Top Stories


Complete Perimeter Solution

Complete Perimeter Solution

A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples.

An Eye on the Campus

An Eye on the Campus

Every day, tens of millions of parents entrust schools with their children’s safety and every day, those parents worry if that trust is misplaced. In addition to the frequent headlines about school shootings, children deal with other pressing issues at school, whether it’s bullying, drugs or harassment.

Keeping the Bad Guys Out

Keeping the Bad Guys Out

Protecting government agencies requires the widest palette of security solutions with facilities ranging from a storefront military recruitment center to a bustling international airport or a biological research center.

Offering More than Products

Offering More than Products

In the security industry, our mission is critical: protect the people, places and things that matter most.

Total Cost of Ownership

As cloud computing and software as a service (SaaS) have evolved, video surveillance as a service (VSaaS) or cloud surveillance, has emerged as the most popular option for businesses seeking to simplify their physical security installations.

Making Your Expertise Unique

Making Your Expertise Unique

Every businessperson wants to bring something different, or unique, to the table when they talk about their business solutions. In the security industry, or more particularly, the security consultant, the same applies. You’ve got to have a secret sauce.

Solving Problems

Solving Problems

The industry is changing so rapidly that the following statement might seem bold but it’s true. No one wants to buy a camera.

Creating Cloud Platforms

Creating Cloud Platforms

Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.



Going High Tech

With the added video capabilities, Manteno authorities can alert agencies north or south of town to be on the lookout for specific vehicles with good description details.

A Smart Security Program

A Smart Security Program

Northwestern Mutual operated several disparate security systems for access control, alarm management, intercom, video and visitor management. The new building project provided an opportunity to upgrade the security system and overall security program.

Protecting Hard to Protect Areas

Protecting Hard to Protect Areas

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks.

The Command Center of the Future

The Command Center of the Future

At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).

Stick ‘Em Up, Partner

The TSA is implementing some pretty amazing technology in order to improve explosives detection. In late August, the agency unveiled a state-of-theart advanced technology computed tomography (CT) checkpoint scanner for screening passengers and their baggage.

Simplicity and Flexibility

Simplicity and Flexibility

Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.

Focus on Protection

Good business is about partnerships. Our cover story in this issue comes from Jeff Huggins who has written about different examples of not only keeping people secure, but also offering protection.

Chegg Data Breach Affects 40 Million Customers

Chegg Data Breach Affects 40 Million Customers

The hack dates back to April 2018, and compromised information includes email addresses and passwords.

Mozilla Launches Data Breach Notification Service

Mozilla Launches Data Breach Notification Service

“Firefox Monitor” will allow users to check whether their personal information and passwords have been part of a data breach

Delta Air Lines to Launch Nation’s First Facial Recognition Airport Terminal

Delta Air Lines to Launch Nation’s First Facial Recognition Airport Terminal

The terminal will be deployed at Hartsfield-Jackson Atlanta International Airport, and will allow travelers to use facial recognition instead of their passports to pass through checkpoints at the airport.

Live from GSX Day 3

Another busy day of GSX 2018 is in the books and with it came excited conversations, innovate products and streamlined solutions. With each booth I visited, I was excited by the new solutions and the potential deployments in the security space.

Tradeshow Brings Mixed Reviews

So, it all comes down to this. Today is the final day of the new GSX 2018, and the final tally should show a mixed review.

Apple’s New OS Has Severe Security Flaw

Apple’s New OS Has Severe Security Flaw

MacOS Mojave shipped with a bug that allows unauthorized access to a user’s private data.

Smarter, Not Harder

Each year at trade shows I like to identify common theme. Usually, I base this off of the conversations that I have in different booths throughout the the show. For GSX 2018, I talked with several companies who are in the business of working smarter, not harder. The kinds of buzz words I heard were: intelligent, artificial intelligence, smart, deep learning and machine learning.

Free VPNs are a Privacy Nightmare: Here

Free VPNs are a Privacy Nightmare: Here's Why

Understanding the details and the primary difference between free VPNs and paid ones.

Live from GSX: Day 3

Another busy day of GSX 2018 is in the books and with it came excited conversations, innovate products and streamlined solutions. With each booth I visited, I was excited by the new solutions and the potential deployments in the security space.

Axis Showcases Discreet Corner Surveillance, Bullet Cameras and More

In its continued vision to innovate for a smarter, safer world, Axis Communications announced a new innovation for discreet corner surveillance and its latest innovations in bullet cameras and multidirectional cameras will be showcased at the Global Security Exchange (GSX) tradeshow in Las Vegas, NV, September 25-27.

Campus Security Solutions at GSX

It is not a secret that campus security is the buzz word around events like GSX given the on-campus violence we have seen in the last year. Companies are putting their heads together and trying to figure out a better way to keep students, faculty and staff safer at K-12, universities, medical facilities, corporate campuses and more.

Celebrating Humanity

There are plenty of great things to talk about when it comes to a security tradeshow; however, there may not be anything more important that people coming together for a common cause.

Motorola Solutions Adds New Features to Ally Cloud-Based Security Software

Motorola Solutions recently announced new features for Ally, its cloud-based security software platform for enterprises in North America. Available now, the enhancements enable communication and real-time information-sharing for security teams.

Dortronics Features Latest Advancements in Door Control Solutions at GSX 2018

Dortronics, an industry leader in off-the-shelf and customized door control solutions, is showcasing the latest enhancements to its extensive product portfolio here at GSX 2018 (booth #714).

Success on the Show Floor

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3