key":"ej-GfgRew_A","cl":"section","type":"section","children":["epFud-LgHUh"]},{"key":"e-BjU26pBNh","content":{"src":"6n17seTnEB"},"cl":"image","type":"image"},{"key":"eibkrBjhPfU","content":{"buttons":{"linkedin":true,"twitter":true,"facebook":true,"mail":true},"theme":"colors"},"cl":"w1c12qdsln-oon","type":"w1c12qdsln-oon","icons":{"facebook":[448,512,"M448 56.7v398.5c0 13.7-11.1 24.7-24.7 24.7H309.1V306.5h58.2l8.7-67.6h-67v-43.2c0-19.6 5.4-32.9 33.5-32.9h35.8v-60.5c-6.2-.8-27.4-2.7-52.2-2.7-51.6 0-87 31.5-87 89.4v49.9h-58.4v67.6h58.4V480H24.7C11.1 480 0 468.9 0 455.3V56.7C0 43.1 11.1 32 24.7 32h398.5c13.7 0 24.8 11.1 24.8 24.7z"],"google":[496,512,"M248 8C111.1 8 0 119.1 0 256s111.1 248 248 248 248-111.1 248-248S384.9 8 248 8zm-70.7 372c-68.8 0-124-55.5-124-124s55.2-124 124-124c31.3 0 60.1 11 83 32.3l-33.6 32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9 0-77.2 35.5-77.2 78.1s34.2 78.1 77.2 78.1c32.6 0 64.9-19.1 70.1-53.3h-70.1v-42.6h116.9c1.3 6.8 1.9 13.6 1.9 20.7 0 70.8-47.5 121.2-118.8 121.2zm230.2-106.2v35.5H372v-35.5h-35.5v-35.5H372v-35.5h35.5v35.5h35.2v35.5h-35.2z"],"twitter":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm-48.9 158.8c.2 2.8.2 5.7.2 8.5 0 86.7-66 186.6-186.6 186.6-37.2 0-71.7-10.8-100.7-29.4 5.3.6 10.4.8 15.8.8 30.7 0 58.9-10.4 81.4-28-28.8-.6-53-19.5-61.3-45.5 10.1 1.5 19.2 1.5 29.6-1.2-30-6.1-52.5-32.5-52.5-64.4v-.8c8.7 4.9 18.9 7.9 29.6 8.3a65.447 65.447 0 0 1-29.2-54.6c0-12.2 3.2-23.4 8.9-33.1 32.3 39.8 80.8 65.8 135.2 68.6-9.3-44.5 24-80.6 64-80.6 18.9 0 35.9 7.9 47.9 20.7 14.8-2.8 29-8.3 41.6-15.8-4.9 15.2-15.2 28-28.8 36.1 13.2-1.4 26-5.1 37.8-10.2-8.9 13.1-20.1 24.7-32.9 34z"],"mail":[512,512,"M256 8C118.941 8 8 118.919 8 256c0 137.059 110.919 248 248 248 48.154 0 95.342-14.14 135.408-40.223 12.005-7.815 14.625-24.288 5.552-35.372l-10.177-12.433c-7.671-9.371-21.179-11.667-31.373-5.129C325.92 429.757 291.314 440 256 440c-101.458 0-184-82.542-184-184S154.542 72 256 72c100.139 0 184 57.619 184 160 0 38.786-21.093 79.742-58.17 83.693-17.349-.454-16.91-12.857-13.476-30.024l23.433-121.11C394.653 149.75 383.308 136 368.225 136h-44.981a13.518 13.518 0 0 0-13.432 11.993l-.01.092c-14.697-17.901-40.448-21.775-59.971-21.775-74.58 0-137.831 62.234-137.831 151.46 0 65.303 36.785 105.87 96 105.87 26.984 0 57.369-15.637 74.991-38.333 9.522 34.104 40.613 34.103 70.71 34.103C462.609 379.41 504 307.798 504 232 504 95.653 394.023 8 256 8zm-21.68 304.43c-22.249 0-36.07-15.623-36.07-40.771 0-44.993 30.779-72.729 58.63-72.729 22.292 0 35.601 15.241 35.601 40.77 0 45.061-33.875 72.73-58.161 72.73z"],"messenger":[448,512,"M224 32C15.9 32-77.5 278 84.6 400.6V480l75.7-42c142.2 39.8 285.4-59.9 285.4-198.7C445.8 124.8 346.5 32 224 32zm23.4 278.1L190 250.5 79.6 311.6l121.1-128.5 57.4 59.6 110.4-61.1-121.1 128.5z"],"linkedin":[448,512,"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"],"reddit":[512,512,"M440.3 203.5c-15 0-28.2 6.2-37.9 15.9-35.7-24.7-83.8-40.6-137.1-42.3L293 52.3l88.2 19.8c0 21.6 17.6 39.2 39.2 39.2 22 0 39.7-18.1 39.7-39.7s-17.6-39.7-39.7-39.7c-15.4 0-28.7 9.3-35.3 22l-97.4-21.6c-4.9-1.3-9.7 2.2-11 7.1L246.3 177c-52.9 2.2-100.5 18.1-136.3 42.8-9.7-10.1-23.4-16.3-38.4-16.3-55.6 0-73.8 74.6-22.9 100.1-1.8 7.9-2.6 16.3-2.6 24.7 0 83.8 94.4 151.7 210.3 151.7 116.4 0 210.8-67.9 210.8-151.7 0-8.4-.9-17.2-3.1-25.1 49.9-25.6 31.5-99.7-23.8-99.7zM129.4 308.9c0-22 17.6-39.7 39.7-39.7 21.6 0 39.2 17.6 39.2 39.7 0 21.6-17.6 39.2-39.2 39.2-22 .1-39.7-17.6-39.7-39.2zm214.3 93.5c-36.4 36.4-139.1 36.4-175.5 0-4-3.5-4-9.7 0-13.7 