Territory coverage includes Indiana, Michigan, Ohio, Kentucky, West Virginia and Western Pennsylvania.
June 2nd event features new products, access to factory reps, hourly trainings including Atmos presented by Dolby Labs, exclusive show deals and product giveaways.
The consolidation of video systems delivers new levels of situational awareness and security intelligence.
Umberto Malesci explains what IoT is, what it does and gives real-world examples of IoT in action.
- By Ginger Hill
- May 29, 2015
Members of city council are demanding better security after a woman was sexually assaulted inside a Philadelphia parking garage.
- By Matt Holden
- May 29, 2015
Action steps people can take to make it more difficult for hackers.
- By Ginger Hill
- May 28, 2015
The Boston Public Library’s largest union had repeatedly complained about the lack of security during renovations.
- By Matt Holden
- May 28, 2015
Company provides security features and tools to empower individual account users.
- By Ginger Hill
- May 27, 2015
Advanced Biometric Access Control designed to teach physical security integrators all they need to know about successful migration from traditional card access systems to biometrics.
Oil tanker Oriental Glory averted by group of 30 pirates, went on board, robbed the crew and siphoned tons of fuel.
Full-service security integration firm to offer Immix command center software.
Increased access control security from thugs, delinquents, criminals and terrorists.
Newly strengthened partnership between AMAG Technology and Salient Systems provides unmatched security system for adolescent mental health hospital.
Protects electric power infrastructures from terrorist vehicle attacks.
IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.
Company delighted about government award for enterprise-wide physical security and security system integration support services.
Provides valued system integrators with the tools, resources and benefits needed to maximize long-term customer relationships and drive sales.
U.S. officials say all 11 threats were phoned in by a single person.
- By Matt Holden
- May 27, 2015
Company committed to being a true distribution partner.
Security efforts often hindered by losses related to theft, damage or other factors.
- By Brian McIlravey
- May 26, 2015
Company volunteers provided hands-on classroom opportunities for middle schools students at Chase Elementary in Chicago.
Single location automated process offers convenience and speed to system programming.
Effective communication enabled between operators and IP speakerphones deployed throughout a location in a single system.
A little investigative journalism identifies access control company's rather quiet change.
Tallying the number of alerts and breaches doesn't tell the whole story.
- By Ginger Hill
- May 26, 2015
Questions have now been asked in the wake of the incident.
- By Matt Holden
- May 26, 2015
Video features familiar faces, animals and animations.
- By Ginger Hill
- May 22, 2015
A new research paper found that people often choose obvious answers that are easy for hackers to guess.
- By Matt Holden
- May 22, 2015
Overall, reporting violent incidents is down 9% perhaps due to beefed up security.
Unified Command’s mobile security unit uses XProtect IP video management technology to manage crowd services with fast incident response.