\u003c/h2>\u003ch3 >Detects Anomalous Events in Surveillance Feeds\u003c/h3>\u003cp >ASTRA is Active Intelligence’s anomaly detection solution designed to transform video security from a forensic investigation tool to a real-time threat prevention tool. The solution identifies anomalies within video surveillance feeds and integrates with a number of video management system (VMS) platforms. Running on hardware, ASTRA can put virtual eyes on video feeds and alert operators as soon as an anomaly is detected. The anomaly detection engine continues to learn and improve its performance using statistical analysis to identify anomalies in real time. ASTRA adapts to gradual scene changes like seasons, weather, traffic flow and schedule changes. \u003cem >Image courtesy of Active Intelligence\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca rel=\"noopener external\" href=\"https://activeintelligencecorp.com/\" target=\"_blank\">www.activeintelligencecorp.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eGSsQVSZbvz","type":"rectangle","cl":"rectangle"},{"key":"ekEf1-DwHdJ","type":"section","children":["e32WeA69ZQh","eGSsQVSZbvz"],"cl":"section"},{"key":"ebgnpBekbnd","content":{"text":"\u003ch2 >Aiphone\u003c/h2>\u003ch3 >Helps Installers Remotely Program Intercom Systems\u003c/h3>\u003cp >Aiphone’s Remote Programming Service for its IX Series systems aim to help installers build, edit and save programming files within the QuikSpec online design tool. A built-in programming wizard offers guidance with creating and modifying system, station and network settings to produce a downloadable programming file. Using the Remote Programming Service, installers can remotely set up and download multiple system preferences prior to arriving on a job site for installation. Available settings include enabling door release, adjusting station visibility with other stations, adding stations to a call list, selecting volume controls and more. \u003cem >Image courtesy of Aiphone\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.aiphone.com/\" target=\"_blank\">www.aiphone.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eFt8HgtYjmW","type":"rectangle","cl":"rectangle"},{"key":"esAqKFsJktc","type":"section","children":["ebgnpBekbnd","eFt8HgtYjmW"],"cl":"section"},{"key":"eEp3YNyECtu","content":{"text":"\u003ch2 >Altronix\u003c/h2>\u003ch3 >Distributes Power for Access Control Technology\u003c/h3>\u003cp >With Altronix’s Trove2M2R solution, Altronix power distribution combines with Mercury platform access controllers to support up to eight doors with power from a single 2U enclosure. This high-capacity rack mount drawer allows for installation, service and maintenance where wall space may be limited or not an option. Trove2M2R is customizable and available in pre-configured kits with power and sub-assemblies pre-wired and installed. All units include a 2U rack drawer with backplane, cam lock, tamper switch, as well as integrated Z-bracket to facilitate external wiring. \u003cem >Image courtesy of Altronix\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://altronix.com/\" target=\"_blank\">www.altronix.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"e9-JPvuCo7H","type":"rectangle","cl":"rectangle"},{"key":"exGVAEpyL2B","type":"section","children":["eEp3YNyECtu","e9-JPvuCo7H"],"cl":"section"},{"key":"e0db50GweTL","content":{"text":"\u003ch2 >Boon Edam\u003c/h2>\u003ch3 >Prevents Piggybacking in Access Turnstiles\u003c/h3>\u003cp >BE Secure, a secure overhead detection system from Boon Edam, Inc., for use with Turnlock Full Height Turnstiles aims to detect and prevent piggybacking within Boon Edam’s range of full-height turnstiles. Boon Edam’s Turnlock 150 Full Height Turnstile with integrated BE Secure Overhead Detection System. The BE Secure system utilizes time-of-flight measurement principles (TOF) combined with artificial intelligence (AI) algorithms to detect when two people try to enter the same compartment on a turnstile using one credential. If piggybacking is detected, the turnstile will automatically lock and refuse entry. \u003cem >Image courtesy of Boon Edam\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.boonedam.com/en-us\" target=\"_blank\">www.boonedam.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eLoiwDcwSfn","type":"rectangle","cl":"rectangle"},{"key":"eT6WBT-TJtc","type":"section","children":["e0db50GweTL","eLoiwDcwSfn"],"cl":"section"},{"key":"eSkZiZNzl7U","content":{"text":"\u003ch2 >Cobalt Robotics\u003c/h2>\u003ch3 >Automates Visitor Check-In and Screening\u003c/h3>\u003cp >Envoy Visitors is now integrated with Cobalt Robotics’ autonomous robots, leveraging robotic technology in the visitor check-in process. Workplaces that require a visitor to register at the reception desk are greeted by a Cobalt robot. Visitors provide their information, which syncs to Envoy’s visitors log and then can be approved for entry. The visitor management solution includes instant notifications, visitor screening, digital document signing, badge printing and analytics and insights into visitor volume. \u003cem >Image courtesy of Cobalt Robotics\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.cobaltrobotics.com/\" target=\"_blank\">www.cobaltrobotics.com\u003c/a> \u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"egKmUDYFUH2","type":"rectangle","cl":"rectangle"},{"key":"eVqjYQ8HRuh","type":"section","children":["eSkZiZNzl7U","egKmUDYFUH2"],"cl":"section"},{"key":"e2mkAK2RXA1","content":{"text":"\u003ch2 >DITEK\u003c/h2>\u003ch3 >Protects Fire Alarm Systems From Electrical Surges\u003c/h3>\u003cp >The DTK-120X12 from DITEK is an electrical surge protection solution for fire alarm systems. Combining protection for 120V system power with protection for up to 12 low-voltage circuits, the DTK-120X12 can help eliminate damage caused by electrical surge events. The modular plug-in design aims to simplify installation & replacement of surge protection modules. The DTK-120X12 base is designed to be wall mounted and hardwired and includes the 120VAC power surge protection unit with dry contacts for remote monitoring of surge protection status. The 120VAC module also has LEDs for visual confirmation of status, as well as a loud audible alarm that sounds if protection has been compromised. Up to six compatible low voltage protection modules can be mounted to the base to protect up to 12 SLC, NAC, IDC, PIV and dialer circuit pairs. \u003cem >Image courtesy of DITEK\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.diteksurgeprotection.com/\" target=\"_blank\">www.diteksurgeprotection.com\u003c/a> \u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eopt0YCBtjb","type":"rectangle","cl":"rectangle"},{"key":"e2XaeEAtlTG","type":"section","children":["e2mkAK2RXA1","eopt0YCBtjb"],"cl":"section"},{"key":"eh76zWDCipt","content":{"text":"\u003ch2 >DoorKing\u003c/h2>\u003ch3 >Allows for Video Calls in Entry System\u003c/h3>\u003cp >DoorKing’s model 2112 eVolve, a video telephone entry system for residential applications, is a cloud-based system that operates on an internet or cellular connection. The companion DoorKing apps are available for Android and iOS cellular phones and provide video calling and relay control, programming, event logging and more for system administrators. The 2112 model can control up to three entry points and features broadcast calling, which allows up to four phones to ring simultaneously when the call button is pushed. \u003cem >Image courtesy of DoorKing\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.doorking.com/\" target=\"_blank\">www.doorking.com\u003c/a> \u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"e6v0L5jKJTA","type":"rectangle","cl":"rectangle"},{"key":"eqqfatbfasy","type":"section","children":["eh76zWDCipt","e6v0L5jKJTA"],"cl":"section"},{"key":"ezqmcM3YHMA","content":{"text":"\u003ch2 >Dortronics\u003c/h2>\u003ch3 >Controls Doors to Support Security Mantraps\u003c/h3>\u003cp >Dortronic’s 48900 Door Interlock Controllers accommodate mantraps with up to nine doors. The controller is a one-board solution that gives the installer control of all operating and configuration options without complex software. The solution is suitable for air locks or security mantraps with two to nine doors that are locked or unlocked. This controller has outputs for traffic lights and door violation alarms and provides three individual timing sequences. A number of access control systems can be used with the 48900 series controllers. The 48900 controller can be paired with a four-, six- or 10-amp UL 294 power supply that includes a fire alarm connection for emergency egress and can provide power to operate maglocks, electric strikes and traffic lights. The controller is also available without the power supply & enclosure for connection to an existing 12-24VDC power source. \u003cem >Image courtesy of Dortronics\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://dortronics.com\" target=\"_blank\">www.dortronics.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eEmuplz5Mow","type":"rectangle","cl":"rectangle"},{"key":"eKaV-lIbJnc","type":"section","children":["ezqmcM3YHMA","eEmuplz5Mow"],"cl":"section"},{"key":"eDu38T36EHg","content":{"text":"\u003ch2 >Elite Interactive Solutions\u003c/h2>\u003ch3 >Leverages AI and Security Professionals to Monitor Facilities\u003c/h3>\u003cp >Elite Interactive Solutions’ Remote Guarding Intelligence creates the ability to monitor a customer site in real time while streaming processes and communications across organizations. Elite Interactive Solutions Remote Guarding Intelligence employs military-derived AI technology that detects people on properties and sends an alert to command and monitoring centers where security professionals view what is happening. If a suspicious person or activity is observed, personnel address the individual(s) over a two-way security audio system, alerting them they are being watched and requesting them to leave immediately. If the activity indicates that an imminent crime or threat is occurring, police are immediately notified to respond. \u003cem >Image courtesy of Elite Interactive Solutions\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"http://www.eliteinteractivesolutions.com/\" target=\"_blank\">www.eliteinteractivesolutions.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"e7BcIVI9I5A","type":"rectangle","cl":"rectangle"},{"key":"e5Tz3ixuWLq","type":"section","children":["eDu38T36EHg","e7BcIVI9I5A"],"cl":"section"},{"key":"e9IOCM0Mksr","content":{"text":"\u003ch2 >HID\u003c/h2>\u003ch3 >Connects Employee Badges to Apple Wallet\u003c/h3>\u003cp >HID Mobile Access enables digital credentials on mobile devices to securely authenticate to readers for physical access control and other extended access applications. With HID’s employee badge in Apple Wallet, users can access office doors, elevators, turnstiles and building amenities using their iPhone or Apple Watch. It integrates into existing access control systems and is supported by Seos, HID’s credential technology, to create a mobile access experience. \u003cem >Image courtesy of HID\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.hidglobal.com/\" target=\"_blank\">www.hidglobal.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eOQC5zl62t5","type":"rectangle","cl":"rectangle"},{"key":"emvcjDEnV5e","type":"section","children":["e9IOCM0Mksr","eOQC5zl62t5"],"cl":"section"},{"key":"epXxVShcWdQ","content":{"text":"\u003ch2 >i-PRO\u003c/h2>\u003ch3 >Surveils Facilities With Built-In Analytics\u003c/h3>\u003cp >i-PRO’s WV- X86531 multi-directional and pan-tilt-zoom (PTZ) camera is a small and light outdoor-rated multi-PTZ with support for up to five sensors total — four multi-sensor and the PTZ. Pre-installed with AI edge-based analytics, the camera can support four applications on the multi-sensor array and two unique applications on the PTZ. AI auto-tracking ensures the PTZ doesn’t lose lock on the subject when the camera recognizes an object. The WV- X86531 features cybersecurity and vandal resistance. \u003cem >Image courtesy of i-PRO\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://i-pro.com/\" target=\"_blank\">www.i-pro.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"ehUcpODmmnX","type":"rectangle","cl":"rectangle"},{"key":"etM4cKCo5nM","type":"section","children":["epXxVShcWdQ","ehUcpODmmnX"],"cl":"section"},{"key":"ephu7Y3tKGq","content":{"text":"\u003ch2 >Iris ID\u003c/h2>\u003ch3 >Integrates Biometrics Into Travel Identification & Access Control\u003c/h3>\u003cp >The iCAM D2000 from Iris ID is an iris and face identification system that uses biometrics to provide images for enrollment and identification for travel and access solutions. The iCAM D2000 helps travelers navigate airport checkpoints and can integrate with other identity authentication systems. Solution functions include multimodal (iris & face) simultaneous capture, user height accommodation and mask detection, among others. \u003cem >Image courtesy of Iris ID\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca target=\"_blank\" href=\"https://www.irisid.com/\">www.irisid.