Security Insights

Year in Review: STANLEY Security’s Top 10 Resources of 2020

4 Min Read | December 14, 2020
2020 year in review text on black background

As we approach the new year, many of us are reflecting on all the lessons learned in 2020 and preparing to power into 2021.

Year in Review: STANLEY Security’s Top 10 Resources of 2020

As we approach the new year, many of us are reflecting on all the lessons learned in 2020 and preparing to power into 2021. Before we close the book on this defining chapter in history, let’s take a look back at the most popular security resources we published this year.

From blogs to white papers, these resources were developed to empower protectors who make our world progress. Many of them are relevant now more than ever and can help organizations prepare for the coming year.

10. Why Cloud Video Surveillance May Be the Best Option for You

There’s no denying that the prevalence of cloud-based video – or video surveillance as a service (VSaaS) – solutions has steadily surged, mostly notably in recent years. With the potential for increased storage, readily controlled remote access to data, extensive utility and minimized cost, it’s no wonder why the ever-reaching cloud has become so popular. This article outlines the many benefits associated with cloud video surveillance solutions and can help you determine whether VSaaS is the best option for your business.

Read the full article here.

9. Interoperability in Action: Connecting Communities & Powering Responses

Over the past 20 years, the need for critical incident management – more specifically, the ability to communicate seamlessly across various organizations and agencies – has become a top priority. Interoperable communications and signaling is the merging of technologies on one specific platform, enabling first responders and incident stakeholders to share voice communications, cellular communications, data and video. View this blog and video to learn more about interoperable communications and get an overview of this technology.

Read the full article here.

8. 10 Simple, Cost-Effective Ways to Enhance Your Access Control

In March, organizations across the globe began adjusting to a new norm as a result of the sweeping changes brought on by COVID-19. For many organizations, this new norm meant modifying hours of operation, temporarily closing their doors, sending staff home to work remotely and/or changing visitor and occupancy policies. To help organizations make the most of their existing security systems, we published this blog post, which offers tips and tricks to maximize the value of access control systems.

Read the full article here.

7. 2021 Industry Trends Report

Our second annual Industry Trends Report features survey data from over 2,400 decision-makers across the globe, as well as insights from security leaders on what trends, challenges and opportunities may impact organizations in 2021. The report also highlights organizations’ perceptions regarding, interest in and adoption of security technology – with global survey data that breaks down what security systems organizations are implementing and what features decision-makers look for when evaluating systems and providers.

6. Understanding Mercury’s Leap Year Firmware Issue

At the beginning of the year, security professionals were wondering whether their access control system would function properly on and after Leap Day (Feb. 29, 2020) after reading a “time-critical” notice issued by Mercury Security. This blog provided additional guidance to help answer customers’ questions.

Read the full article here.

5. You Invested in Human Temperature Screening Technology – Now What?

Thermal cameras and human temperature screening solutions were arguably one of the hottest topics in the industry in 2020. This technology has been around for years, but demand only recently exploded, as organizations responded to new challenges in the wake of COVID-19. But as they navigated compliance concerns and invested in these solutions, many were left wondering how to deploy the devices and, just as important, how they fit into their broader security and operational strategies. This blog includes industry best practices based on our extensive research of human temperature screening solutions and our experience installing and managing these devices.

Read the full article here.

4. The Future of Security: A Look at the Technologies Propelling Us Forward

The world changed drastically in 2020, and security became a critical element of organizations’ crisis management strategies. With an overwhelming number of solutions inundating the market, we published this resource to cut through the noise. This white paper was designed to help organizations determine what security technologies would be fundamental in navigating challenges in 2020 and beyond.

3. The Power of Remote Security Management

The ability to stay connected 24/7, rapidly take action and easily analyze security data all while working remotely became even more critical in 2020 as businesses closed and employees were sent to work from home. However, many organizations were not prepared to manage their security program remotely and didn’t have the right elements in place to support it. This white paper was developed to help organizations learn how to build and manage a remote security program.

2. Coronavirus Update: Leveraging Your Security System to Reinforce Business Policies

As COVID-19 began to spread across the globe, more companies adopted stronger measures to protect employees from contracting and spreading the virus. In our first of many resources surrounding COVID-19, this blog offered tips and best practices for utilizing security systems to bolster prevention measures and reinforce policies for employees, customers and visitors.

Read the full article here.

1. Human Temperature Screening: Key Considerations for Your Business

Throughout the year, we saw an influx in demand for human temperature screening devices. In this blog, our most popular resource of 2020, we broke down the top considerations that organizations need to take into account when investing in this technology. Much of this article is centered around the standards, regulatory bodies and laws that could affect organizations’ implementation, including ISO and IEC guidance, FDA regulations, ADA/privacy laws and NDAA compliance.

Read the full article here.

Disclaimer: By using the Blog section of this website (“Blog”), you agree to the terms of this Disclaimer, including but not limited to the terms of use  and our privacy policy. The information provided on this Blog is for information purposes only. Such information is not intended to provide advice on your specific security needs nor to provide legal advice. If you would like to speak to a Security representative about your specific security needs, please contact us.