3.5-3.5 9.7-3.5 13.2 0 27.8 28.5 120 29 149 0 3.5-3.5 9.7-3.5 13.2 0 4.1 4 4.1 10.2.1 13.7zm-.8-54.2c-21.6 0-39.2-17.6-39.2-39.2 0-22 17.6-39.7 39.2-39.7 22 0 39.7 17.6 39.7 39.7-.1 21.5-17.7 39.2-39.7 39.2z"],"pinterest":[384,512,"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z"]}},{"key":"eoQq3f5QIxJ","cl":"section","type":"section","children":["e-BjU26pBNh","eibkrBjhPfU"]},{"key":"emU3gjYxeW9","cl":"section","type":"section"},{"key":"e81ETLrVjB2","content":{"text":"\u003cp >august 2022 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\" >SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"cl":"text","type":"text"},{"key":"eb2itOvwJ51","content":{"menu":"MaSZcnCk1t"},"cl":"w1bn5r0s80-1477","type":"w1bn5r0s80-1477"},{"key":"ebvJ7UENYoI","cl":"section","type":"section","children":["e81ETLrVjB2","eb2itOvwJ51"]},{"key":"eSp0JDTTNx5","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"e-WqKz1Ka7a","content":{"link":{"mode":2}},"cl":"external-link","type":"external-link"},{"key":"e12xxO64Vku","content":{"link":{"href":"https://www.securitymagazine.com/","mode":2,"target":true}},"cl":"external-link","type":"external-link"},{"key":"e4Ndfc7RP4H","content":{"src":"MP-cejsYH"},"cl":"image","type":"image","actions":["eSp0JDTTNx5","e-WqKz1Ka7a","e12xxO64Vku"]},{"key":"eUUDBmoSI2p","cl":"section","type":"section","children":["e4Ndfc7RP4H"]},{"key":"p5FudK9tdUp","children":["euzakHm6nsj","eGg5WGAICqK","e3jKqZnamkg","e4ByVCiMXtB","eo5agDXXaPi","eSIz9yZBbeg","e_GPIJthzYU","e8UfU9KaNVp","emmae8i1FtI","ej-GfgRew_A","eoQq3f5QIxJ","emU3gjYxeW9","ebvJ7UENYoI","eUUDBmoSI2p"]},{"key":"eqGG3_QaZ2x","content":{"menu":"HZWT-8fEWW","nextText":"Next ","prevText":" Previous"},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"eonLTk7_cka","content":{"nextText":"Next ","menu":"HZWT-8fEWW","prevText":" Previous"},"cl":"w7Ty9ifjBD","type":"w7Ty9ifjBD","icons":{"left":[448,512,"M400 480H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48zm-60-268H224v-70.9c0-10.7-13-16.1-20.5-8.5L89.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[448,512,"M48 32h352c26.5 0 48 21.5 48 48v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V80c0-26.5 21.5-48 48-48zm60 268h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H108c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]}},{"key":"fixed","children":["eqGG3_QaZ2x","eonLTk7_cka"],"visibility":{"eqGG3_QaZ2x":true,"eonLTk7_cka":{"pBFjXAmCaK-":true}}},{"key":"ed0gm06wiSY-ern7jatufsh","content":{"link":{"mode":0,"page":"pBFjXAmCaK-"}},"cl":"external-link","type":"external-link"},{"key":"egYHI8kXA5v-ern7jatufsh","content":{"shapeId":"3m9Hfk7mIq"},"cl":"shape","type":"shape","actions":["ed0gm06wiSY-ern7jatufsh"],"fromModel":"egYHI8kXA5v"}],"pages":[{"key":"p2cA2D1WKjy","title":"AD-Adams Rite","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_aeB1jE9jE.png","path":"ad-adams-rite"},{"key":"p5FudK9tdUp","title":"Cover Story - Perimeter Strategies","desc":"Manufacturing and distribution facilities require a layered approach to perimeter security that includes people, technology, processes and procedures.