PRIME COMMUNICATIONS INCREASES COMMITMENT TO LPF

Prime Communications Increases Their Commitment to Retail Education by Becoming the Newest Bachelor Level Partner with The Loss Prevention Foundation

Prime Communications supports LPF by increasing commitment

Matthews, NC (October 16, 2018) – The Loss Prevention Foundation (LPF) announced that Prime Communications has advanced its partnership to become the newest Bachelor level scholarship partner. The Bachelor level partnership secures certification course scholarships and complimentary LPF memberships for Prime to distribute to those in the loss prevention industry.


Prime’s Amit Malla Announced Vice President of Security and Network Solutions.

It is with great pride we announce the promotion of Prime Communication’s Amit Malla to Vice President of Security and Network Solutions. Amit has been a dedicated Prime employee for almost 10 years, and we look forward to the future of Prime with his continued leadership.

“I have had the pleasure of working alongside Amit for almost 10 years now. Amit has been committed to this organization since the day he started as an engineer with Prime in 2010. Throughout the years Amit has held many roles from engineering to management. He has always performed his responsibilities in a professional manner while working diligently to expand his education and learn not only the industry but all of the silly idioms we use around the office. It’s truly humbling to work with someone who is constantly striving to learn and improve but still takes the time to lead those around him to grow as well.” stated Jamie Bumgardner, COO for Prime Communications.

Thank you, Amit for your contribution to this organization, for raising the bar and making us a better company. There is no question we would not be where we are today without you on the team!


Prime Achieves Aruba Platinum Status

(OMAHA, Nebr.)—After over 10 years of partnership with Hewlett Packard Enterprise’s Aruba Networks, Prime Communications Inc. (PCI) has been awarded Aruba Platinum status, the first Omaha-headquartered partner to achieve this level of recognition by one of the leading companies in network access solutions.

Prime Communications obtained elite status based on their performance in volume and value as a member of the award-winning Aruba PartnerEdge Program. The program seeks to recognize high-performing partners by providing benchmarks in sales and technical certifications correlating to four status levels: standard, silver, gold and platinum.


3 Things to Consider When Developing Your Emergency Plan: Starting with Your Technology

In our schools, workplaces and government buildings, we fear the unimaginable: an armed intruder.

Because these unfathomable scenarios are becoming more common, this increases the need for a fully-integrated emergency response plan. If disaster strikes without one, nothing goes to plan—the proper personnel are not alerted, radio frequencies are overcrowded blocking the transfer of messages, and delayed video footage prevents law enforcement from efficiently tracking and evacuating the scene. Each of these examples were a reality on February 14, 2018 at Marjory Stoneman Douglas High School in Parkland, Florida.

The sales and engineering team from Prime Communications Inc. (PCI) recently completed a training session with Jerry Wilkins, PSP® NREMT®-EMR, and professional active-shooter emergency plan operations expert from Active Risk Survival, Inc. During the training he shared security footage from the scenario described above and the Virginia Beach shooting. No, it was not easy to watch.

“The most difficult aspect of the video,” said Shannon Neubauer, PCI’s Director of Security Engineering, “was the fact that the footage being monitored by first responders was 20 minutes old.” By the time it was used for situational assessment, the shooter already had left the area and some of the people in the video had lost their lives.

It’s not unusual for an organization to find it is not as prepared as it thought when a real incident happens. “I see so many companies who go through the time and effort to put together an emergency response plan but when I ask them how they are leveraging their technology with the plan, the response is I didn’t take that into consideration,” Wilkins explained.

As a society, we can do better. And we want you to know your technology integrator can help.


Securing Security: The Top Vulnerabilities and How to Solve Them

If you work for a large organization where it’s assumed that the business security solutions have been investigated and researched carefully or a small company with limited resources, as a security professional it’s unsettling to read headlines like, Equifax Data Breach Settlement: What You Should Know. Whether you had the foresight and funding to protect yourself from potential threats at the start or had to quickly respond to a specific incident when it arose, you’ve studied and purchased cameras, card access, electronic locks and cybersecurity software to establish a secure environment. But have you researched deeply enough to discover unexpected vulnerabilities that could allow your security solutions to be compromised? You should be actively, continually examining your system to protect it.


Understanding the Nuances of Integrated Hospital Security and Safety Systems: Saving Time, Money and Lives

It’s no secret that technology has exponentially increased the ability of hospitals to operate more efficiently, protect patients and staff in new ways, and of course improve services. With all this new tech, things can get confusing. The sheer amount of technology in a hospital after years of installations can cause a drop in efficiency rather than improving it. For many hospitals, it may be time to begin thinking seriously about technology integration.

