Top Stories


Going Mobile

Going Mobile

Security threats are growing at the same time that users are demanding the ability to confidently connect to and use more applications, on the go, than ever before, with a single, trusted ID that can be carried on a smart device.

Ensuring Safe Environments

People usually think of doors as a means of keeping someone out, or alternately, keeping someone in. Doors provide privacy and, when locked, a level of security that is both simple and effective

Ask Every Question

Dealers and systems integrators who specialize in selling alarm equipment know that once the sale is made, the transaction may be complete, but the customer relationship is just beginning.

Being Bold

Being Bold

Interface Security Systems (ISS) is a cloud-based managed security services provider. The company integrates network and security needs into one platform, with the goal of being a singlevendor source for their customer’s needs.

Today’s Focus

Safe City initiatives are one of the best ways to build an efficient, proactive security posture that strives to enhance safety and propel increased collaboration between city officials, security leaders, law enforcement and first responders.

The Smart Devices

A study commissioned by Intel found that roughly 16 percent of Americans now own at least one smart home device, but nearly 70 percent of those surveyed believe smart homes will be as commonplace as smartphones in the next 10 years.

Educating End Users

As a provider of storage for video surveillance systems, the hardest part of my job is educating end-users, integrators and consultants on the best way to purchase storage for their systems.

Seriously Cybersecurity Insurance

The thought of a network or individual cameras getting hacked brought cybersecurity into the security picture pretty quickly. Cyber questions also arise when discussing cameras being manufactured in China.



A Virtual Gateway

Three years ago, Shrader Engineering had the privilege of designing one of the most unique security concepts in the region for the city of Sugar Land, Texas, Police Department. The security system forms a “virtual gateway” throughout the city.

Getting The Most

Getting The Most

The large geographical area and variety of locations and assets to protect make municipal video surveillance particularly challenging.

Comprehensive Security Plan for Final Four

Comprehensive Security Plan for Final Four

Glendale and Phoenix security officials feel confident in the security plan that will form around the men’s basketball tournament.

Clay Locking Platform is the Smarter Way to Open Doors. From Wherever You Are.

Clay Solutions B.V. has announced the release of Clay Locking Platform – the only API that makes it possible to integrate cloud-based access control to existing businesses and product portfolios.

SALTO Systems Names Adam Reed As Western Regional Sales Manager

SALTO Systems, a leading manufacturer of electronic access control solutions, has appointed Adam Reed to the commercial sales team position of Western Regional Sales Manager.

Erratic Driver Causes Chaos on Capitol Hill

Erratic Driver Causes Chaos on Capitol Hill

Shots were fired when U.S. Capitol Police tried to stop an erratic driver on Wednesday morning.

Security Changes at Magic Kingdom

Security Changes at Magic Kingdom

To improve customers’ entrance experience, Magic Kingdom is pushing their security checkpoints outside the transportation and ticket center.

Milestone Systems Announces New Senior Level Appointments to Drive Growth

Two new VP and Director positions and four significant internal promotions and appointments jump-start Milestone in 2017

Newly Consolidated Panasonic Security Business to Provide Integrated Security Solutions

Panasonic announced that its Panasonic Security Business Group has formally integrated the company’s security camera and related devices business with the business of Video Insight.

Drone Proposal Includes Identification Transmit

Drone Proposal Suggests Identification Transmit

Drone manufacturer, DJI, proposes that drones continually transmit identification.

Revolutionary Wearable Worker Safety

Revolutionary Wearable Worker Safety

Occly™ is a wearable personal safety device worn on the body or clipped to an accessory.

London Police Review Security, Search for Motive Following Attack

London Police Review Security, Search for Motive Following Attack

Britain police are looking to review security efforts around Parliament after a vehicle and knife attack that killed four people.

Connected Security Expo Returns to ISC West For its Second Year

After a successful inaugural run in 2016, the Connected Security Expo is back for year two at ISC West 2017 with some important changes.

Get the Most out of ISC West 2017

Take a walk around the show room floor, talk with those you do business with and post on social media!

Nightclub Shooting in Cincinnati Leaves 1 Dead, 15 Injured

Nightclub Shooting in Cincinnati Leaves 1 Dead, 15 Injured

Police are not investigating this incident as terrorism.

3 Packing Tips for ISC West

3 Packing Tips for ISC West

If there is anything I’ve learned in my one year at ISC West it’s how to pack for the event.

Check out These ISC West Education Sessions

Each year, ISC West offers some amazing sessions for attendees. There are almost 100 to choose from, so there is bound to be more than a few you'd want to check out. Plus, it's a great way to hear about new technologies, network and build some rewarding work relationships.

How to Prepare for ISC West

No matter how many times you've been to ISC West, the sheer size of the show will never cease to amaze.

Credit Union Upgrades Video Surveillance Solution to Prepare for Future Capabilities

Credit Union Upgrades Video Surveillance Solution to Prepare for Future Capabilities

When the largest credit union based on Vancouver Island and the Gulf Islands off the coast of British Columbia decided to deploy a March Networks enterprise-wide video surveillance system in 2013, the opportunity to take advantage of advanced functionality was top of mind.

The Big Push

About 1,000 of our best friends will be putting their latest technology on display in Las Vegas next week, and I'm anxious to see what's new and what has evolved over the past few months.

Vicon Introduces Wide Selection of H.265 Cameras at ISC West

These HD Cameras Reduce Bandwidth Utilization and Storage Requirements

How to prepare your network and defend against the “Gadget Hordes”

How to Prepare Your Network and Defend Against the “Gadget Hordes”

With each passing year, network and security administrators have been faced with more and more devices appearing inside the walls of their corporate network.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3