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"e_TZh5j0GuP","type":"rectangle","cl":"rectangle"},{"key":"emU9fIH0Y-Z","type":"section","children":["ephu7Y3tKGq","e_TZh5j0GuP"],"cl":"section"},{"key":"e50xB6Kz_F1","content":{"text":"\u003ch2 >Morse Watchmans\u003c/h2>\u003ch3 >Tracks Key Usage Within an Enterprise\u003c/h3>\u003cp >Morse Watchmans’ KeyWatcher Touch system is a key control and asset management solution for organizations of all sizes. This helps security professionals control and track usage of keys or personal assets. With a 7” touchscreen and patented SmartKey system with KeyAnywhere technology, authorized individuals can withdraw and return a key securely to key cabinets located within an enterprise. Administrators can locate which KeyWatcher Touch a specific key is in, or determine who has it out, with the KeyFind feature. The system can also enable security management to notify a user via email when a key becomes overdue. The Generation 3 CPU aims to improve performance, quicken the user interface and improve synchronization times. \u003cem >Image courtesy of Morse Watchmans\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca target=\"_blank\" href=\"https://www.morsewatchmans.com/\">www.morsewatchmans.com\u003c/a> \u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"ebASmUBBZmV","type":"rectangle","cl":"rectangle"},{"key":"eu4l26BoVle","type":"section","children":["e50xB6Kz_F1","ebASmUBBZmV"],"cl":"section"},{"key":"eNHD84WSaq2","content":{"text":"\u003ch2 >Ontic\u003c/h2>\u003ch3 >Takes a Proactive Approach to Threat Management\u003c/h3>\u003cp >Ontic’s corporate security solution aims to support proactive threat management and risk mitigation, helping organizations protect people, facilities and assets at a number of locations. Threat monitoring tools, system integrations and a single source for data management and reporting allow threats to be identified before they turn critical. With real-time signals, continuous visibility of behavioral indicators, coordinated interventions and responses, and informed risk and threat assessments, the Ontic platform aims to help organizations recalibrate and shift to a strategic approach to threat management and risk mitigation. \u003cem >Image courtesy of Ontic\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://ontic.co/\" target=\"_blank\">www.ontic.co\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eTBnd9z9tQN","type":"rectangle","cl":"rectangle"},{"key":"eyCC2--VQ41","type":"section","children":["eNHD84WSaq2","eTBnd9z9tQN"],"cl":"section"},{"key":"ePhsYDVMaB8","content":{"text":"\u003ch2 >RGB Spectrum\u003c/h2>\u003ch3 >Enables a Range of Surveillance Displays\u003c/h3>\u003cp >RGB Spectrum’s series of new video processing technology & enhancements aims to deliver visual information from source to destination: from a video wall in an operation center, to a monitor in an office across a campus or a cell phone anywhere in the world. It allows personnel to collect data from sources located anywhere, view that information on available displays, and share resulting intelligence throughout an enterprise environment. The Zio platform is the backbone of RGB Spectrum’s decision support system. Zio provides real-time audio and video distribution across packet-based networks, including local area networks (LANs), wide-area networks (WANs), virtual private networks (VPNs), and mobile networks. \u003cem >Images courtesy of RGB Spectrum\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca target=\"_blank\" href=\"http://www.rgb.com\">www.rgb.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"enHYXzrOYHS","type":"rectangle","cl":"rectangle"},{"key":"eSOFivX8SSe","type":"section","children":["ePhsYDVMaB8","enHYXzrOYHS"],"cl":"section"},{"key":"elDdEL3yDhj","content":{"text":"\u003ch2 >RightCrowd\u003c/h2>\u003ch3 >Automates Physical Access Control\u003c/h3>\u003cp >RightCrowd Workforce Access is a physical identity and access management (PIAM) solution that automates the physical access control processes for employees, visitors and contractors across their access lifecycle. The solution adds a layer of intelligent automation to extend access management capability. RightCrowd Workforce Access helps automate access control processes and workflows, enables self-service and implements attribute-based access control (ABAC) rules in accordance with an organization’s security policies, safety rules and compliance requirements while keeping cardholder data up-to-date. \u003cem >Image courtesy of RightCrowd\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.rightcrowd.com/\" target=\"_blank\">www.rightcrowd.com\u003c/a> \u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eQhyFhnOU7D","type":"rectangle","cl":"rectangle"},{"key":"egzxx-NPQR3","type":"section","children":["elDdEL3yDhj","eQhyFhnOU7D"],"cl":"section"},{"key":"eNSomsxOjPr","content":{"text":"\u003ch2 >Shooter Detection Systems\u003c/h2>\u003ch3 >Detects Gunshots in Indoor Environments\u003c/h3>\u003cp >Shooter Detection Systems’ (SDS’) Active Shooter Intelligence technology is engineered for precision, performance and saving lives. SDS’ Indoor Gunshot Detection solutions aims to help end-users detect a gunshot and respond quickly. SDS’ indoor gunshot detection system utilizes dual-mode acoustic and infrared detection technology that detects and reports shots fired in under a second, alerting building occupants while also pushing incident data to 911. \u003cem >Image courtesy of Shooter Detection Systems\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://shooterdetectionsystems.com/\" target=\"_blank\">www.shooterdetectionsystems.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eIAAyJ-W90z","type":"rectangle","cl":"rectangle"},{"key":"eG9dRl3r4xg","type":"section","children":["eNSomsxOjPr","eIAAyJ-W90z"],"cl":"section"},{"key":"eBpJHn560-n","content":{"text":"\u003ch2 >Sielox\u003c/h2>\u003ch3 >Applies Intelligence to Access Management Processes\u003c/h3>\u003cp >Sielox’s Pinnacle 11 aims to provide innate intelligence that allows access control users to leverage preemptive data and notifications for a comprehensive range of applications, including privileged access levels; contractor and contingent worker management; emergency access management, including lockdowns and mustering; occupancy management; compliance/audit management; workforce management time and attendance; insider threat detection and risk mitigation; health management and contact tracing; and more. Pinnacle 11 is compatible with a number of access products and supports Windows 11, time zone schedules and holidays, and email notification. \u003cem >Image courtesy of Sielox\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"http://www.sielox.com\" target=\"_blank\">www.sielox.