Top Stories


HID Global Demonstrates Migration Solutions and Mobile Access Innovations at ASIS 2014

HID Global recently announced that under the theme "Your Security. Connected," it will demonstrate the power to connect people, devices and applications with its broad Genuine HID portfolio of interoperable secure identity solutions at next week's ASIS International seminar and exhibits in Atlanta.

An Exciting Start to ASIS 2014

I started my day off with a jolt; not the good kind of jolt you get from an awesome cup of gourmet coffee either. You see, my flight to ASIS 2014 left at 7 a.m. from Dallas, and well, let's just say I overslept…big time!

A Guide to Protective Clothing for Security Personnel

4 Tips to Ensure Superb Usage of Protective Vests

Whether a stab, spiked-weapon or bullet-proof vest, these tips detail how to best care for your vest, why you should never substitute and why you need to keep yourself safe.

A Guide to Protective Clothing for Security Personnel

A Guide to Protective Clothing for Security Personnel

Security guards should always be prepared for confrontation and to defend themselves against assault; body armor is essential for staying safe on duty.

Fire Set at Aurora FAA Radar Center Deliberately Set, Causing hundreds of Delayed and Canceled Flights

Fire Set at Aurora FAA Radar Center Deliberately Set, Causing hundreds of Delayed and Canceled Flights

Police say the fire was set by a contract employee and they do not consider it an act of terrorism.

Jimmy John’s Shops Hit by Data Breach

Jimmy John’s Shops Hit by Data Breach

Over 200 restaurants were affected

Retired Firefighter Increasing Safety with 21st Century Hydrant

Retired Firefighter Increasing Safety with 21st Century Hydrant

New fire hydrant is safer, smarter and sturdier to enhance the safety of people.

fire safety

The Importance of Fire Compartmentation

Whatever the building, compartmentation is fundamental to its safety, creating a series of protected fire zones to ensure that the fire is contained.



iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.

Hubbell Lighting TOTUS Solutions and Axis Integrate LED and Surveillance into One Platform

Companies will demonstrate Spaulding Lighting’s Cimarron LED Fixture with Active Deterrence Surveillance at 2014 ASIS International Expo in Atlanta, GA.

Report Says Amazon is working on Smart-Home Devices

Report Says Amazon is working on Smart-Home Devices

The work will be done out of their secretive hardware unit, known as Lab126

Morse Watchmans Integration with Software House Streamlines Key Control and Management

Integration with C•CURE 9000 provides users with more effective and efficient management of personnel, credentials and assets.

ONVIF to Exhibit at 60th Annual ASIS International Seminar and Exhibition

To host conversations with attendees regarding experiences with initiative in the marketplace.

Hikvision Achieves Risk Management Framework Certification from U.S. Army

Products passed rigorous battery of tests, proving resilience to vulnerabilities.

HID Global Introduces Ultra-thin Epoxy Tag RFID Transponder

Epoxy Tag UHF units endure the rigors of plastic injection molding processes, making them ideal for embedding during production of industrial containers.

New Automatic IP Camera Addressing Feature Highlights exacqVision 6.4 Release

Latest launch also includes VideoPush video wall feature.

Security Partners and WAVE Electronics Announce Collaborative Rebate

Program between two companies gives security dealers a profit advantage for purchased products and monitoring services.

Security Industry Association Releases Latest Version of False Alarm Reduction Standard

Recommend design features for security system control panels and associated arming/disarming devices to reduce incidence of false alarm dispatches.

Ready for Unlimited Scalability with Milestone Arcus-embedded Solutions

Proof-of-concept will be shown at ASIS 2014.

Symmetry's Edge Network, Two-door, PoE-enabled Controller Delivers Flexible Options

EN-2DBC Edge Network Controller offers security installers a state-of-the-art panel.

Experience Razberi Technologies Network Video Solutions at ASIS 2014

Attendees encouraged to interact with company's latest all-in-one network video solutions.

Code Blue and Vigitron Announce Partnership

Strategic partnership to improve networking of emergency communication systems.

US Security Associates Gathers in Company's Hometown for ASIS

Hosting several event to enhance the ASIS experience.

Allegion to Host Press Conference at ASIS International 2014

Discussion consists of new company's new electronic security offerings and a school security seminar.

Ocularis Enables Seamless Integration between Atlanta Public Schools and Police Department

Heightened situational awareness provides enhanced public safety and security.

Chris Meiter to Lead Salient Systems as President

Will provide leadership to continue to position company in the forefront of the physical security industry.

ASIS 2014 Mobile App Available

The ASIS 2014 mobile app is a native application for iPad, smartphones (iPhone and Android), and a hybrid web-based app for Blackberry. A web-based version is available for other web-enabled devices.

ASIS to Pilot Two New Certificate Programs at ASIS 2014

Two certificate programs, Critical Thinking Skills for Security Solutions and Developing and Implementing an Insider Threat Program, join the slate of high-quality pre-Seminar programing taking place the days before ASIS 2014 opens.

Free Career Coaching and Resumes Reviews in Career Pavilion

Security practitioners and job seekers will get answers to their career-related questions and challenges—and learn how to best position themselves on the job at the 3rd annual Career Pavilion, September 29-October 2. Sponsored by University of Phoenix, the Pavilion will feature free career coaching and resume reviews, professional development sessions, and career services. Open to all registered attendees.

Where Does Traditional Security Begin and Logical Security End?

The mass migration of everyday objects becoming interconnected, or the “Internet of Things (IoT)” as the industry has coined it, exemplifies the merger between traditional and logical security. With the IoT, we must ask ourselves where traditional security begins and logical security ends. From security cameras to cars to medical devices and now even home appliances like refrigerators, what, if anything, can be identified as only traditional or logical security anymore.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3