Gain Access to Security Industry Insights

With emerging security threats, Atriade ensures to update you with the latest security industry news in a hyper-connected world.

Gain Access to Security Industry Insights

With emerging security threats, Atriade ensures to update you with the latest security industry news in a hyper-connected world.

Publications/Articles

challanges in higher education security

ASIS International Security Management Magazine

Challenges in Higher Education Security: Portfolio Administration

Security asset management in higher education face some of the more strenuous challenges in the security industry. Security systems at universities and colleges manage thousands of identities and devices, in open and accessible buildings for diverse and dynamic populations.

technology and systems challanges

ASIS International Security Management Magazine

Challenges in Higher Education Security: Technology and Systems

Technology challenges at universities are often ones of scale and sustainability. Platform footprints are usually extensive, deployed organically, and dependent on infrastructure limitations and third-party data management feeds. 

challenges in technology

ASIS International Security Management Magazine

Challenges in Higher Education Security: Technology Enviroments

University and college campuses are open environments, where safety and security controls often need to coexist with the accessibility of spaces and freedom of movement. A single building may host daily public events but also contain a critical lab.

challenges in finance

ASIS International Security Management Magazine

Challenges in Higher Education Security: Finance and Funding

Administrative and technical challenges in higher education security portfolio management have demonstrated two common trends: the scale of the systems and a need to accurately understand the lifecycle of the portfolio’s current state.

facial recognition considrations to make before deployment

ASIS International Security Management Magazine

Facial Recognition: Considerations to Make Before Deployment

The use of facial recognition technology as a surveillance tool by the public and private sector is becoming more widespread. Organizations can benefit from reductions in investigation costs, improved incident management, and real-time situational awareness.

Q&A How to Build a Better Business Case

Security Management Magazine

How to Build a Better Business Case: Q&A

Security applications and endpoints generate massive amounts of data, from alarm incidents to network analysis to video analytics and more. The use cases for this data seem endless, but sheer data isn’t always the best metric. To get that support for new programs, security leaders.

insider threat navigating

Security Magazine

SPECIAL REPORT: Walking the Line: Navigating the Insider Threat

Determining the definition of insider risk to your organization is half the battle in mitigating the threat. The other half is more complicated, involving security culture, defined procedures and responses, and a little bit of technology.

facial recognition

New Zealand Security Magazine

Facial Recognition: Pre-Deployment Considerations

The use of facial recognition technology as a surveillance tool by the public and private sector is becoming more widespread. organizations can benefit from reductions in investigation costs, improved incident management, and real-time situational awareness.

Speaking/Presentations

Podcast no.14 : Atif Shehzad with Evan Troxel powerd by tect.

Mohammed Atif Shehzad of Atriade joins the Peopleverse podcast live from the Tect booth in the expo hall at the American Institute of Architects National Conference on Architecture which took place on June 23-25 in Chicago, Illinois.

In this episode we discuss the value of leveraging relationships between design professionals and experts early to remove friction from the design process in regards to the complex nature of physical building security.

Security Management Webinar

Complex Nature of University Security Technology

In this episode of Security Management Highlights, Mohammed Shehzad discusses the unique and complex nature of university security technology and how to manage technology portfolios and lifecycles.

Security Industry Association Webinars

Business Continuity and Supply Chain Management Issues During the COVID-19 Crisis

Presented by SIA and ASIS, this roundtable discussion will address the challenges of managing physical security during the Covid-19 crisis. Panelists will explore the business continuity and supply chain issues faced by security practitioners, end-users, dealers and integrators.

Thinkcurity

The 7 Key Elements to Build an Effective Physical Security

Many security businesses see detailed security plans as an impossible task, especially as many teams do not have clearly defined roles and responsibilities across the organization, and many people wear multiple hats. But these things can actually be used as an advantage. 

Prime View USA

PRO Tips to Designing the Security and Control Rooms of the Future

In this Q1 2021 LIVE Primeview Webinar, the security panel experts provided professional tips to designing the security and control rooms of the future. The panel included Michael Amaro (director of engineering at Sentinel Consulting), Frank Pena (CTO of C3EL), Jim Kitchen (National Director of Johnson Controls), Robert Haddad (Principle of Shen Milson & Wilke Consulting) and Mohammed Shehzad (Managing Director of Atriade Consulting).