Top Stories


Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Cost is in the billions but only addresses a narrow range of security issues.

Security flaw from the ‘90s is still a problem today

Security flaw from the '90s is still a problem today

The flaw leaves Apple and Android users vulnerable.

Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.

Monitoring Student

Monitoring Student's Locations via the School Bus

Tracking students before and after school gives all adults involved in the safety and security of students peace of mind.

Scammers Taking Advantage of Apple Pay

Scammers Taking Advantage of Apple Pay

Criminals are using the platform to buy goods with stolen identities and credit cards

Monitoring Student's Locations via the School Bus

Tracking students before and after school gives all adults involved in the safety and security of students peace of mind.

ASSA ABLOY Reveals Strategic Initiative to License Seos

Mobile access solutions built on the Seos platform simplify life by eliminating the need for multiple physical credentials.

Honeywell Launches Entry-level PIR

False alarm-reducing sensor combines value with high performance for residential installations.



UniKeys Smart Access Control App Integrates into Samsung KNOX

Collaboration allows Samsung KNOX customers to gain secure, convenient, touch-to-open, keyless and cardless entry for consumers and businesses through UniKey's global platform.

Hikvision USA Awarded Vendor of the Year by ADI

Testament to strong relationships dedicated to growing the video surveillance market.

Ganz Introduces Transmission Product Line

Complete line of Ethernet transmission products round out line of IP cameras, recording devices and monitoring products.

Costar Video Systems Unveils Website Redesign

With consistent increases in mobile and tablet traffic, it was time for an upgrade.

SureView Systems Announces Integration with AMAG Technology

Immix platform integrates with Symmetry access control software.

Properly Trained School Security Guards

Properly Trained School Security Guards

Suggestions for what to include in a school security guard curriculum.

Secret Service Investigating Two White House Security Breaches

Secret Service Investigating Two White House Security Breaches

The Secret Service is investigating two separate instances that have occurred in the last 24 hours.

Securing Access Control

Just watching the news each night is reason enough to explain why security professionals worry about the security of their access control systems. If the card system is hacked, there can be major problems.

Integrating Security - Logistics company takes advantage of information management solutions

Integrating Security

The logistics company wanted a single solution to provide high-resolution video images as well as the ability to monitor, verify and restrict access to the facility in order to better manage employee time and attendance while also reducing theft and misplacement of inventory.

How an Interruption Sparked an Industry Trend - Key management systems developed to store, track sensitive keys

How an Interruption Sparked an Industry Trend

There are hundreds, if not thousands, of selfhelp sales books on the market offering advice for everyone from the beginner through to the seasoned sales veteran. A primary concept behind all of them is how best to get a foot in the door in order to pitch your product and show how this product will help solve the customer’s problem.

Now Trending

Our homes are becoming living, breathing, speaking organisms a buzz with device-controlled door locks, thermostats, shades, video cameras, garage doors, etc.

Changing the Landscape - Wireless intrusion makes a big splash in commercial applications

Changing the Landscape

Wireless intrusion solutions have been perceived as complicated systems with time-consuming installs, and the possibility for strong interference and constant on-site maintenance. However, as technology continues to advance, it has changed the landscape of wireless intrusion and opened the door for commercial applications—making wireless intrusion not only a viable option, but an ideal solution.

Bring on the Power - Understanding that PoE impacts network design

Bring on the Power

When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.

Making Recommendations - Manufacturer provides more successful training experiences

Making Recommendations

After more than 10 years of offering technical training on our physical security entrance products to integrators, installers, and distributors, we’ve refined our approach to a fully developed program that offers a mix of online webinar training, onsite training and in-house factory training.

Slain TSA Officer Honored

Slain TSA Officer Honored

It was recently revealed that Congress, as a whole, has an approval rating of about 12 percent.

Safe and Secure

Safe and Secure

Jumping into the security industry was a calculated and well-planned venture for Quantum Secure. In fact, company president and CEO, Ajay Jain, walked a few tradeshows and talked to potential customers before making the leap.

Who is Servicing Your Clients?

A phrase I continually use is the “lifecycle management of security systems.” Every system, whether integrated or not, will need maintenance at some point throughout its life.

Keeping Sales at Full Strength - Successful companies look for full-time, year round staff

Keeping Sales at Full Strength

There’s no question about the importance of skilled salespeople to any successful security dealer. Without a rep that can get in the door or establish a rapport with a potential customer over the phone, there are no sales.

Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.

Border Checkpoints Go High Tech - Science fiction is quickly becoming science fact

Border Checkpoints Go High Tech

Imagine this: You’re looking around the room and people are getting retinal scans. Others are presenting RFID cards. Some are undergoing fingerprint imaging. Did you accidentally walk onto the set of some futuristic blockbuster movie? Guess again.

Perimeter Benefits - The world of physical security has changed in response to the pervasive threat of terrorism around the globe.

Perimeter Benefits

Most everyone is aware that crash-rated, anti-terrorist vehicle access control barriers, barricades, bollards and gates are standard security tools at government facilities, from embassies to courthouses and capitols to a host of other locales.

A City Wide Approach to Security - San Francisco Metropolitan Transit Agency unifies security in new command center

A City Wide Approach to Security

San Francisco Municipal Transportation Agency (SFMTA) was in need of a solution to maximize the use of their CCTV cameras deployed in the transit system, including the buses, trains and subways.

Featured

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities