Top Stories


All Good Things Must Come to an End

ASIS 2017 might be over, but that doesn’t mean you can’t keep up with the top companies that were at the show.

…But, What About Las Vegas

By any estimation, ASIS 2017 was quite successful. Of course, Day 3 was light on the show floor but it always seems to be that way. Show organizers went the extra mile providing a light lunch to exhibitors.

Great Campus Security Solutions at ASIS

Last week at ASIS, several companies had great products for the Campus Security vertical. Here are just a few of the best items we saw while attending the show.

Las Vegas Strip Shooting Becomes the Worst Mass Shooting in U.S. History

UPDATE: 59 Killed and 500 More Injured in Las Vegas Shooting

At least 50 are dead and 400 more are injured after shots rang out from 32nd floor window into a crowd of concert-goers.

Smart locks like Kwikset

How to Increase Smart Locks Sales by Going Beyond the Front Door

The main entry to every home is an ideal starting point for smart locks sales.

How Your Organization Can Avoid Getting Hacked

How Your Organization Can Avoid Getting Hacked

It seems we can’t go a single day without a new data breach making headlines.

Multiply and Conquer

Technology is increasingly being used as a force multiplier to help law enforcement agencies protect and serve. One way agencies are turning technology into a crime-fighting tool is by creating what’s called a “virtual fence” around a perimeter, such as city limits or a parking lot, by installing a network of license plate reader (LPR) cameras to monitor an area.

Man Overboard!

Man Overboard!

Many of us have gone on a cruise vacation or know of a close friend or relative who has done so. Cruising is a popular vacation option enjoyed by families and individuals throughout the world.



Multi-dimensional Applications

According to a number of studies, hospital crime and violence have been growing at an alarming rate in recent years. The wide variety of security threats that healthcare facilities face include theft by employees or visitors, violence or threats from visitors or patients, and other crimes of opportunity.

Taking Stock of Security

Throughout the course of a calendar year, we take a look at numerous security solutions, events and, in our case, publications. In this issue, we have a specialty publication that focuses on government security. Security in the public sector is a big deal.

Providing a Network Link

Providing a Network Link

Outdoor wireless bridges are used to provide a network link from one location to another. You may want to network surveillance cameras back to your main office building, or share Internet and network access with another building on your campus.

Engaging a Rapid Response

There is more than one reason why emergency vehicles have lights and sirens. Several years ago, there was a campaign by the Ohio state fire marshal which was, “Move right for lights and sirens.” This makes a lot of sense, allowing emergency response to get where they need to be with minimum interference.

The Next Big Step

The Next Big Step

Individuals have found that their phones and other smart devices can be used in their own homes to operate locks, and—along with the push for more IoT-enabled devices at work in general—they have come to expect the same level of sophistication and convenience at work.

Grow Your Business

Grow Your Business

Doing business with the government—federal, state or even local—can be very difficult. The regulations, the paperwork, the unique needs and buying cycles are all tough requirements that have to be met. It can make for a complicated scene, but it’s also a vitally important business that can be financially rewarding despite the challenges.

All the Hype

All the Hype

Alongside the hype in the media about the border wall, this might be a good time for commercial and industrial companies to take a closer look at their own borders. Threat levels are increasing due to rising crime, civil activism and even cyber threats and it is more important than ever to push the line of defense all the way to the borders.

Anti-ram Fencing

Vehicle ramming attacks are on the rise in the United States and abroad. Already in 2017, there have been no less than seven major attacks worldwide resulting in 24 people dead and another 153 injured.

Time for an Upgrade

Time for an Upgrade

When a regional traffic management center in Washington state outgrew its building—as well as the size of its roadway monitoring system— the staff realized it was time not just for a physical upgrade, but a technological one, too

Cannabis Cash - How do you secure your place in the weed business?

Cannabis Cash

Where is all the money in the marijuana business going? Who is moving the cash or product as it seems to be in the news all the time? Here we share why it’s important to your business that you know how this is all happening.

Using the Cloud

Using the Cloud

Today, cloud applications are all the rage and for good reason. The cloud allows us to work and play in ways that are so much more productive and engaging.

Minimize Crime

Minimize Crime

The city of Hartford, Conn., first began expanding and upgrading its surveillance capabilities in 2013 with a new Public Safety Complex and police headquarters. The city enlisted Vulcan Security Technologies to implement a new IP video system that could expand to include hundreds of cameras.

A Better Defensive Line

A Better Defensive Line

In the United States, technology has become the essential force multiplier. With nearly 6,000 miles of border with the neighboring north and south, it would be impossible to hire enough border personnel to protect every mile.

Bridging the Gap

The mobile ID revolution is gathering pace, but not everyone has a smartphone today, and many citizens prefer to carry a physical card. How do government agencies manage this transition from physical to mobile, and ensure they can issue both cards and mobile ID at the same time?

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

As new technologies emerge, ever-vigilant fraudsters remain hard at work searching for and exploiting system weaknesses before they can be patched.

Whole Foods Investigating Credit Card Security Breach

Whole Foods Investigating Credit Card Security Breach

The grocery chain has "recieved information reguarding unauthorized access of payment card information."

Technology Reaching Into the Cloud

For the past 14 years, Security Today magazine, Open Options and Axis Communications have hosted the annual Security Industry Party. This year, at the House of Blues. Open Options has been a great partner, and along the way, we have added new partners to help sponsor an event that brings people together after two days of hard work on the ASIS show floor.

Axis Communications Opens New Axis Experience Center in Texas During ASIS

Axis Communications Opens New Axis Experience Center in Texas During ASIS

Axis Communications announced the grand opening of their newest Axis Experience Center (AEC) in Irving, Texas.

Arecont Vision MegaVideo 4K Ultra-High Resolution Box Camera Announced for Demanding Surveillance Applications

Arecont Vision®, provider of IP-based megapixel camera technology, announces the availability of the full-featured MegaVideo® 4K/1080p dual-mode day/night indoor box camera series.

IDIS to Spotlight Extended Warranties, Enhanced Video Surveillance Technology, and Deep Learning at ASIS 2017

IDIS will be returning to the ASIS International Seminar and Exhibition this year in Dallas, Texas, as part of the company's year-long 20th anniversary celebration and "Two Decades of Innovation" global showcase of IDIS video surveillance technologies.

Axis Communications Showcases Network Radar Technology for Accurate Area Detection at ASIS

Axis Communications, the market leader in network video, today introduces its new AXIS D2050-VE Network Radar Detector at ASIS International. Radar technology is used for accurate and reliable area detection of moving objects in different light and weather conditions. The technology is a nice complement to Axis cameras with video motion detection, like PTZ cameras, and is designed to integrate with Axis video management systems (VMS)

March Networks Introduces Enterprise-Class Command Center Software Solution

March Networks®, a global provider of intelligent IP video solutions, is pleased to introduce its new March Networks Command™ Center.

Featured

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3