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"ekVjuWL9_OK","type":"rectangle","cl":"rectangle"},{"key":"e4-sqiiHXbY","type":"section","children":["eBpJHn560-n","ekVjuWL9_OK"],"cl":"section"},{"key":"e-GX3lJZASt","content":{"text":"\u003ch2 >Vector Flow\u003c/h2>\u003ch3 >Helps Automate Enterprise Identity Management\u003c/h3>\u003cp >Vector Flow’s Physical Workforce Identity Suite helps automate the physical security identity lifecycle. The solution leverages AI technology to automate identity management tasks such as on- and off-boarding of an identity into physical security infrastructure, badging and credentialing, physical access management, access audits and compliance. The AI-enabled software uses learning algorithms to identify and address security gaps and also delivers recommendations for security improvements and user tasks. The Physical Workforce Identity Suite leverages its tools set such as Design Studio to manage changes in the application; Playbooks to automate rules, workflows, schedules and tasks; and Recommendation Engine to precisely automate user tasks which otherwise would be done manually. \u003cem >Image courtesy of Vector Flow\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://vectorflow.com/platform-overview/physical-workforce-identity-suite/\" target=\"_blank\">www.vectorflow.com\u003c/a> \u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"em6B0SU_aFy","type":"rectangle","cl":"rectangle"},{"key":"epbAdV_yFII","type":"section","children":["e-GX3lJZASt","em6B0SU_aFy"],"cl":"section"},{"key":"eLSNonfY6NS","content":{"text":"\u003ch2 >Viakoo\u003c/h2>\u003ch3 >Automates Password Compliance of Physical Security and IoT Devices \u003c/h3>\u003cp >The latest version of Viakoo’s Device Password Manager automates password rotation and scheduling, verification of password strength, coordination with VMS and other applications, and adherence of password policies at scale for thousands of devices. The solution aims to help security leaders mitigate the challenges associated with weak password management strategies. \u003cem >Image courtesy of Viakoo\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca href=\"https://www.viakoo.com/\" target=\"_blank\">www.viakoo.com\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"eIjIumq9Sos","type":"rectangle","cl":"rectangle"},{"key":"ePCuF3gOPoh","type":"section","children":["eLSNonfY6NS","eIjIumq9Sos"],"cl":"section"},{"key":"eAHKiRTD1Pu","content":{"text":"\u003ch2 >Vintra\u003c/h2>\u003ch3 >Simplifies Manual Security Processes With Monitoring & Alerts\u003c/h3>\u003cp >Vintra Guard, available as an additional module for Vintra Prevent, can enhance real-time monitoring and enterprise alerting by incorporating video-based identity verification for access control management. Initially integrated with the C•CURE 9000 Security + Event Management System, Vintra Guard automates two-factor identity verification for C•CURE users, incorporating video analytics into the access control system to help detect unauthorized access across a campus facility. The solution can review access events at a given point of entry, using facial recognition to verify the identity of the person that used each credential in order to find any unauthorized credential usage. If a badge is used by an individual that is not the actual credential holder, an alert will be generated, available within the Vintra Fortify platform or sent to a VMS platform. \u003cem >Image courtesy of Vintra\u003c/em>\u003c/p>\u003cp >\u003cstrong >Find out more at\u003c/strong> \u003ca target=\"_blank\" href=\"https://vintra.io/\">www.vintra.io\u003c/a>\u003c/p>"},"type":"text","cl":"text pzypEgUEyej"},{"key":"edEogruFbwg","type":"rectangle","cl":"rectangle"},{"key":"e3op2ULKLz4","type":"section","children":["eAHKiRTD1Pu","edEogruFbwg"],"cl":"section"},{"key":"eh03VZTSDDl","content":{"text":"\u003ch1 >Connect with \u003cem >Security\u003c/em> \u003c/h1>\u003cp >Connect with us to receive updates and to network with other industry professionals just like you. \u003c/p>"},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"eMu939lzaKs","content":{"linkText":"FOR MORE INFORMATION","link":{"mode":2,"href":"https://www.securitymagazine.com/connect","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"exivRTTxLMV","content":{"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"ew3Cs_oh_30","content":{"src":{"url":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","key":"Wiy0SNYyh","ratio":1.332}},"type":"image","actions":["exivRTTxLMV"],"cl":"image"},{"key":"ebUwZZG8m13","content":{"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e4tS5U3XxlR","content":{"shapeId":"nxWVNnWZm"},"type":"shape","actions":["ebUwZZG8m13"],"cl":"shape"},{"key":"e4sWupWuw6X","content":{"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"e8K-ETJ_OHi","content":{"shapeId":"erJql7HjU"},"type":"shape","actions":["e4sWupWuw6X"],"cl":"shape"},{"key":"evzhuANC6PA","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"ernbFsXOgU4","content":{"shapeId":"nxWVNnWZm"},"type":"shape","actions":["evzhuANC6PA"],"cl":"shape"},{"key":"eHRUPsOWWeG","content":{"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e7kaWulqa7r","content":{"shapeId":"Z5l6xzNGx"},"type":"shape","actions":["eHRUPsOWWeG"],"cl":"shape"},{"key":"eWqavx4bdWn","type":"section","children":["eh03VZTSDDl","eMu939lzaKs","ew3Cs_oh_30","e4tS5U3XxlR","e8K-ETJ_OHi","ernbFsXOgU4","e7kaWulqa7r"],"cl":"section"},{"key":"ekifIHa9ukB","content":{"text":"\u003cp >march 2023 / \u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/\">SECURITYMAGAZINE.COM\u003c/a>\u003c/p>"},"type":"text","cl":"text"},{"key":"eePwBzgSOAZ","content":{"menu":"HRIdsyZs5N"},"type":"w1bn5r0s80-1477","cl":"w1bn5r0s80-1477"},{"key":"esW107QYfd-","type":"section","children":["ekifIHa9ukB","eePwBzgSOAZ"],"cl":"section"},{"key":"e_1QCnLUlQl","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"e10fR8FGkTG","content":{"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"e078ifttbJI","content":{"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"ePDuvumQNZi","content":{"src":{"url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","key":"pwAptEAolq","ratio":null}},"type":"image","actions":["e_1QCnLUlQl","e10fR8FGkTG","e078ifttbJI"],"cl":"image"},{"key":"ewp2vZKADfw","type":"section","children":["ePDuvumQNZi"],"cl":"section"},{"key":"pH3wlKfa0ep","children":["ef6E9irsjAz","eFz_r_lbYQk","eC62eEqMu59","esG33ErKy_q","e3jtDJZzMKW","ekEf1-DwHdJ","esAqKFsJktc","exGVAEpyL2B","eT6WBT-TJtc","eVqjYQ8HRuh","e2XaeEAtlTG","eqqfatbfasy","eKaV-lIbJnc","e5Tz3ixuWLq","emvcjDEnV5e","etM4cKCo5nM","emU9fIH0Y-Z","eu4l26BoVle","eyCC2--VQ41","eSOFivX8SSe","egzxx-NPQR3","eG9dRl3r4xg","e4-sqiiHXbY","epbAdV_yFII","ePCuF3gOPoh","e3op2ULKLz4","eWqavx4bdWn","esW107QYfd-","ewp2vZKADfw"]},{"key":"e_gDSWqLEo8","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eYhHwUv7C9G","content":{"nextText":"Next ","prevText":" Previous","menu":"vbWJCGGmwo"},"type":"w7Ty9ifjBD","icons":{"left":[512,512,"M256 504C119 504 8 393 8 256S119 8 256 8s248 111 248 248-111 248-248 248zm116-292H256v-70.9c0-10.7-13-16.1-20.5-8.5L121.2 247.5c-4.7 4.7-4.7 12.2 0 16.9l114.3 114.9c7.6 7.6 20.5 2.2 20.5-8.5V300h116c6.6 0 12-5.4 12-12v-64c0-6.6-5.4-12-12-12z"],"right":[512,512,"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zM140 300h116v70.9c0 10.7 13 16.1 20.5 8.5l114.3-114.9c4.7-4.7 4.7-12.2 0-16.9l-114.3-115c-7.6-7.6-20.5-2.2-20.5 8.5V212H140c-6.6 0-12 5.4-12 12v64c0 6.6 5.4 12 12 12z"]},"cl":"w7Ty9ifjBD"},{"key":"eTfnbt8g_Bj","content":{"debug":false},"type":"wl9gVIiyFe","icons":{"close":[448,512,"M400 