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg","path":"cover-story---perimeter-strategies"},{"key":"p5fvvR81jB-","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/26RTZDu0__.jpg","path":"classifieds"},{"key":"p6ztMv_R5Ke","title":"AD-House Security 500 Conference","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9L5zS0HPNT.png","path":"ad-house-security-500-conference"},{"key":"p7Hl51C0iAG","title":"AD-House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AIuXvGxB0r.png","path":"ad-house-refer-a-friend"},{"key":"p9kRw1Tinjt","title":"Classifieds Control Command Ad","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/26RTZDu0__.jpg","path":"classifieds-control-command-ad"},{"key":"p9z14mOFwdF","title":"AD-Webinar Northland Controls","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XNQGr4RuHI.png","path":"ad-webinar-northland-controls"},{"key":"pA6PUleeNyo","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yvbPTJBoI2.jpg","path":"advertising-index"},{"key":"pAiNEnPBD1z","title":"Cost Center to Value Add Feature","desc":"Security departments are traditionally seen as cost centers. Applying investigative techniques across the organization can shift security to a value add.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/FnqXpBbhT_.jpg","path":"cost-center-to-value-add-feature"},{"key":"pBFjXAmCaK-","title":"Security August 2022","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/9yP9rfxBIv.png","path":"","index":true},{"key":"pE-fvGsOhwG","title":"AD-Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1b1FlnJ_X2.jpg","path":"ad-mission-500"},{"key":"pFjdYfEmy4S","title":"AD-AXIS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kCwMrJ6SJM.jpg","path":"ad-axis"},{"key":"pFyWFFwJl_V","title":"Security Talk Column","desc":"By focusing on low-cost, high-impact initiatives, security leaders can build comprehensive programs with little resources.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ONv2Pyu-xj.jpg","path":"security-talk-column"},{"key":"pGP-MpqGifc","title":"Cyber Tactics Column","desc":"Small- and medium-sized businesses struggle with misconceptions when it comes to reducing their threat vectors. Learn the importance of protection along with where to start.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/k77i5_iqxh.jpg","path":"cyber-tactics-column"},{"key":"pHnTCYD6m7X","title":"AD-House SBS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_aJFUmtUt7.png","path":"ad-house-sbs"},{"key":"pIb1EtZmUM1","title":"Education & Training Column","desc":"Security leaders can support homeless people by training staff in de-escalation, setting clear facility safety standards, and working with external partners.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/drgYEh2Nak.jpg","path":"education-training-column"},{"key":"pIwJSvIWbkf","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ecQw3m5AnR.png","path":"online-contents"},{"key":"pJpvFTdoDnF","title":"AD-House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aLY5xMo-pt.jpg","path":"ad-house-security-enewsletter"},{"key":"pKRkZuQOZQr","title":"Product Spotlight","desc":"A roundup of some of the new security solutions to be displayed and demonstrated at GSX","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RmYXt1BpOA.jpg","path":"product-spotlight"},{"key":"pOFdLocjAzj","title":"Dave Komendat Profile Feature","desc":"Dave Komendat, VP and CSO of Boeing, prepares to retire this year; he sits down with Security magazine to reflect on the formative moments of his career.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sGPxLrAbHp.jpg","path":"dave-komendat-profile-feature"},{"key":"pSkOTHPjEUM","title":"AD-House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/V0EG2soW0L.jpg","path":"ad-house-security-renewal"},{"key":"pUUu_88Y-VF","title":"Insider Threat Feature","desc":"Understanding how bad actors recruit and develop employees to share information can allow security leaders to harden their organizations against the threat of social engineering.