Top Stories


Apple Watch

The Security Features of the Apple Watch

We don’t know much yet, but Apple has shown a few features that will help keep your information safe.

CertainSafe Prevents Payment Card Industry Data Breaches

MicroTokenization adds protection to data “around the card," adding to the newest requirement set for October 2015 EMV Standards.

IDSecurityOnline.com Launches New ID Card Service Bureau

Improve efficiency and turnaround time for customers.

Open Options Upgrades to New Headquarters

Access control company’s growth prompts need for more space.

Honeywell Expands Performance Series IP NVR

Compatibility with Honeywell’s equIP and Performance Series cameras multiplies options for customized surveillance systems.

7 Steps to Keeping a Connected Home Safe

7 Steps to Keeping a Connected Home Safe

There are steps anyone can take to ensure hackers will have a more difficult time accessing your system

Airport Security Mix-Up Brings NFL Player to Elementary School

Airport Security Mix-Up Brings NFL Player to Elementary School

The player accidentally swapped laptops with a principal while going through security.

Tri-Ed Releases 2015 Product Catalog

250+ page catalog features thousands of products in various categories.



School Break-in Averted with Measures Provided through Stanley Security Grant Program

Montessori School of Dayton credits security products and services as preventing crime.

ZKAccess Releases BioCam300

An affordable, IP-based, stand-alone access control camera.

$5 Million Gold Bar Heist

$5 Million Gold Bar Heist

After further investigating, one detective believes it could have been an inside job.

Woman Rams Police Car at Miami International Airport

Woman Rams Police Car at Miami International Airport

The FBI has since taken over the investigation.

SmartTek Systems Grants OnWatch of Australia Exclusive Rights to App Trio

Agreement opens floodgates for international expansion.

Tri-Ed Sales Meeting Rallied Support for Mission 500

450 backpacks filled with notebooks, folders, rulers, pencils and other nece3ssary items for childhood education.

3xLOGIC Acquires infinias Access Control Lines

Company grows to over 120 employees, with 50% devoted to R&D and innovation.

Tri-Ed Welcomes Arecont as a New Vendor Partner

Now offering complete line of company's Megapixel, IP cameras to customers across North America.

Class Teaches How to Safely Carry Gun and Baby

Class Teaches How to Safely Carry Gun and Baby

The focus is on parents who engage in "babywearing," carrying an infant or small child in a sling or other type of carrier.

Clinton

Clinton's E-mail System Not As Secure As Intended

A misconfigured encryption system left it vulnerable to hacking.

Doyle Security Goes with SmartTek Systems Mobile Personal Security App

With nearly a century in business, now offering central station-based Smartphone app that provides anywhere, anytime life protection services and new revenue stream for its business.

IDEAL Networks Showcases Video Surveillance Troubleshooting Equipment at ISC West 2015

Cable certifier, verifier and tester allow network administrators to confirm correct installation of copper and fiber network cabling and troubleshoot existing analog and IP video surveillance system installations.

HID Global to Deliver a Secure Mobile Access Solution via Samsung KNOX

Powered by Seos, HID Mobile Access operates on Samsung smartphones that support both Bluetooth Smart and NFC.

Middle Atlantic Unveils Value-priced, Feature-rich UPS Series

Features compact form factors and IP capability.

mobiDEOS Integrates with OnSSI for IP VMS Applications

Integrated UCNE and Ocularis solution keeps IP transition costs low for integrators and end users while eliminating the limitations of the analog architecture.

IBS-Mapei Deploys Oncam Grandeye 360-degree Technology

Surveillance solutions help ensure compliance with health and safety regulations at Dubai manufacturing facility.

One in Three U.S. Hospitals Report Rise in Violence and Assaults in 2014

Employee turnover rates and low morale attributed to insufficient equipment for officers.

Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Cost is in the billions but only addresses a narrow range of security issues.

Security flaw from the ‘90s is still a problem today

Security flaw from the '90s is still a problem today

The flaw leaves Apple and Android users vulnerable.

Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.

Monitoring Student

Monitoring Student's Locations via the School Bus

Tracking students before and after school gives all adults involved in the safety and security of students peace of mind.

Scammers Taking Advantage of Apple Pay

Scammers Taking Advantage of Apple Pay

Criminals are using the platform to buy goods with stolen identities and credit cards

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3