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm16 400c0 8.8-7.2 16-16 16H48c-8.8 0-16-7.2-16-16V80c0-8.8 7.2-16 16-16h352c8.8 0 16 7.2 16 16v352zm-97.2-245.3L249.5 256l69.3 69.3c4.7 4.7 4.7 12.3 0 17l-8.5 8.5c-4.7 4.7-12.3 4.7-17 0L224 281.5l-69.3 69.3c-4.7 4.7-12.3 4.7-17 0l-8.5-8.5c-4.7-4.7-4.7-12.3 0-17l69.3-69.3-69.3-69.3c-4.7-4.7-4.7-12.3 0-17l8.5-8.5c4.7-4.7 12.3-4.7 17 0l69.3 69.3 69.3-69.3c4.7-4.7 12.3-4.7 17 0l8.5 8.5c4.6 4.7 4.6 12.3 0 17z"]},"cl":"wl9gVIiyFe"},{"key":"fixed","visibility":{"eYhHwUv7C9G":{"p2PRQ71dUR7":true,"pX8aOVpqHUG":true,"p9i0i8fBUJ8":true,"pfz5Sg455xU":true,"pDPCkYaKJiq":true,"pqVh85UFnhE":true,"pSaIoZ9Kyq8":true,"porX_SIZaEp":true,"pa5wPIVBQRL":true,"pnzFZ1cz5Yj":true,"plC8l8L64C7":true,"pp3S447P3OH":true,"pLt8XwmTl-X":true,"pGroKxzZGp6":true,"pB2wvyC3UeR":true,"pDWswozfddp":true,"pR4UJ-Ztiep":true,"pDV8mn8RFpK":true,"pmc_Eu7sE6-":true,"pEZiyfEOOey":true,"ptukQRcDD5Z":true,"pOs0ODBgsNY":true,"pOw_nGM-knc":true,"pCTA-ASUFUi":true,"paWAAivYHNd":true,"pk3kMk5x6yq":true,"p0C1oLhV-Ae":true,"pxcabbMOjkJ":true,"prSp2Ko_9lr":true,"pkwvKNMyH6L":true,"pfimDDVCwdL":true,"pNmgV9gs6cB":true,"p17ezwuZZkC":true,"po1P-wxlC9P":true,"pH3wlKfa0ep":true,"p6viHNWz8BG":true,"pAWcQbsrxbh":true,"p3YFaBVvPc1":true,"pNOsvZZe2Ok":true,"pxqiRNG8snX":true,"pxalSH_TNon":true,"pwWXTqaaexY":true,"pR4lETRfxAS":true},"e_gDSWqLEo8":{"p-YiEaTfF9Y":true},"eTfnbt8g_Bj":{"pDV8mn8RFpK":true}},"children":["e_gDSWqLEo8","eYhHwUv7C9G","eTfnbt8g_Bj"]}],"pages":[{"key":"p-YiEaTfF9Y","title":"Security March 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"","index":true},{"key":"p0C1oLhV-Ae","title":"AD–Securitas","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T_jTUS4liL.png","path":"adsecuritas"},{"key":"p17ezwuZZkC","title":"TCL Ariel Weintraub-Feature","desc":"Ariel Weintraub, CISO at MassMutual, has spent her career building robust cybersecurity programs and recruiting diverse talent into the field.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hxRMeJbFI-.png","path":"tcl-ariel-weintraub-feature"},{"key":"p2PRQ71dUR7","title":"AD–Hanwha","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tIdPLVGBf5.png","path":"adhanwha"},{"key":"p3YFaBVvPc1","title":"AD–xxx","cover":"undefined/image/social/undefined/p3YFaBVvPc1/v/0.jpg","path":"adxxx"},{"key":"p6viHNWz8BG","title":"TCL Alex Holden-Feature","desc":"Alex Holden uses actionable threat intelligence to identify some of the world’s largest data breaches and unearth ransomware collective operations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZfXZKHhKI8.png","path":"tcl-alex-holden-feature"},{"key":"p9i0i8fBUJ8","title":"AD–Speco","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HXBHrtEmw2.png","path":"adspeco"},{"key":"pAWcQbsrxbh","title":"Advertising Index","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/0jY1-kXuQ4.jpg","path":"advertising-index"},{"key":"pB2wvyC3UeR","title":"TCL James Edgar-Feature","desc":"James Edgar, SVP and CISO at FLEETCOR, has matured cybersecurity programs by foregrounding compliance and instilling a culture of security across organizations.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GOUvrsTMLq.png","path":"tcl-james-edgar-feature"},{"key":"pBr2jINXDfq","title":"xxxx-Column (copy)","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"xxxx-column-copy"},{"key":"pCTA-ASUFUi","title":"AD–Traka Assa Abloy","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Nl_PCcjSbn.png","path":"adtraka-assa-abloy"},{"key":"pDPCkYaKJiq","title":"TCL Jadee Hanson-Feature","desc":"Jadee Hanson, CIO and CISO at Code42, takes a human-centric approach to insider risk management and cybersecurity best practices.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Wb2AjnSZRb.png","path":"tcl-jadee-hanson-feature"},{"key":"pDV8mn8RFpK","title":"Special Report TCL Intro-Feature","desc":"Security magazine’s 2023 Top Cybersecurity Leaders award program highlights the accomplishments of innovative information security professionals across sectors.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kPegcLk6Jn.jpg","path":"special-report-tcl-intro-feature"},{"key":"pDWswozfddp","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/uOfLeTQviu.jpg","path":"table-of-contents"},{"key":"pEZiyfEOOey","title":"AD–House NCS4","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/RwBwIb9bO_.png","path":"adhouse-ncs4"},{"key":"pGroKxzZGp6","title":"AD–House BNP Engage","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Emi5sj5SS.png","path":"adhouse-bnp-engage"},{"key":"pH3wlKfa0ep","title":"Product Spotlight-Department","desc":"From robotic visitor management to mobile access control credentials, Security magazine spotlights solutions from companies at ISC West 2023.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1Hlj3Ox7Ix.jpg","path":"product-spotlight-department"},{"key":"pLt8XwmTl-X","title":"AD–House Brivo Infocenter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"adhouse-brivo-infocenter"},{"key":"pNOsvZZe2Ok","title":"AD–House Security eNewsletter","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/6hI5Ac7yda.jpg","path":"adhouse-security-enewsletter"},{"key":"pNmgV9gs6cB","title":"AD–HES (Assa Abloy)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HK7zWSwE_.png","path":"adhes-assa-abloy"},{"key":"pOs0ODBgsNY","title":"Emerging Threats-Feature","desc":"Mitigating emerging security risks takes a strong intelligence network, security awareness education and alignment with the enterprise.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/AHTM-UyTbV.jpg","path":"emerging-threats-feature"},{"key":"pOw_nGM-knc","title":"Stadium Security Technology-Feature","desc":"Access control, visitor management and crowd control technologies can help secure stadiums and arenas despite staffing shortages.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4LoCzEoFdq.jpg","path":"stadium-security-technology-feature"},{"key":"pR4UJ-Ztiep","title":"Security Talk-Column","desc":"Enterprise security leaders must prioritize business resilience in times of economic uncertainty.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/MTT0CFuZRX.jpg","path":"security-talk-column"},{"key":"pR4lETRfxAS","title":"AD–House Security Benchmark","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/7HFg9DYVY-.png","path":"adhouse-security-benchmark"},{"key":"pSaIoZ9Kyq8","title":"Staff Listing","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sZaMLAnqPc.jpg","path":"staff-listing"},{"key":"pX8aOVpqHUG","title":"eMagazine Navigation Guide","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pa5wPIVBQRL","title":"AD–House ISC West","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XJb444awVf.png","path":"adhouse-isc-west"},{"key":"paWAAivYHNd","title":"Hybrid-Cloud Access Control-Feature","desc":"Hybrid-cloud access control can help security functions position themselves as a business enabler, helping to streamline operations and increase efficiency.