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/oMuAUaQFXq.jpg","path":"insider-threat-feature"},{"key":"pX2abOyvPe_","title":"eMagazine Help Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IfqI_okini.jpg","path":"emagazine-help-guide"},{"key":"p_8wJSlY8Oh","title":"Career Intelligence Column","desc":"A security leader’s decisions and actions when it comes to DEI practices send a powerful message to the organization and the industry, and impact both reputation and personal brand. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OHj7J47Y-s.jpg","path":"career-intelligence-column"},{"key":"paf643IXF9J","title":"AD-XXX","cover":"https://cdn.vev.design/cover/vgcYi4k7fx/paf643IXF9J/gguwr_1200.jpg","path":"ad-xxx"},{"key":"pcSKPY0Ym8t","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/KQ2kk48rkh.jpg","path":"staff-listing"},{"key":"pdQAnhsmmw8","title":"Workplace Violence Feature","desc":"Access control, weapons detection and visitor management systems are just some of the security technologies helping to prevent healthcare workplace violence.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/rA0SAXoAgL.jpg","path":"workplace-violence-feature"},{"key":"pgTzr8rVX_l","title":"AD-House BNP Engage","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gsO4_Uio6J.png","path":"ad-house-bnp-engage"},{"key":"plp2xACzZ-C","title":"AD-DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/E3QbDgbMo1.jpg","path":"ad-dks"},{"key":"pnS8CZffHWO","title":"AD-Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CBPJenmFop.png","path":"ad-altronix"},{"key":"po9tXpSUvDS","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a0R-YQkxfE.jpg","path":"table-of-contents"},{"key":"ppEDbuMxu6f","title":"Global News Department","desc":"The FBI’s 2021 Active Shooter Incidents in the U.S. reveals key trends involving active shooters; learn about 4 levels of cybersecurity resilience. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RGeTe-Dm18.jpg","path":"global-news-department"},{"key":"ppXVHJehjWY","title":"AD-Webinar Everbridge","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bVfwcn_ZWa.png","path":"ad-webinar-everbridge"},{"key":"pqGPcvwC-eP","title":"AD-Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uqC9-SSqBU.png","path":"ad-speco"},{"key":"prR-_eLFQwb","title":"AD-House Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Mpyjgi7_1t.jpg","path":"ad-house-bookstore"},{"key":"psqWUaVebu0","title":"Leadership & Management Column","desc":"Those who are willing to lead take the most blows. No one has taken more blows lately than security expert and former Marine Lou Mizell.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QY8qxEaz99.jpg","path":"leadership-management-column"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"]},"images":{"6n17seTnEB":{"meta":{"photographer":"","description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6n17seTnEB.svg","srcset":[]},"90JYc1i8qc":{"meta":{"width":3134,"height":2155,"description":"Automotive tire, Road surface, Wheel, Building, Asphalt, Wood, Truck, Tread, House","photographer":"1933bkk / [iStock / Getty Images Plus via Getty Images"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/90JYc1i8qc.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/90JYc1i8qc.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/90JYc1i8qc.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/90JYc1i8qc.