Top Stories


Best Practices for Companies to Maintain Control of Sensitive Data

Best Practices for Companies to Maintain Control of Sensitive Data

A world saturated with digital data needs assurance that this data won't fall into the wrong hands.

Zetes Produces Senegalese Biometric Visa with Lumidigm Fingerprint Sensors

Zetes Produces Senegalese Biometric Visa with Lumidigm Fingerprint Sensors

Visitors to Senegal now pass through Lumidigm sensors at embassies, consulates and border posts.

Honeywell WiFi Repeater Enhances Camera Networks in a Connected Home or Business

Honeywell WiFi Repeater Enhances Camera Networks in a Connected Home or Business

Extend signals to increase locations in homes and businesses where IP cameras can be installed.

Bosch Releases Remote Security Control App for Android Devices

Bosch Releases Remote Security Control App for Android Devices

Delivers flexibility and convenience to customers.

Oncam Grandeye 360 Degree Technology Chosen to Protect Shannon Airport in Ireland

Oncam Grandeye 360 Degree Technology Chosen to Protect Shannon Airport in Ireland

With a myriad of challenges, the terminal was tackled first.

Bozeman Yellowstone International Airport

Bozeman Yellowstone International Airport

Adding space and the increase in air travel the airport decided to upgrade its aging surveillance system.

Mass Notification Software Adopts Smartphone Based Alerts

MNS software embracing additional ways of delivering alerts by using push notifications and apps to provide more robust notification systems.

Personal Safety Tips to Help You Through the Holiday Season

Personal Safety Tips to Help You Through the Holiday Season

As personal safety seems to becoming a trend, it is wise to brush up on personal safety tips.



VMP Debuts 19 Inch 12RU Wall Rack Enclosure at 2013 ISC East

VMP Debuts 19 Inch 12RU Wall Rack Enclosure at 2013 ISC East

The ERWEN-12E works with all standard 19-inch rack equipment and accessories, and is designed to get equipment off the floor and op on the wall when floor standing equipment racks just won’t do.

Mobility is Now an Essential Tool for Security Operations

Mobility is Now an Essential Tool for Security Operations

Businesses that accept and embrace mobile communications and information will have a sustainable business advantage in the future.

Nominations for SIA Board of Directors

Nominations for SIA Board of Directors

Election to take place at The Advance! SIA Annual Meeting at ISC East in New York.

Spectra Logic Unveils Tier that Stores Massive Data for Pennies per GB

Spectra Logic Unveils Tier that Stores Massive Data for Pennies per GB

Deep storage appliance delivers the most scalable and cost-effective, long-term storage.

SALTO RFID Access Solution Secures All Doors But One at Oglethorpe University

The liberal arts institution takes IT security to the next level.

Spectra Summit Welcome Reception Offers a Taste of What is To Come

"Forever Data 2013" details the vision of Spectra Logic's future and the data storage industry.

Top 3 Internet Security Myths

Top 3 Internet Security Myths

Methodical approach and identifying the right tools to meet individual needs is key to security against cyber threats.

Trikke Adds to the Fun of ASIS 2013

Trikke Adds to the Fun of ASIS 2013

As if tradeshows aren't fun enough on their own, add a movable vehicle to the mix and you have sheer excitement!

Tri Ed Releases its 2013 to 2014 IP Products Catalog

Tri Ed Releases its 2013 to 2014 IP Products Catalog

Dedicated solely to IP video, over 80 pages of products from 50 industry IP manufactures are highlighted.

L3 Security and Detection Systems Products Now Available Through GSA Advantage

L3 Security and Detection Systems Products Now Available Through GSA Advantage

President of L-3 Security & Detection Systems pleased to be listed on GSA website.

ASSA ABLOY Announces Integration of Aperio Wireless Technology with Vanderbilt Industries

ASSA ABLOY Announces Integration of Aperio Wireless Technology with Vanderbilt Industries

Provides security systems with customized applications designed to fit specific client requirements.

AtHoc to Support New Twitter Emergency Alerting Capability

AtHoc to Support New Twitter Emergency Alerting Capability

Authoritative communication during emergency situations is key to saving lives, reducing injury and ensuring security.

Seneca Introduced Certified Client Viewing Stations at ASIS 2013

Seneca Introduced Certified Client Viewing Stations at ASIS 2013

xView Viewing Stations scale from single site, single display to multi-site, video wall configurations.

Tri Ed Roadshow in Dallas Texas Educational for All

Tri-Ed Roadshow in Dallas Texas Educational for All

Learn all about going hybrid and how to install an HD IP system in less than an hour!

Protecting Mobile Data Across Multiple Platforms and Devices in the Enterprise

Protecting Mobile Data Across Multiple Platforms and Devices in the Enterprise

With sensitive documents spread across tablets, laptops, smartphones and other devices, how do businesses keep this data safe?

ASIS 2013: A Fabulous, Educational and Hands-On Experience

With my second security industry tradeshow under my belt, I re-packed my suitcase and bags now full of jump drives containing press releases highlighting the new products seen at ASIS 2013 in Chicago

aptiQmobile Turns Smartphones into Credentials

aptiQmobile Turns Smartphones into Credentials

aptiQmobile is now commercially available to all.

A Dose of Optimism

I’ve been to many tradeshows over the years. Probably just about as many as our loyal readers, and I have to say this year’s ASIS was probably about the best ever.

Beat the Competition with Quality

A business that is successful in a competitive market over a long period of time, with repeat customers, must be providing a product or service that meets or exceeds customer needs. This means the company is providing quality using best business practices.

Storybook Ending

Whether it was “Goldilocks and the Three Bears,” “Hansel and Gretel” or “Red Riding Hood,” we all had our favorite fairy tales as children. As adults, it seems these stories fade into the background of our memories, only remembered if we have children of our own.

Remote Monitoring of Critical Infrastructure

Remote monitoring of critical infrastructure used to be very difficult, but thanks to available technologies, this task can be achieved with a fraction of the resources required in the past.

Cooling High Crime Hotspots with Mobile Surveillance Technology

Like many small town police departments seeking to maintain neighborhood safety, the Village of Glenwood, Ill., needed to squeeze every ounce of value from its law enforcement tools.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3