Top Stories


Viisights Wise 3.0 Ushers in Next Generation of Behavioral Recognition Video Analytics

viisights, Inc., a global leader in behavioral recognition video analytics, announces the release of Wise 3.0, ushering in the next generation of advanced proactive and preemptive analytics for professional security, safety and business intelligence applications.

Bosch to Acquire Paladin Technologies and Expand Its Building Services Business in North America

Bosch plans to acquire Paladin Technologies, Inc., headquartered in Vancouver, Canada – a provider of security and life safety solutions and system integration services in North America.

i-PRO Receives OMNIA Partners (formerly NCPA) Award to Help Protect the Public Sector with Edge-based AI Analytics

i-PRO Americas Inc., a global leader in professional security solutions for surveillance and public safety, today announced that it has been awarded a contract from OMNIA Partners (formerly NCPA).

Gunnebo Entrance Control Welcomes New Marketing Team to Drive Growth and Innovation

Gunnebo Entrance Control, a global provider of entrance control solutions, is pleased to announce the expansion of its marketing team, with new appointments dedicated to driving growth, enhancing brand visibility and delivering innovative marketing strategies.

SaaS Applications Have a Mind of Their Own

Multi-cloud environments are common, and popular because they simplify what used to be complicated workflows, and they help organizations stay connected in an efficient manner. They do, however, also pose a significant cybersecurity challenge because they allow users to play multiple roles and have numerous constantly changing privileges.

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

Veza recently announced that City of Las Vegas has deployed Veza to secure access to sensitive data and critical infrastructure as it moves from a centralized, legacy infrastructure to a hybrid, multi-cloud environment.

DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced a new solicitation to create, improve and implement a new set of tools that protect the privacy of individuals when using digital credentials that can be used for a variety of purposes including travel, immigration and citizenship status, employment, residency status and more.

IDIS Expands It's Outside Sales Team With The Addition Of 1 Volt Associates

IDIS, a manufacturer of trusted South Korean-made video tec, is pleased t announce it has retained manufacturer’s rep firm 1 Volt Associates to broaden its presence in the Eastern and Mid-Atlantic regions.



Winter is coming - is Your Access Management Process Recession-proof?

Last year, we survived the summer of ransomware and faced a potential global recession, higher inflation and geopolitical tension - a wobbly energy market and rising interest rates. The million-dollar question is what the state of an exhausted workforce means to cyber security, especially as recessions bring a high turnover rate.

AMAG Technology Welcomes Ann Marie Mansfield as Director, Commercial Excellence

AMAG Technology, an Allied Universal CompanyⓇ, announces the hiring of Ann Marie Mansfield as the director, Commercial Excellence.

Iris ID is the Lead Supplier of Iris Biometric Technology for Participants in the FBI Iris Service

Iris ID, a global leader in iris recognition technology for 25 years has been supporting the FBI since the initial pilot of the Next Generation Identification (NGI) Iris Service in 2014.

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Keeper Security has recently released the results of its latest study, The Keeper Password Management Report: Unifying Perception with Reality. Assessing the password habits of over 8,000 individuals across the US, UK, France and Germany , the report reveals that 3 in 4 (75%) people globally don't adhere to widely-accepted password best practices, with a majority (64%) either using weak passwords or repeat variations of passwords to protect their online accounts.

MCi Protects its Customers Worldwide with Enterprise-grade Cyber Security

Serving state, local governments and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls Inc. (MCi) needed to transform its cyber security to the world-class level expected by its long list of prestigious customers.

Iris ID Works with Leading Fortune 100 Companies

Iris ID, a provider of iris recognition technology for 25 years, continues to experience outstanding success in establishing partnerships with numerous Fortune 100 companies. Leveraging its cutting-edge iris recognition technology, Iris ID has emerged as a preferred choice for enhancing security measures using the highest form of biometric identity authentication and verification to best safeguard the integrity of critical operations at leading organizations.

Hanwha Vision America Integrates WAVE VMS with AMAG Access Control Systems

Hanwha Vision America has completed the integration of its Wisenet WAVE video management system with AMAG Technology's Symmetry Access Control software, delivering greater system choice and flexibility for customers, especially in AMAG’s key markets including data centers, finance, banking, commercial, healthcare and education.