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/90JYc1i8qc.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/90JYc1i8qc.jpg",2560]]},"F7Aw_X-41d":{"meta":{"description":"Harrell","width":1000,"photographer":"Image courtesy of Harrell","height":750},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F7Aw_X-41d.jpeg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F7Aw_X-41d.jpeg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F7Aw_X-41d.jpeg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F7Aw_X-41d.jpeg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F7Aw_X-41d.jpeg",1000]]},"MP-cejsYH":{"meta":{"description":"Logo, Font, Text"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/500.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/MP-cejsYH/2100.png",2100]]},"SWKHZxvQvf":{"meta":{"photographer":"","description":"Share This"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"X6HJe6eL38":{"meta":{"photographer":"Image courtesy of Weingot","description":"David Weingot","width":1080,"height":1080},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X6HJe6eL38.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X6HJe6eL38.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X6HJe6eL38.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X6HJe6eL38.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/X6HJe6eL38.png",1080]]},"a_4-u57qHN":{"meta":{"width":477,"height":751,"photographer":"Image courtesy of Gaudet","description":"Gaudet"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a_4-u57qHN.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a_4-u57qHN.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a_4-u57qHN.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/a_4-u57qHN.jpg",751]]},"gOj_7c1rno":{"meta":{"description":"Transport hub, Land lot, Urban design, Air travel, Residential area, Sky, Infrastructure, Building, Neighbourhood, Plant","width":5464,"height":3640,"photographer":"jackaldu / iStock / Getty Images Plus via Getty Images"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/gOj_7c1rno.jpg",2560]]},"pUAXdE57xN":{"meta":{"description":"LeBlanc","photographer":"Image courtesy of LeBlanc","width":3024,"height":4032},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pUAXdE57xN.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pUAXdE57xN.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pUAXdE57xN.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pUAXdE57xN.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pUAXdE57xN.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pUAXdE57xN.jpg",2560]]},"vNWK15VOrT":{"meta":{"width":469,"photographer":"","height":149,"description":"Security eMagazines"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"x9vmCusG53":{"meta":{"height":994,"description":"Jim Mc Donald","photographer":"Image courtesy of Jim Mc Donald","width":1101},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x9vmCusG53.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x9vmCusG53.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x9vmCusG53.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x9vmCusG53.