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ydd5sFFb10.jpg","path":"hybrid-cloud-access-control-feature"},{"key":"pfimDDVCwdL","title":"AD–DKS","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/qBQd0U4J72.png","path":"addks"},{"key":"pfz5Sg455xU","title":"Career Intelligence-Column","desc":"Security professionals on the hunt for new roles should be cautious of ghost jobs — job postings that are less reputable than they appear.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/iMGx6hvSfA.jpg","path":"career-intelligence-column"},{"key":"pk3kMk5x6yq","title":"AD–Control Risks (Seerist)","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LTfzBT6XpY.png","path":"adcontrol-risks-seerist"},{"key":"pkwvKNMyH6L","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad"},{"key":"plC8l8L64C7","title":"Leadership & Management-Column","desc":"Security leaders can look to volunteer opportunities to support the industry and share their security & management insights.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bwHrWkgZIm.jpg","path":"leadership-management-column"},{"key":"pmc_Eu7sE6-","title":"Classifieds","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pnzFZ1cz5Yj","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DEGjFLP7ZR.png","path":"adhouse-solutions-by-sector"},{"key":"po1P-wxlC9P","title":"TCL Phillimon Zongo-Feature","desc":"Phillimon Zongo, CEO and Co-Founder at the Cyber Leadership Institute, emphasizes information sharing and mentorship through his cybersecurity leadership.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/4xzfXvJe2C.png","path":"tcl-phillimon-zongo-feature"},{"key":"porX_SIZaEp","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"adhouse-security-renewal"},{"key":"pp3S447P3OH","title":"Cyber Tactics-Column","desc":"Columnist John McClurg shares lessons learned from his 35-year career as a cybersecurity leader, foregrounding the importance of cyber innovation.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nITzDTTY-I.jpg","path":"cyber-tactics-column"},{"key":"pqVh85UFnhE","title":"Global News-Department","desc":"Analyze enterprise security incident levels in 2022; corporate data transparency & privacy; and how enterprise organizations leverage video surveillance.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/S7mxcCFWe9.jpg","path":"global-news-department"},{"key":"prSp2Ko_9lr","title":"Education & Training-Column","desc":"By evaluating the risks of your information and reputation across the new business and technical realities of today, you can more successfully manage and govern your business. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tRFogIBKIC.jpg","path":"education-training-column"},{"key":"ptukQRcDD5Z","title":"AD–House Most Influential","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lfIDmmyuBb.png","path":"adhouse-most-influential"},{"key":"pwWXTqaaexY","title":"AD–House Security Bookstore","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/ZjuVaRgK3x.jpg","path":"adhouse-security-bookstore"},{"key":"pxalSH_TNon","title":"Online Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HFPR-RFvzQ.png","path":"online-contents"},{"key":"pxcabbMOjkJ","title":"TCL Pam Nigro-Feature","desc":"Pam Nigro, VP, Security at Medecision, emphasizes the importance of building security in at the ground level of enterprise networks.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1bBsg-0aPu.png","path":"tcl-pam-nigro-feature"},{"key":"pxqiRNG8snX","title":"TCL Hardeep Mehrotara-Feature","desc":"Hardeep Mehrotara uses his cybersecurity acumen to bolster the cybersecurity posture of the property management sector, defense industry and Canada as a whole.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/nJ9V5brwvR.png","path":"tcl-hardeep-mehrotara-feature"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"],"Z5l6xzNGx":[176,124,"M172,19A22,22,0,0,0,157,4C143,0,88,0,88,0S33,0,19,4A22,22,0,0,0,4,19C0,33,0,62,0,62S0,91,4,105A22,22,0,0,0,19,120C33,124,88,124,88,124S143,124,157,120A22,22,0,0,0,172,105C176,91,176,62,176,62S176,33,172,19zM70,88V36L116,62z"],"erJql7HjU":[1024,1024,"M1024,512C1024,229,795,0,512,0S0,229,0,512C0,768,187,979,432,1018V660H302V512H432V399C432,271,508,200,625,200C681,200,740,210,740,210V336H675C612,336,592,375,592,416V512H734L711,660H592V1018C837,979,1024,768,1024,512z"],"nxWVNnWZm":[400,400,"M154,302C248,302,300,223,300,156Q300,296,299,149A104,104,0,0,0,325,122A102,102,0,0,1,296,131A52,52,0,0,0,318,102A103,103,0,0,1,286,115A51,51,0,0,0,198,161A146,146,0,0,1,92,108A51,51,0,0,0,108,176A51,51,0,0,1,85,170C85,170,85,170,85,171A51,51,0,0,0,126,221A51,51,0,0,1,103,222A51,51,0,0,0,151,257A103,103,0,0,1,87,279A105,105,0,0,1,75,279A145,145,0,0,0,154,302M0,0H400V400H0z"]},"images":{"1vWVfTDONV":{"meta":{"width":1059,"height":720,"description":"Computer monitor accessory, Output device, Peripheral, Product, Font, Line"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1vWVfTDONV.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1vWVfTDONV.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1vWVfTDONV.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1vWVfTDONV.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/1vWVfTDONV.png",1059]]},"48hokY5uOj":{"meta":{"width":1500,"height":1142,"description":"Sky, Property, Plant, Cloud, Building, Tree"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/48hokY5uOj.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/48hokY5uOj.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/48hokY5uOj.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/48hokY5uOj.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/48hokY5uOj.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/48hokY5uOj.jpg",1500]]},"8riDrcEsYj":{"meta":{"width":3000,"height":1997,"description":"Portable communications device, Mobile phone, Face, Telephony, Gadget"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8riDrcEsYj.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8riDrcEsYj.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8riDrcEsYj.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8riDrcEsYj.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8riDrcEsYj.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8riDrcEsYj.jpg",2560]]},"8wH_vy-x9y":{"meta":{"width":1200,"height":627},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8wH_vy-x9y.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8wH_vy-x9y.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8wH_vy-x9y.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8wH_vy-x9y.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/8wH_vy-x9y.jpg",1200]]},"Dz_3owornk":{"meta":{"width":1200,"height":1409,"description":"Rectangle"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Dz_3owornk.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Dz_3owornk.