Top Stories


Silent Knight Builds Online Resource for Life Safety Industry

Silent Knight blog informs on everything related to life safety systems – codes, technology, training, trends, and more.

Vicon and IQinVision Merger Approved

Merger adds a global market of integrated solutions to the video security market.

Eastern Michigan University Nearing Completion of Major Security Upgrades

Eastern Michigan University Nearing Completion of Major Security Upgrades

The university is installing new security cameras and AEDs with more upgrades to follow

Are DIY Home Security Cameras the Wave of the Future?

Are DIY Home Security Cameras the Wave of the Future?

A group of cheap cameras turns your home into a do-it-yourself security system

New Product of the Year Award Winners Announced

The staff at Security Products magazine are honored to recognize NPOY winners for their noteworthy products in their ability to improve security.

How to Get the Most Out of Your Video Surveillance Investment

Transit systems across the country strive to make the smartest investments to improve community safety and provide valuable resources for law enforcement.

Windstorm Solutions for Hurricanes and Tornadoes

When it comes to windstorm solutions, it’s all code-driven as door, lock and hardware chosen for an opening are determined by hurricane or tornado codes. The challenge comes with knowing which codes apply.

Standardizing as a Breakthrough

Alcatel-Lucent, a leader in products and innovations in IP and cloud networking as well as ultra-broadband fixed and wireless access, is responsible for countless breakthroughs that have shaped the networking and communications industry.



The Proprietary Trap

The entire computing world at one time was strictly proprietary. In other words, the election to use one piece of software or hardware dictated the requirement to get additional expansion and support from the single provider for the lifetime of that purchase.

When Does Warranty Begin?

Most of us have been at the end of a project when the owner/ client asks the popular question: “When does the one-year warranty begin?” The answer becomes one of the most debated topics, only second to the end-of-project, door-locking hardware debacle.

Enough to Go Around

Some of the most satisfying applications of sophisticated security technologies have little to do with security. Today, biometric identity management plays a critical role in delivering necessary vaccines to children in the developing world.

The ABCs of PoE

With the introduction of IP cameras, system integrators have experienced big improvements in the quality and performance of video systems that can be offered to their customers.

Hot Time in Atlanta

There are a lot of important things about the month of September: School is underway; football has started; and it is time for ASIS.

Protect a Key

When Steven Shaker wants to know who last took a car on his lot out for a demo or wants to see the demo history of a specific vehicle, all he has to do is go to his computer and check the Morse Watchmans KeyPro software for the answer.

The New Landscape

Managing access privileges for visitors, contractors and vendors in hospitals is a significant challenge for healthcare institutions.

Data Breaches: Who’s Ultimately Responsible?

In 0.27 seconds, these were the top headlines that Google pulled from 67,500 results highlighting the latest data breaches around the globe.

The Backbone of Security

Rob Lydic spends a lot of time traveling around the upper Midwest and Northwest, heralding the needs of security, proper equipment and how dealers can make more money in their own businesses.

Picking Up the Pace

Idesco Corp. started in the security business in the early 1940s. They began with ID badging for the Department of the Army. Well, times have changed, a lot, in the past seven or eight decades but one constant is that Idesco is still involved in security.

Enhancing the Customer Experience

Consumers’ expectations about their shopping experience at brickand- mortar, retail stores are changing. Mobile devices allow consumers to find any information they need with just a few clicks of a button, and this sense of immediacy has spread to how they shop.

Google Maps Tracks Your Every Step – But You Can Stop It

Google Maps Tracks Your Every Step – But You Can Stop It

A little-known data collecting process by Google can be switched off.

Honeywell Adds High Definition IP Video Kits to Performance Series Line

Provides security dealers with a hassle-free upgrade to IP video.

Low Frequency Application Guide Now Available from System Sensor

Guide covers waking effectiveness, low frequency requirements, occupancy and building code impact, system applications and more.

ASAP Ready to Expand Beyond Charter Members

Expansion of program supported by demand from New PSAPs on the system.

U.S. Security Associates Welcomes ASIS 2014 to Atlanta

As a Bronze-level sponsor of ASIS 2014 and a long-time exhibitor and supporter of ASIS International, Alton Harvey invites all to visit Booth #1105.

HID Global and Chapman University Collaborate to Develop A Technology Incubation Environment

HID Global participates in program that sets challenge for student entrepreneurs to expand “Internet of Things” opportunities for HID Trusted Tag Services.

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Partnership enables RTTG to bring their Real-Time Verification (RTV) technology platform to state and federal customers.

Fluidmesh Announces the Release of the FM3200

Available in two versions, this radio can be used to create highly customized point-to-point, point-to-multipoint, mesh and mobile networks.

Largest Scottish University Centralizes Security

Milestone-Axis IP video solution from Boston Networks provides control of multiple campus locations.

North Bend Schools Automate Lockdown with Genetec Security Center

Public school district in Nebraska upgrades to IP video surveillance and access control to better protect students.

Action Steps for Parents to Do Today to Protect Student Data

Action Steps for Parents to Do Today to Protect Student Data

These actions will help put you back in control of your child's data.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3