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/x9vmCusG53.jpg",1101]]}},"pkg":{"w7Ty9ifjBD":"pEIMfUpQ6oy","w1bopak0jo-n2r":"pgxSSDpDPRe","text":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","external-link":"basic","shape":"basic","frame":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","image":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","section":"basic","w1c12qdsln-oon":"pjbqXRuSWpE"},"menus":{"DDv_ci7f2L":{"children":[],"title":"Menu #7","key":"DDv_ci7f2L"},"HZWT-8fEWW":{"children":[{"link":{"mode":0,"page":"pBFjXAmCaK-"},"key":"KJ8xkRQmNC","title":"Security August 2022"},{"key":"87CTa5rF2H","link":{"mode":0,"page":"plp2xACzZ-C"},"title":"AD-DKS"},{"link":{"mode":0,"page":"po9tXpSUvDS"},"key":"O-bKhavR_M","title":"Table of Contents"},{"link":{"page":"pqGPcvwC-eP","mode":0},"title":"AD-Speco","key":"9l0mVbp7iL"},{"title":"Online Contents","key":"hvcTCTnZZf","link":{"mode":0,"page":"pIwJSvIWbkf"}},{"link":{"page":"pFyWFFwJl_V","mode":0},"key":"J_D4LsMZzr","title":"Security Talk Column"},{"link":{"mode":0,"page":"pnS8CZffHWO"},"key":"QmUEsNc9rU","title":"AD-Altronix"},{"title":"Global News Department","key":"FMri7qKD6T","link":{"page":"ppEDbuMxu6f","mode":0}},{"key":"SOEh5gMqF0","title":"Cover Story - Perimeter Strategies","link":{"mode":0,"page":"p5FudK9tdUp"}},{"title":"AD-Adams Rite","key":"qszpNnt-1t","link":{"page":"p2cA2D1WKjy","mode":0}},{"link":{"page":"pOFdLocjAzj","mode":0},"key":"Ph5m4U5YoV","title":"Dave Komendat Profile Feature"},{"key":"n6fiJXmOVZ","link":{"page":"p6ztMv_R5Ke","mode":0},"title":"AD-Security 500 Conference"},{"key":"4uxz4cfv90","link":{"page":"pAiNEnPBD1z","mode":0},"title":"Cost Center to Value Add Feature"},{"title":"AD-Mission 500","link":{"page":"pE-fvGsOhwG","mode":0},"key":"cl9Cx9FRpD"},{"key":"TmaNk7C5xO","title":"Insider Threat Feature","link":{"page":"pUUu_88Y-VF","mode":0}},{"link":{"page":"ppXVHJehjWY","mode":0},"title":"AD-Webinar Everbridge","key":"BT49GR_c2l"},{"title":"Workplace Violence Feature","link":{"mode":0,"page":"pdQAnhsmmw8"},"key":"pXOyozlcuu"},{"link":{"mode":0,"page":"p_8wJSlY8Oh"},"key":"AnTVvLKyNA","title":"Career Intelligence Column"},{"title":"AD-Bookstore","key":"q7hsRyhFTH","link":{"page":"prR-_eLFQwb","mode":0}},{"link":{"page":"psqWUaVebu0","mode":0},"key":"Dwm7uqbRSe","title":"Leadership & Management Column"},{"title":"AD-Webinar Northland Controls","link":{"page":"p9z14mOFwdF","mode":0},"key":"9wmTyCuRWA"},{"key":"nXcfvoU5DL","title":"AD-Security eNewsletter","link":{"mode":0,"page":"pJpvFTdoDnF"}},{"link":{"page":"pGP-MpqGifc","mode":0},"key":"2KDxxIOZ0T","title":"Cyber Tactics Column"},{"key":"CSnxnvJRQo","title":"AD-Security Renewal","link":{"page":"pSkOTHPjEUM","mode":0}},{"link":{"page":"pIb1EtZmUM1","mode":0},"key":"QanwuJMP-6","title":"Education & Training Column"},{"key":"Ls83ge1xXL","title":"AD-BNP Engage","link":{"mode":0,"page":"pgTzr8rVX_l"}},{"title":"AD-SBS","key":"hSizdBDmdV","link":{"page":"pHnTCYD6m7X","mode":0}},{"title":"Product Spotlight","link":{"mode":0,"page":"pKRkZuQOZQr"},"key":"85Q2AAI1RV"},{"link":{"page":"p7Hl51C0iAG","mode":0},"key":"qz8ThESJNT","title":"AD-Refer a Friend"},{"title":"Classifieds","key":"1um0llyCQ7","link":{"page":"p5fvvR81jB-","mode":0}},{"title":"Advertising Index","link":{"page":"pA6PUleeNyo","mode":0},"key":"wsVmIRIXbs"},{"link":{"mode":0,"page":"pFjdYfEmy4S"},"key":"kN_YQ7LawZ","title":"AD-AXIS"},{"title":"Staff Listing","key":"RYQ-OC2xUz","link":{"page":"pcSKPY0Ym8t","mode":0}},{"title":"eMagazine Help Guide","link":{"page":"pX2abOyvPe_","mode":0},"key":"VhEnadNILl"}],"title":"Advertiser & ARROWS MENU","key":"HZWT-8fEWW"},"MaSZcnCk1t":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/aao5vty9opgc4v1/SEC_Aug-2022_Full-Issue.pdf?dl=1"},"children":[],"key":"Lpne3xBspf","title":"DOWNLOAD ISSUE"},{"key":"FpibzECdPl","title":"BACK