Top Stories


WiFi-connected Toys May Stalk Children

WiFi-connected Toys May Stalk Children

Just how safe will the "Internet of Toys" be for your children?

Axis Communication Products Now Available at TRI-ED

Offers network video solutions for professional installations based on innovative and open technical platforms.

TRI-ED Welcomes Fluidmesh Networks as New Vendor Partner

Delivers reliable, fiber-like performance via unlicensed wireless spectrum.

PSA Security Network to Offer Track at ISC West 2015

Sessions covering cybersecurity, proprietary platforms and unconventional security solutions to be offered on April 14 in Las Vegas.

Gunman Kills Eight in Czech Shooting

Gunman Kills Eight in Czech Shooting

A gunman opened fire at a restaurant in the Czech Republic, killing eight people before fatally shooting himself

Silent Knight Seminars to Educate on Latest Life Safety Code Mandates

Engineers to educate specifiers, AHJs and facility managers on low frequency and carbon monoxide requirements for educational and developmental credits.

ISCON Imaging Launches Revolutionary Handheld Imager

Aimed at targeted security screening for loss prevention and employee safety applications.

New Innovative PTZ Cameras from OpenEye

Remotely adjust the field of view any time after installation.



Online Exclusive: When Electronic Access Control Isn

Online Exclusive: When Electronic Access Control Isn't Enough

Bridging the gap between electronic access control and key vulnerabilities.

Oscars Brought Heightened Security Like Never Before

Oscars Brought Heightened Security Like Never Before

With an underground bunker, LAPD officers, FBI, Department of Homeland Security and snipers, yearly award ceremony went off without a hitch.

Mall of America Heightens Security after Al-Shabab Threat

Mall of America Heightens Security after Al-Shabab Threat

A video posted online called for attacks against the mall.

U.S. and Britain Work Together to Pull off SIM Card Heist

U.S. and Britain Work Together to Pull off SIM Card Heist

Intelligence agencies can intercept and decrypt communications without informing wireless network providers, foreign governments or the individual user.

Sony and Virsig Turn in Personal Best Performance at 2014 NYC Marathon

More than 50 Sony security cameras provided situational awareness, threat assessment and personnel management.

Bosch Receives Expanded Lenel Factory Certification

Company interfaced it's IP cameras with the Lenel Network Video Recorder (NVR) 7.1.

Alarm Industry Seeks Answers in the Issue of Dropped Signals

AICC launches industry-wide research project.

Property Crime Down

If cyber crime and identity theft isn't taken into consideration.

Aspirating Smoke Detection Application Guide

Available for download from System Sensor and includes detailed application guidelines, codes/standards and more.

Google Removes ‘How Can I Join ISIS’ Autosuggestion

Google Removes 'How Can I Join ISIS' Autosuggestion

The search phrase was giving people advice for joining the radical group.

TSA Reports Record-setting Number of Firearms Found at Airports

TSA Reports Record-setting Number of Firearms Found at Airports

Thousands discovered with the majority of them loaded.

Genetec at ISC West 2015

Showcasing upcoming release of Security Center, new SIP-based Communications Module and Hybrid Cloud Archiving Service.

Honeywell Welcomes Symon Systems as Authorized Dealer

Firm provides security and access control to customers in Northern Florida.

Denmark Outlines Security Funding after Terror Attacks

Denmark Outlines Security Funding after Terror Attacks

The government is also looking to prevent young people from becoming radicalized.

Razberi Technologies' Growth Prompts Move to Larger Headquarters

Innovative Razberi ServerSwitch manufacturer triples their office, production and storage space.

Report Claims U.S. Embedded Spyware Overseas

Report Claims U.S. Embedded Spyware Overseas

The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.

U.S. Allies and Friendly Nations Can Purchase Drones from the Government

U.S. Allies and Friendly Nations Can Purchase Drones from the Government

Drone strikes integral part of global warfare.

Intercede's MyTAM Enables Enhanced Trust for Android Apps

Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environment, embedded in the majority of leading Android smartphones.

ISCON Imaging Introduces New Whole-body and Handheld Imaging Products

FocusScan offers IR-based, handheld imaging technology while SecureScan is a whole-body scanner.

RBtec Seismo Buried Unattended Ground Sensors Kits

New buried sensor solution for underground perimeter security.

SecurityTronix Reveals Latest IP Video Test Monitor with Image Display

ST-IP-TEST designed to maintain and make installation of IP and analog cameras easier.

G4S Kazakhstan on Oil Theft Prevention in the Country

Exclusive interview for the 2nd CACOGS Forum to be held by IRN, 3rd-4th March, Ritz Carlton, Almaty.

Featured

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3