Top Stories


IT Security Compliance for Cloud Service Providers

Compliance with increasingly stringent regulations for organizations providing outsourced IT services, particularly in regards to data protection, is becoming more difficult.

Your Biometric Accepted Here

Your Biometric Accepted Here

While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.

Taking Charge Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own hands

Taking Charge

Distributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world.

Pitching a Better IP Solution

Pitching a Better IP Solution

IT professionals are becoming increasingly involved in video surveillance initiatives across all industries. It’s time to build strong relationships with the IT side of the house and include them in discussions about any new system that will piggyback on their backbone.

Weatherproof Your Equipment

Weatherproof Your Equipment

The days of security systems guarding primarily against theft, vandalism and violence are long gone; instead, camera systems are mostly to protect companies against liabilities such as accidents and negligence.

A Brave New World Power protection is significant in the networking and IP camera space

A Brave New World

While businesses will spend thousands of dollars on cameras and recording systems, alarms, intrusion detection, emergency communication and theft prevention, many overlook the need for systems’ power protection.

World-Class Security

As the only 24/7 neighborhood in Chicago, River North and Friedman Properties have a shared vision for the area to ensure that success will continue to present itself: aligning the right tenants with the right buildings, demanding the best in security and investing purposefully.

Energy Distribution

Energy Distribution

When officials at the United Illuminating Co., a regional energy distribution company in New Haven, Conn., planned the recent completion of their 56-acre corporate headquarters, their “must-have” list included a campus-wide Emergency Communications System (ECS).



Apprehending the Internal Thief

Some of the most discouraging statistics in the security industry are the record numbers reported in shoplifting from dishonest employees. Recent numbers reported by Jack L. Hayes International shows that those numbers have increased yet again.

A Crash Course

A Crash Course

From pedestrian-filled farmers markets and universities to new and used car lots, a wide variety of agencies find peace of mind through the use of barriers, bollards, barricades and crash gates for vehicle-based physical access control at the perimeter.

Security at the Department of Defense is Weaker than You Would Think

Security at the Department of Defense is Weaker than You Would Think

Security clearance is given to thousands of people who owe the IRS money.

Allegion Warns Against Quick Fix Lockdown Practices

Allegion Warns Against Quick Fix Lockdown Practices

Safe School Week message: Avenues available to fund door hardware upgrades to better protect teachers and students.

Honeywell Welcomes Summit Security Systems to First Alert Professional Dealer Program

North Carolina security dealer provides hosted services and video verification to homeowners and small businesses.

SightLogix Protects Major Class 1 Railroad with Smart Thermal Cameras

Funds allocated to freight railroad carriers to strengthen ability to protect against threats and to maintain security of critical surface rail infrastructure.

Remote Eyes Integrates with Squirrel Systems

Loss prevention solution for hospitality users of Squirrel POS Software.

Undetectable Security Flaw Found in USBs

Undetectable Security Flaw Found in USBs

Reverse engineered firmware revealed an embedded controller chip that could be the beginning of wreaking havoc on computer systems.

Michael Dell Makes Multi-Million Dollar Investment in Cloud Surveillance Company Eagle Eye Networks

The IT world is beginning to take notice of cloud surveillance solutions. Case in point, industry newcomer Eagle Eye Networks announced today that Dell computer founder Michael Dell has made a multi-million dollar investment in the company.

BCDVideo Unveils 72TB Video Recording Platform

Adding to their Nova Series line-up, BCDVideo has begun shipments of the BCD350V8 Video Recording Platform, available in either tower or 5U rack-mount formats.

Two Nations, One Big Opportunity

Two Nations, One Big Opportunity

A look at public space surveillance on either side of the Atlantic highlights how it came of age.

A How-To Guide on Building a Federal Information Security Team

A How-To Guide on Building a Federal Information Security Team

Here is a list to help develop an all-star team of employees that will protect your information.

JFK Airport Perimeter Breached by Kayakers

JFK Airport Perimeter Breached by Kayakers

After millions of dollars spent on perimeter security, no alarm sounded and two men were found.

Mystic Aquarium Ups Their Security with Keri Systems

Because it is a public facility that houses a significant and valuable marine life population, Mystic Aquarium was in need of more sophisticated control of access than traditional methods.

EU Google, Microsoft and Yahoo Meet on

EU, Google, Microsoft and Yahoo Meet on 'Right to be Forgotten'

Questions still remain about the implementation and effectiveness of this rule.

Viscount Awarded New Contracts for US Department of Homeland Security

Company secures U.S. Federal Government facilities in Missouri and Massachusetts.

FST Biometrics Receives Lenel Factory Certification Under Lenel's OpenAccess Alliance Program

FST Biometrics' In Motion Identification (IMID) software interfaces with the Lenel OnGuard access control security system.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.

S2 Security Strengthens Channel Partner Support

Expanded S2 Channel Partner Program to accelerate partner business growth.

PPM Certifies Its Incident Management Integration

Now a member of AMAG Technology's Symmetry Extended Business Solutions (EBS) Program.

Kwikset Kevo’s Latest Upgrade Introduces Free Unlimited Guest eKeys

Home access management becomes even more convenient for current and future Kevo owners; gives guests 24-hour access to the home, and sets day and time constraints.

OnSSI Receives Lenel Factory Certification Under OpenAccess Alliance Program

OnSSI’s Ocularis v3.8 approved for use with Lenel’s OnGuard Access Control Security System.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3