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Nearly three-quarters of all cyberattacks involve ransomware which means a majority of defenders are failing to detect ransomware successfully. The fact is, ransomware isn’t the first stage of the attack, it’s often the last stage; and cyberattacks usually get labeled or categorized as ransomware when data is encrypted or stolen and a ransom is demanded by cybercriminals.

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

Everyone in recent months has been busy either debating the merits of ChatGPT and similar natural language generators—or have been busy using them. The amount of material these AI-driven platforms will produce is mind-boggling, since there seems to be no shortage of businesses and content writers who feel they can benefit from the striking shortcuts these platforms provide. ChatGPT was in fact able to reach 100 million users in its first two months of public existence.

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens, a provider of advanced detection systems for security and safety applications, is proud to announce its partnership with Transparent BPO, a business process outsourcing and contact center organization. This collaboration further enhances Transparent BPO’s already impressive security infrastructure to protect client data.

Survey: More Than 40% of IT Leaders Doubt Their Digital Infrastructure Is Prepared to Accommodate AI Tech

More than four in 10 IT leaders surveyed globally (42%) believe their existing IT infrastructure is not fully prepared for the demands of artificial intelligence (AI) technology, despite its widespread adoption across industries

Why Integrators Should Offer Surge Protection

Why Integrators Should Offer Surge Protection

Picture this – you have just completed a relatively large security system installation for a new enterprise client. The cost of this new system was well into the hundreds of thousands of dollars, representing a significant investment for both you and the deploying organization. But less than a month after install, the customer calls you upset and in a panic.

Why Hackers Have Their Sights Set on Healthcare

Why Hackers Have Their Sights Set on Healthcare

We see it time and time again, the headlines splashed along newspapers and email newsletters that a hospital or its network of offices have been hit in a cybersecurity attack. Now more than ever, we continue to expect that attackers will target nursing homes, doctors’ offices, and other medical facilities due to the immense pressure the industry is facing to modernize. While the advancements in technology are vital to ensuring better patient care, they also open doors for threat actors everywhere.

Holley Hunt Joins Robotic Assistance Devices as Vice President of Strategic Partnerships

Artificial Intelligence Technology Solutions, Inc. a global leader in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices Inc. (RAD), today announced that Holley Hunt has joined RAD in the newly created role of Vice President of Strategic Partnerships.

Meet Modern IP Audio Solutions

Meet Modern IP Audio Solutions

When Binghamton University decided to upgrade its security capabilities, university administrators made sure to include cutting-edge audio solutions.

Altronix Appoints New Rep Firms to Strengthen its Footprint in the Northeast U.S. and Canada

Altronix, a leading manufacturer of low voltage power supplies and transmission solutions for the professional security industry, announces the appointment of two new independent sales teams covering the Northeast United States and all of Canada.

ASSA ABLOY Integrates Aperio® Wireless Technology with Verkada Command

ASSA ABLOY Opening Solutions completed the integration of their Aperio® wireless lock technology with Verkada’s Command cloud-based management platform, delivering a fully integrated hardware and software solution that strengthens safety while simplifying management and lowering total cost of ownership.

Axis Communications Optimizes Production to Conquer Supply Chain Constraints

Axis Communications, an industry leader in video surveillance, announced today that the company has reached key supply chain milestones, including more than 45% year-over-year increase in Q1 deliveries with continued growth through May 31, and record inventory levels in its Americas distribution channel to meet strong demand from integrators and end customers.

Becklar Adds Eyeforce Remote Guarding to Its Expanding Portfolio

Becklar, the parent company of AvantGuard, Armstrongs and Freeus is pleased to announce the acquisition of Eyeforce a provider of wholesale monitored remote guarding solutions.

Convergint Acquires Ballou Fire Systems, Expanding Fire Alarm & Life Safety Business

Convergint, a global leader in service-based systems integration, today announced it has acquired Ballou Fire Systems, LLC, a Houston-based integrator that designs, installs and services electronic life safety, security, and communications systems.

Report: Advanced Phishing Attacks Grew By 356 Percent in 2022

A report recently published by Perception Point, a provider of advanced threat prevention across digital channels, has identified a 356% growth in the amount of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of attacks increased by 87%, highlighting the growing threat that cyber-attacks now pose to organizations.

Former TSA Executive Joins K2 Security Screening Group

K2 Security Screening Group, an industry leader in the planning, installation, integration and management of airport passenger and checked baggage security screening systems, today announced the appointment of Girard (Gerry) Phelan as the company’s senior director of Capability Delivery.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3