Top Stories


ControlByNet Introduces Cloud Plus Video Surveillance Platform

Package offers onsite solution, mobile platform and enterprise guard software allowing multi-site enterprises to leverage a central web-based management console.

Arecont Vision Enhances Popular MegaDome 2 Megapixel Cameras with Additional Features

STELLAR low-light technology, on-board storage and more deliver added security.

Arecont Vision 4K MegaVideo Cameras Go Far Beyond HD

Optimized 8.3MP UHD resolution at 30fps delivers unparalleled image quality.

Altronix Showcases New Pace Long Range Ethernet Adapters

Full duplex 100Mbps solution extends range up to 500m.

Altronix NetWay PoE Solutions Support a Myriad of IP System Applications

Midspan injectors support PoE, PoE+ and hi-PoE edge devices.

Altronix Debuts LINQ2 Network Communication Module

Enables remote status monitoring/reporting and control of eFlow power supplies.

Altronix eBridge Enables IP over Coax Full Duplex 100Mbps

New models accommodate high-speed edge devices using coax infrastructure.

Cyber Security is Everyone

Cyber Security is Everyone's Job

Many are aware of cyber security issues on a global basis, making cyber security the responsibility of everyone who interacts with the Internet in some form or fashion.



Cyberattack against JPMorgan Chase Affects 76 Million Households

Cyberattack against JPMorgan Chase Affects 76 Million Households

The attack also affected an estimated seven million businesses.

Interim Secret Service Director Admits They Have Work to Do

Interim Secret Service Director Admits They Have Work to Do

Joseph Clancy has admitted that they “know they’ve got to clean up their act”

Nuggets of Powerful Information from Women in Security Panel Discussion

For the first time, I was able to attend a women-in-the-industry-type of event at ASIS this year, a panel discussion with members of Women in Security and (ISC)2, a first combo session of this type for ASIS.

ASIS 2014: Parting is Such Sweet Sorrow

With sore muscles in my shoulders, legs and feet, ASIS 2014 is complete. I'm back home in Texas now, with many innovative thoughts about the security industry and good memories to boot.

Mixed Reviews

ASIS 2014 is all said and done. It seems to me many of the exhibitors had some great new technology to share with attendees. I saw a number of products that will make a different in the industry for some time to come.

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

The man was a security contractor with three prior convictions for assault and battery.

Security Within Reach

Since the aftermath of 9/11, the United States has intensified transportation security efforts across the board. For most of us, stronger security measures have been focused at the nation’s airports, where travelers are subject to more stringent screening protocols.

The Quicker Things Change, the More They Stay the Same

One of the perks of my job is the opportunity to travel around the country and visit various product manufacturers. Not long ago, I took a swing through Southern California with an itinerary of visiting seven or eight companies.

The Truth about Biometric Exit

How can the United States ensure that the millions of visitors who travel to this country with a temporary visa uphold their agreement to leave before it expires, while also enhancing convenience for travelers? Biometrics technology holds the answer. In fact, this technology dramatically lowered cost estimates for U.S. airport exit control systems from $6 to $3 billion in 2008 to $1 billion today.

Leveraging IT for Access Control

Trying to navigate through the numerous security regulations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals.

Cutting-edge Surveillance

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur.

Providing Efficient Technologies

By now, most security professionals are familiar with the two types of wireless that have been used in access control implementations for the last decade or so.

A Great End to a Busy Day at ASIS 2014

For those of you who know me, I'm a foodie at heart! I love experiencing new flavors and flavor combinations, but the magical component of sharing a meal with someone is how food brings people together, whether they naturally mesh or not. Sharing food with people has a way of breaking down barriers and allowing people to just be themselves in conversation and human togetherness.

Dual View and Density

Dual view legislation for cargo screening in the United Kingdom will fall into place in January 2015. This has been a phased-in approach to allow freight-handling companies to make the necessary equipment and procedural changes.

Historic Southern City Upgrades to High-Tech Traffic Management

Savannah, Georgia is a study in contrast. As the state’s oldest city, it was founded long before the American Revolution. Yet, beneath its cobblestoned streets lies 38 miles of fiber optic cable, evidence of a metro-region firmly rooted in modernity.

Securing the Old with the New

To accomplish such a comprehensive and multi-stage migration and expansion— and avoid issuing brand new credentials to nearly 20,000 employees —the team devised a strategy to run C•CURE 9000 on the front end using proximity technology with the legacy access control system running in the background to support the existing magnetic stripe cards.

Security is Personal

For small to medium-sized businesses (SMBs), access control needs to be affordable, scalable and easy to install, manage and maintain. Business is no longer left at the office, as today’s small business owner needs control and visibility of the organization while on the go.

A Capitol Idea

California’s historic State Capitol building, completed in Sacramento in 1874, has seen its share of serious security episodes during its colorful existence. In 1927, a lobbyist shot and murdered a secretary on the fourth floor.

Putting Out the Welcome Mat for Video Surveillance

For Conlin Properties, IP surveillance cameras from Axis Communications have played a critical role in the program’s success. Executives estimate that they have seen a 40 percent reduction in incident calls since they started using and publicizing these cameras.

All American to the Core

You don’t get much more passionate than Alan Forman, and there isn’t anyone more personable to their staff and co-workers. Forman is the co-founder and president of Altronix, located in Brooklyn, N.Y.

A Day in the Life at ASIS 2014

With a packed schedule of back-to-back meetings, quick drive-bys to say hi to new and old acquaintances within the security industry, an early-morning breakfast and, of course, no time for lunch, I welcomed a full day on the ASIS 2014 tradeshow floor.

The Cloud Can Change Everything for Law Enforcement

Many people envision law enforcement agencies around the country as resembling mythical portrayals on TV and in movies, with leading-edge technology that can track every suspect’s move across the grid.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3