Top Stories


5 Products that Define the Next Generation of Home Security

5 Products that Define the Next Generation of Home Security

These technologies are changing the game when it comes to keeping you safe and giving you peace of mind.

Taking a Practical Look at Video Storage in the Cloud

Taking a Practical Look at Video Storage in the Cloud

VSaaS solutions have been around for a while now, offering what many see as more efficient software maintenance and support for their surveillance systems.

Majority of Retailers are not using the New Credit Card Technology

Majority of Retailers are not using the New Credit Card Technology

Retailers are deciding not to change over to credit card chip transactions until after the holiday season.

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

7 Tips for CEOs Looking to Boost Their Cybersecurity Knowledge

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

Catching the Thugs - The San Diego Unified School District’s previous video surveillance solution presented a number of problems. It required two management servers in which most settings had to be replicated between the two, which was awkward and cumbersome.

Catching the Thugs

The San Diego Unified School District’s previous video surveillance solution presented a number of problems. It required two management servers in which most settings had to be replicated between the two, which was awkward and cumbersome.

Seamless Integration - Designed to a be a state-of-theart facility for students and faculty members at Oregon State University, Austin Hall could represent one of the most unique systems integration projects within the higher education market in the United States.

Seamless Integration

Designed to a be a state-of-theart facility for students and faculty members at Oregon State University, Austin Hall could represent one of the most unique systems integration projects within the higher education market in the United States.

Define New Models - Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

Define New Models

Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

Persistent Threats

A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection



Home Smart Home - When it comes to security and home automation, there are a lot of questions homeowners need to ask themselves. Do I want a smart home?

Home Smart Home

When it comes to security and home automation, there are a lot of questions homeowners need to ask themselves. Do I want a smart home?

Old Schools, New Designs

This issue of Campus Security & Life Safety has an interesting take on security. I think I’ve taken it for granted, but when you talk about camera installation, you have to think about the lens for the camera.

Join the Team - Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.

Join the Team

Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.

Insuring Access - In the decade that First Service Insurance (FSI) has conducted business in Roseville, Calif., it has provided contractors with specialized property and casualty insurance products focused on general liability, workers compensation, business auto and bonding/surety.

Insuring Access

In the decade that First Service Insurance (FSI) has conducted business in Roseville, Calif., it has provided contractors with specialized property and casualty insurance products focused on general liability, workers compensation, business auto and bonding/surety.

Keeping Your Customers Secure - Technology offers a variety of peace of mind benefits

Keeping Your Customers Secure

As interest in connected home technology rises, consumers are beginning to pay attention to its many safety and security benefits.

Using an Iris for Time and Attendance - At the peak of El Salvador’s sugar harvesting and processing season, the Ingenio Azucarero Injiboa mill in San Vicente becomes incredibly busy as hundreds of employees change shifts throughout the entire day, typically seven days a week.

Using an Iris for Time and Attendance

At the peak of El Salvador’s sugar harvesting and processing season, the Ingenio Azucarero Injiboa mill in San Vicente becomes incredibly busy as hundreds of employees change shifts throughout the entire day, typically seven days a week.

High Profile Events

Realizing the need for stronger surveillance in high-profile locations such as the marathon route, the city of Boston decided to increase civilian protection. The new security measures included doubling law enforcement personnel to about 3,500, the addition of bomb-sniffing dogs, and a SWAT team provided by the FBI.

Blinded by Graffiti -  vandalism and destruction of property are not the only concerns at schools. Sadly, theft, assaults and campus shootings are also important issues.

Blinded by Graffiti

Vandalism and destruction of property are not the only concerns at schools. Sadly, theft, assaults and campus shootings are also important issues.

Protect Your Data - In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Protect Your Data

In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

The Quest for Smarter Power - Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

The Quest for Smarter Power

Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

Getting a Great Deal - Most dealers know that it’s crucial to run a credit report before signing up a new account. But it’s also worth remembering that it’s not a minor detail, and even a borderline credit record may have long-term repercussions.

Getting a Great Deal

Most dealers know that it’s crucial to run a credit report before signing up a new account. But it’s also worth remembering that it’s not a minor detail, and even a borderline credit record may have long-term repercussions.

University of Florida Focuses on Life Safety

One of the campus’s current projects is the renovation and expansion of the Rietz Student Union that prompted the discovery of several ‘dead zones’ in the outdoor notification program.

Getting Involved - Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Getting Involved

Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Winning a Better Solution - There are many challenges associated with securing Specialized including theft protection and loss prevention, general security for employees, and protecting the company’s highly confidential trade secrets which are safeguarded at headquarters.

Winning a Better Solution

There are many challenges associated with securing Specialized including theft protection and loss prevention, general security for employees, and protecting the company’s highly confidential trade secrets which are safeguarded at headquarters.

Consider the Lens - This is a story of lens selection gone wrong, and right. Often it seems lens selection is not given much attention, and at worst is an afterthought.

Consider the Lens

This is a story of lens selection gone wrong, and right. Often it seems lens selection is not given much attention, and at worst is an afterthought.

One Size Does Not Fit All

This month I ventured out just a little bit to talk about residential security, though much of what I learned also applies to commercial and industrial security. No better place to learn about software than Silicon Valley.

Advanced Considerations - Employee mustering at industrial sites or large facilities has typically been difficult to efficiently manage due to the complexity of the situation and human factors.

Advanced Considerations

Employee mustering at industrial sites or large facilities has typically been difficult to efficiently manage due to the complexity of the situation and human factors.

Privacy Extortion - This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

Privacy Extortion

This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

Bridging the Great Divide - More than a decade ago, the talk was all about convergence. Well, the industry has converged, but there is now something more interesting on the horizon.

Bridging the Great Divide

More than a decade ago, the talk was all about convergence. Well, the industry has converged, but there is now something more interesting on the horizon.

One Touch Alarm - According to several studies, growth is now focused on “self-installed” products that piggyback on the popularity of smart phones and the tech-savvy millennials that use these devices for everything from banking to prepared food delivery.

One Touch Alarm

According to several studies, growth is now focused on “self-installed” products that piggyback on the popularity of smart phones and the tech-savvy millennials that use these devices for everything from banking to prepared food delivery.

Tight as a Drum - Imagine getting slapped with a $1 million fine for not adequately securing your facility. Think it can’t happen? Think again.

Tight as a Drum

Imagine getting slapped with a $1 million fine for not adequately securing your facility. Think it can’t happen? Think again.

New Strategies - As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches.

New Strategies

As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3