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Dz_3owornk.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Dz_3owornk.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Dz_3owornk.png",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Dz_3owornk.png",1409]]},"HLyQJkx7RE":{"meta":{"width":1909,"height":988,"description":"Chin, Product, Jaw, Sleeve, Font, Screenshot"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HLyQJkx7RE.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HLyQJkx7RE.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HLyQJkx7RE.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HLyQJkx7RE.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HLyQJkx7RE.png",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HLyQJkx7RE.png",1909]]},"I2eZkMCqxF":{"meta":{"width":2500,"height":2358,"description":"Rectangle, Wood"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/I2eZkMCqxF.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/I2eZkMCqxF.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/I2eZkMCqxF.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/I2eZkMCqxF.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/I2eZkMCqxF.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/I2eZkMCqxF.jpg",2500]]},"Ibgd2TqRiM":{"meta":{"width":4400,"height":2439,"description":"Computer, Product, Rectangle, Font, Software, Screenshot"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ibgd2TqRiM.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ibgd2TqRiM.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ibgd2TqRiM.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ibgd2TqRiM.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ibgd2TqRiM.png",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ibgd2TqRiM.png",2560]]},"L8gTKlDgOf":{"meta":{"width":1024,"height":990,"description":"Input device, Plant, Gadget"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/L8gTKlDgOf.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/L8gTKlDgOf.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/L8gTKlDgOf.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/L8gTKlDgOf.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/L8gTKlDgOf.png",1024]]},"LDXPOe-1cO":{"meta":{"width":1170,"height":658,"description":"Facial expression, Shirt, Product, Coat, Suit, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LDXPOe-1cO.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LDXPOe-1cO.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LDXPOe-1cO.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LDXPOe-1cO.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/LDXPOe-1cO.jpg",1170]]},"Luk76sBoxd":{"meta":{"width":4912,"height":7360,"description":"Floor, Flooring"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Luk76sBoxd.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Luk76sBoxd.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Luk76sBoxd.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Luk76sBoxd.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Luk76sBoxd.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Luk76sBoxd.jpg",2560]]},"OaVVBHxO16":{"meta":{"width":4200,"height":2800},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OaVVBHxO16.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OaVVBHxO16.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OaVVBHxO16.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OaVVBHxO16.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OaVVBHxO16.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/OaVVBHxO16.jpg",2560]]},"Q5WMEKiyr8":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5WMEKiyr8.svg","srcset":[]},"SWKHZxvQvf":{"meta":{"description":"Share This","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SWKHZxvQvf.svg","srcset":[]},"UQuCJmnh1O":{"meta":{"width":1200,"height":800,"description":"Personal computer, Output device, Laptop, Netbook, Touchpad, Peripheral, Table, Gesture"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UQuCJmnh1O.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UQuCJmnh1O.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UQuCJmnh1O.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UQuCJmnh1O.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/UQuCJmnh1O.jpg",1200]]},"WcT6nz7g1H":{"meta":{"width":4238,"height":6005,"description":"Automotive lighting, Rectangle, Tool"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WcT6nz7g1H.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WcT6nz7g1H.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WcT6nz7g1H.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WcT6nz7g1H.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WcT6nz7g1H.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/WcT6nz7g1H.jpg",2560]]},"Wiy0SNYyh":{"meta":{"description":"Rectangle, Font, Line, White, Text"},"src":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","srcset":[["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",500],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1080],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1600],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",2100]]},"Y52yivfw1O":{"meta":{"width":1416,"height":778,"description":"Personal computer, Output device, Laptop, Netbook, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Y52yivfw1O.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Y52yivfw1O.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Y52yivfw1O.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Y52yivfw1O.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Y52yivfw1O.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Y52yivfw1O.jpg",1416]]},"be1cV6KLel":{"meta":{"width":1800,"height":1105,"description":"Computer, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/be1cV6KLel.png","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/be1cV6KLel.png",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/be1cV6KLel.png",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/be1cV6KLel.png",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/be1cV6KLel.png",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/be1cV6KLel.png",1800]]},"d_e8a2pnef":{"meta":{"width":1146,"height":909,"description":"Font, Screenshot"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/d_e8a2pnef.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/d_e8a2pnef.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/d_e8a2pnef.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/d_e8a2pnef.