ISSUES","link":{"href":"https://www.securitymagazine.com/emagazine","mode":2,"target":true}}],"key":"MaSZcnCk1t"},"VKOOSIUEfw":{"children":[{"title":"Most Influential 2022 Intro","children":[],"link":{"mode":0},"key":"VQJnkJ6EyX"},{"key":"b1sOrWTWb8","title":"Erik Antons","link":{"mode":0}},{"key":"8X9x83O40O","children":[],"title":"Wendy Bashnan","link":{"mode":0}},{"key":"2ztDiDh787","title":"Lauren Bean Buitta","link":{"mode":0}},{"link":{"mode":0},"key":"NKQCi5jV9M","children":[],"title":"Julie Bowen"},{"key":"d9y8ElGbL1","link":{"mode":0},"title":"Sandi Davies"},{"key":"mhdk32fUBV","title":"Shannon Furiel-Mureithi","link":{"mode":0}},{"key":"xpkcxctb5R","link":{"mode":0},"title":"Michael Garcia"},{"link":{"mode":0},"key":"6NX6Fe_yws","title":"Martin Gill"},{"key":"u9IT0g89eg","title":"Peter Hunt","link":{"mode":0}},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"key":"d47fYs77Rj","title":"Andree Rose","link":{"mode":0}},{"key":"5lp_KwYaiJ","link":{"mode":0},"title":"Gordon Snow"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[],"title":"HOME BUTTON MENU","key":"fSPzLGr8R5"},"qvTd3DBOll":{"children":[{"link":{"mode":0,"page":"pBFjXAmCaK-"},"title":"HOME","key":"FkKfSckLri"},{"title":"CONTENTS","children":[{"link":{"page":"po9tXpSUvDS","mode":0},"key":"2Bb_AqdORZ","title":"Table of Contents"},{"key":"8Ah_s0wvbw","title":"Online Contents","link":{"mode":0,"page":"pIwJSvIWbkf"}}],"key":"up_zO2a1pV","link":{"mode":0}},{"children":[{"title":"Cover Story - Perimeter Strategies","key":"NBX0EZFvrT","link":{"mode":0,"page":"p5FudK9tdUp"}},{"title":"Dave Komendat Profile","key":"qo-NvFWI0k","link":{"page":"pOFdLocjAzj","mode":0}},{"title":"Cost Center to Value Add","key":"yQtb8JhhM3","link":{"mode":0,"page":"pAiNEnPBD1z"}},{"key":"q4AsreNJ5I","title":"Insider Threat","link":{"page":"pUUu_88Y-VF","mode":0}},{"title":"Workplace Violence","key":"cOaLiCRHKp","link":{"mode":0,"page":"pdQAnhsmmw8"}},{"link":{"mode":0,"page":"pKRkZuQOZQr"},"title":"Product Spotlight","key":"LvFR5LV8Ot"}],"title":"FEATURES","link":{"mode":0},"key":"AATLS-kOea"},{"link":{"mode":0},"children":[{"title":"Security Talk","link":{"mode":0,"page":"pFyWFFwJl_V"},"key":"rJQwl09FS5"},{"key":"WIvMhNUSxG","title":"Career Intelligence","link":{"page":"p_8wJSlY8Oh","mode":0}},{"title":"Leadership & Management","key":"En7t01a32i","link":{"page":"psqWUaVebu0","mode":0}},{"title":"Cyber Tactics","link":{"mode":0,"page":"pGP-MpqGifc"},"key":"tVAvyHtmg2"},{"title":"Education & Training","key":"91KNtUy91w","link":{"mode":0,"page":"pIb1EtZmUM1"}}],"title":"COLUMNS","key":"Xgoc2XXtGK"},{"title":"DEPARTMENTS","link":{"mode":0},"children":[{"title":"Global News & Analysis","key":"0Iy2X1DSvK","link":{"page":"ppEDbuMxu6f","mode":0}},{"title":"Classified Advertising","key":"k9lfraLOpX","link":{"page":"p5fvvR81jB-","mode":0}},{"key":"t14sXl_qHn","link":{"page":"pA6PUleeNyo","mode":0},"title":"Advertising Index"},{"title":"Staff Listing","key":"xj466QGLwn","link":{"mode":0,"page":"pcSKPY0Ym8t"}},{"key":"vy6NOvclbE","link":{"mode":0,"page":"pX2abOyvPe_"},"title":"e-Magazine Help Guide"}],"key":"B9bkselmlh"}],"title":"Main menu GOLD & SLIDE OUT","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"Advertiser & ARROWS MENU","children":[{"link":{"mode":0},"key":"P2sN3mWdsc","title":"AD - xxx"},{"key":"Ot7u6SGzj8","link":{"mode":0},"title":"AD - xxx"},{"link":{"mode":0},"key":"ywvxVDoxJJ","title":"Advertising Index"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024],"mode":"tablet"},{"canvasSize":[375,667],"columnWidth":[320,320],"mode":"mobile","minMax":true}]}}