Technology tools are commonly added one at a time as a hospital can afford them or as problems arise and solutions are found. Violence in an emergency room, for example, may lead to the purchase of new surveillance cameras and access controls – a type of technology that tends to be one of the first upgraded safety and security tools a hospital feels it can afford to install. In fact, after a violent event, many hospitals believe they can’t afford NOT to install these tools.


6 Vulnerabilities Even Your Firewall May Be Missing – and a Free Solution

Firewalls have become a standard tool for stopping malicious network activity. We have become increasingly complacent with our firewalls to the extent that we often fail to see what they might be missing. As technology – and malicious activities – advance, it’s natural for older firewall technology to fall short in their ability to uncover the latest vulnerabilities. For that reason, it’s critical to reevaluate firewall activity periodically and ensure the equipment in place is keeping up with current threats.

Unfortunately, not all firewalls are created equal, and their size and capabilities tend to be misunderstood. Even the most vigilant IT departments can miss things if the firewall is not quite right. This article will flag several gaps in protection you may not know you have and spotlight a method of getting your wall of protection as tight as possible.


Is cloud-based video management a fit for retail physical security? Here’s when it makes sense…

A multi-location retail security solution typically comes down to two components: (1) use hardware and software to prevent loss and (2) make it cost effective. In the past, these two needs have pushed against one another — the more effective the loss prevention, the higher the price of the hardware, software and services needed.

Now, with the adoption of cloud solutions for physical security these two targeted needs are becoming more closely aligned. In other words, the best technology is improving effectiveness and getting less expensive in certain scenarios.

Are cloud-based solutions right for your enterprise? Brian Freeman, National Sales Manager with Prime Communications Inc. (PCI), said it depends. “Using cloud applications for physical retail security is not right for everyone. The common belief is that everybody’s doing everything in the cloud, but there is a point where the technology is prohibitive based on the size of the deployment.”

This article discusses the benefits of cloud-based video management for physical retail security, explains how it works, and provides three scenarios to help you visualize how such a system might be used in your operation.


How to Manage Active Shooter Incidents in K – 12 Schools: Pairing Technology with Strategy

It was about 2 p.m. one afternoon when Shannon Neubauer found himself walking down an empty hallway at the Nebraska junior high school he had attended nearly 25 years earlier. As he reminisced, he heard sounds coming from the boys’ bathroom. He walked through the doorway and saw three students attacking a fourth boy. He was aware only school personnel should intervene, so he quickly exited and notified a teacher across the hall.

It was pure luck that Shannon happened to be passing by the restroom. The irony is that he is a security professional by trade, who was at the school to discuss installing additional cameras and other equipment to an existing unified security platform – with audio elements that can “listen” 24 hours a day for incidents just like the one he witnessed.

“Technology is giving us a way to take fallible humans out of safety situations, and that’s a good thing, especially when it comes to active shooter situations in K – 12 schools,” Neubauer said. “People can’t be everywhere at once. And we can’t always depend on humans to follow through in the heat of the moment.”

It’s not unusual for training to fail during a violent event. “During a panic, the school secretary may forget to press a panic button, or they might be the first one targeted by a shooter,” Neubauer explained, “If a manual panic button protocol fails for whatever reason, then lives are doubly at risk.”

Schools are not the only ones that need to remove the human element when seconds count. As technological tools have advanced over the past few decades, schools, retail establishments, government buildings and many other venues increasingly have been able to use technology to improve security – and save lives.

Today’s best-practices for school security systems are composed of three main elements: access control, event detection and response, and having these all feed into a unified security platform.

The key is to combine technology with well-thought-out strategies and training.


Integrator Vetting Survey: 10 Questions to Ask a New Business-Technology Integrator to Ensure their Success, and Yours

A business-technology integrator’s level of expertise and capabilities are often unknown quantities until you’ve had a chance to work with them closely on a project. All too often, they struggle to deliver what they said they could and then you end up with an even worse problem than you started with – or you spend a great deal of money and realize you’re not getting what you expected from it.

“You’d be surprised at how many enterprises tolerate companies who consistently fall short of delivering on their commitments,” said Brian Freeman, National Sales Manager of Prime Communications Inc. (PCI). “Things fall through the cracks due to a lack of process and there’s no way to know what’s going on until you have to deal with those problems on top of the technology needs you had in the first place.”