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/d_e8a2pnef.jpg",1146]]},"eUIMF4Za8p":{"meta":{"width":1517,"height":2014,"description":"Portable communications device, Mobile phone, Watch, Gesture, Gadget, Telephony, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eUIMF4Za8p.jpeg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eUIMF4Za8p.jpeg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eUIMF4Za8p.jpeg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eUIMF4Za8p.jpeg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eUIMF4Za8p.jpeg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eUIMF4Za8p.jpeg",2014]]},"j8LO8pu-Ts":{"meta":{"width":917,"height":611,"description":"Personal computer, Peripheral, Desk"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/j8LO8pu-Ts.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/j8LO8pu-Ts.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/j8LO8pu-Ts.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/j8LO8pu-Ts.jpg",917]]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"sYRmv6hJ_O":{"meta":{"width":5000,"description":"Automotive design, Input device, Space bar, Blue, Azure, Purple, Architecture, Peripheral, Line, Font","height":3500},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sYRmv6hJ_O.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sYRmv6hJ_O.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sYRmv6hJ_O.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sYRmv6hJ_O.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sYRmv6hJ_O.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/sYRmv6hJ_O.jpg",2560]]},"tN2hlJgrUD":{"meta":{"width":1500,"height":919,"description":"Musical instrument accessory, Audio equipment"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tN2hlJgrUD.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tN2hlJgrUD.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tN2hlJgrUD.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tN2hlJgrUD.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tN2hlJgrUD.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tN2hlJgrUD.jpg",1500]]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"xo4kNCmnnF":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xo4kNCmnnF.svg","srcset":[]},"zrMLgfiuo7":{"meta":{"width":850,"height":700,"description":"Product, Rectangle"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zrMLgfiuo7.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zrMLgfiuo7.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zrMLgfiuo7.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zrMLgfiuo7.jpg",850]]}},"pkg":{"text":"basic","section":"basic","image":"basic","external-link":"basic","w1c12qdsln-oon":"pjbqXRuSWpE","rectangle":"basic","w1cal72054-hh4":"pL-YXwgdPSb8","w1br1l0lsu-u06":"pgxSSDpDPRe","w1bn5r0s80-1477":"p8vPJJ1MbCI","w1bopak0jo-n2r":"pgxSSDpDPRe","w3tbowgsq-":"pMdFOsZW1t","frame":"basic","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/s/yhxtxowonhbdtm5/SEC_March-2023_Full-Issue.pdf?dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Top Cybersecurity Leaders - Special Report","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology","key":"BkG_iV_mkW"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"p-YiEaTfF9Y"},"title":"Security March 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pfimDDVCwdL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"pDWswozfddp"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"pa5wPIVBQRL"},"title":"AD–ISC West","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"pxalSH_TNon"},"title":"Online Contents","key":"G9ZMTlEFKf"},{"link":{"mode":0,"page":"pR4UJ-Ztiep"},"title":"Security Talk-Column","key":"xu85h9SaLn"},{"link":{"mode":0,"page":"p9i0i8fBUJ8"},"title":"AD–Speco","key":"JuT_39tH4P"},{"link":{"mode":0,"page":"pqVh85UFnhE"},"title":"Global News & Analysis-Department","key":"qZsrwPOosb"},{"link":{"mode":0,"page":"pDV8mn8RFpK"},"title":"Special Report TCL Intro-Feature","key":"rUP4jIq43E"},{"link":{"mode":0,"page":"pB2wvyC3UeR"},"title":"TCL James Edgar-Feature","key":"ZHs0yc_0G6"},{"link":{"mode":0,"page":"pDPCkYaKJiq"},"title":"TCL Jadee Hanson-Feature","key":"l2URhDkocr"},{"link":{"mode":0,"page":"p2PRQ71dUR7"},"title":"AD–Hanwha","key":"eehLw_YuS1"},{"link":{"mode":0,"page":"p6viHNWz8BG"},"title":"TCL Alex Holden-Feature","key":"i8TfW9jBSn"},{"link":{"mode":0,"page":"pxqiRNG8snX"},"title":"TCL Hardeep Mehrotara-Feature","key":"CIOE0D3p4-"},{"link":{"mode":0,"page":"pk3kMk5x6yq"},"title":"AD–Control Risks (Seerist)","key":"UH4laR9aFO"},{"link":{"mode":0,"page":"pxcabbMOjkJ"},"title":"TCL Pam Nigro-Feature","key":"3feIGuv3Xy"},{"link":{"mode":0,"page":"pNmgV9gs6cB"},"title":"AD–HES (Assa Abloy)","key":"zYY-GJdff4"},{"link":{"mode":0,"page":"p17ezwuZZkC"},"title":"TCL Ariel Weintraub-Feature","key":"tvUTDO0NYn"},{"link":{"mode":0,"page":"p0C1oLhV-Ae"},"title":"AD–Securitas","key":"RYAkE1Qb6Q"},{"link":{"mode":0,"page":"po1P-wxlC9P"},"title":"TCL Phillimon Zongo-Feature","key":"SMXE0bYHUM"},{"link":{"mode":0,"page":"pCTA-ASUFUi"},"title":"AD–Traka Assa Abloy","key":"taUtddOeTV"},{"link":{"mode":0,"page":"pOs0ODBgsNY"},"title":"Emerging Threats-Feature","key":"z609bpDd_Z"},{"link":{"mode":0,"page":"pR4lETRfxAS"},"title":"AD–Security Benchmark","key":"WNw_rJif4r"},{"link":{"mode":0,"page":"paWAAivYHNd"},"title":"Hybrid-Cloud Access Control-Feature","key":"F13J8jcEPV"},{"link":{"mode":0,"page":"pnzFZ1cz5Yj"},"title":"AD–Solutions by Sector","key":"DQ_PQtYb8m"},{"link":{"mode":0,"page":"pOw_nGM-knc"},"title":"Stadium Security Technology-Feature","key":"0nS8P-wmOM"},{"link":{"mode":0,"page":"pEZiyfEOOey"},"title":"AD–NCS4","key":"AOfs5TYuAY"},{"link":{"mode":0,"page":"ptukQRcDD5Z"},"title":"AD–Security Most Influential","key":"CJWsop0s9a"},{"link":{"mode":0,"page":"pfz5Sg455xU"},"title":"Career Intelligence-Column","key":"q2nq0gC1-6"},{"link":{"mode":0,"page":"pNOsvZZe2Ok"},"title":"AD–Security eNewsletter","key":"7kOWmJdXrm"},{"link":{"mode":0,"page":"plC8l8L64C7"},"title":"Leadership & Management-Column","key":"l8qDRfqsLs"},{"link":{"mode":0,"page":"porX_SIZaEp"},"title":"AD–Security Renewal","key":"xLhPZKbPEG"},{"link":{"mode":0,"page":"pp3S447P3OH"},"title":"Cyber Tactics-Column","key":"grGxEvPwGM"},{"link":{"mode":0,"page":"pwWXTqaaexY"},"title":"AD–Security Bookstore","key":"AJLpajKbTO"},{"link":{"mode":0,"page":"prSp2Ko_9lr"},"title":"Education & Training-Column","key":"dLp_K9NDm9"},{"link":{"mode":0,"page":"pGroKxzZGp6"},"title":"AD–BNP Engage","key":"eYVuxO1-4D"},{"link":{"mode":0,"page":"pH3wlKfa0ep"},"title":"Product Spotlight-Department","key":"M-M0Tww8DC"},{"link":{"mode":0,"page":"pLt8XwmTl-X"},"title":"AD–Brivo Infocenter","key":"DvJnQ_nOPw"},{"link":{"mode":0,"page":"pmc_Eu7sE6-"},"title":"Classifieds","key":"pKCOFaymC8"},{"link":{"mode":0,"page":"pAWcQbsrxbh"},"title":"Advertising Index","key":"inGVVYKmrc"},{"link":{"mode":0,"page":"pSaIoZ9Kyq8"},"title":"Staff Listing","key":"IpWU2Dw7qf"},{"link":{"mode":0,"page":"pX8aOVpqHUG"},"title":"eMagazine Navigation Guide","key":"V0oX-P43Ip"}],"key":"vbWJCGGmwo"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","minMax":true,"columnWidth":[600,600],"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}