Top Stories


HID Global and Tamoco Report Successful and Secure NFC Mobile Promotion at Tribeca Film Festival

Tamoco utilized HID Trusted Tag Services to provide film lovers with the ability to use their Near Field Communications (NFC) enabled smartphone to receive Tribeca Film Festival tickets.

No Drones Allowed at Yosemite National Park

Getting back to the tranquility of nature without the buzzing sounds of small flying objects.

Biometrics at the ATM: You Can Bank On It

Biometrics at the ATM: You Can Bank On It

Banks worldwide are putting biometrics at the front end using fingerprint authentication.

App Review: MamaBear App Increases Communication, Leading to Enhanced Safety

App Review: MamaBear App Increases Communication, Leading to Enhanced Safety

Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.

Security Products Announces The Govies Government Security Award Winners for 2014

Security Products Announces The Govies Government Security Award Winners for 2014

The staff at Security Products and Security Today wish all the winners a huge congratulations.

Mission 500 Reaches Over 500 Sponsored Children in Mexico

World Vision Mexico Receives the Donation of US $10,000.

Milestone Systems Names Razberi Technologies Technology Partner of the Year 2013

9th annual Milestone Systems Milestone Integration Platform Symposium (MIPS) partner conference in the Americas recognizes company for their support of Milestone XProtect and Arcus software.

Casino Security System Goes IP

Casino Security System Goes IP

Founded in 1983, Fort McDowell Casino in Arizona doesn’t take security lightly. Their security system has undergone a number of transitions over the years to aid in protecting 128,000 square foot of slot machines, 18 blackjack tables, 20 poker tables, a 1,800-seat bingo hall and a golf course.



Building the Intelligent Edge

Building the Intelligent Edge

Philosophical and physical shifts in intelligence and management at the edge are remaking corporate networks.

Critical to Healthcare Security

Critical to Healthcare Security

Ensuring the safety and security of patients and employees is critical to healthcare organizations of any size. For larger facilities, the task can seem monumental, leading many in the industry to turn to IP network surveillance technology to help take control of the process.

Keeping the Campus Healthy

Keeping the Campus Healthy

With employees and physicians totaling more than 6,000, Baptist Health Care Network is the largest, non-governmental employer in northwest Florida.

The Next Step in ID Verification

The Next Step in ID Verification

“Banks Heap Suits on Target over Breach,” read a recent headline of a Wall Street Journal story. By that time, seven financial institutions had already filed class action suits against the retail giant alleging it did not sufficiently protect its customer’s data.

Partners in Education

Partners in Education

When UCF began planning an upgrade to their security solution—standalone, battery-operated access control that did not provide the level of security needed and a variety of small, analog video systems dispersed throughout multiple campuses

Using Access Control Hardware for Additional Software Applications

As access control systems have become more prevalent in business environments, companies are looking to leverage this technology to deliver additional solutions at less expensive costs.

The Art of Security

The Art of Security

Museums are complicated for security professionals. They must be open and welcoming to the public, but they often have quiet nooks and crannies where patrons sit and ponder the art and human endeavor on display.

A Well-oiled Machine

A Well-oiled Machine

As the sophistication of the security industry evolves daily, companies are honing their partner loyalty programs to assist integrators in all aspects of the industry.

Preventing the New Threat

When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.

Spring Forward

While an alarm system can’t protect your customers from everything, it is a proven measure of deterrence. Homes with alarm systems are three times less likely to get burglarized than homes without them.

Providing a Healthy Balance

Providing a Healthy Balance

Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.

Security, at Warp Speed

Security, at Warp Speed

There is no telling what an appetite for success and a passion for technology will produce. One thing for certain, the desire to give the customer the best security solution possible will likely bear a long-term, winning combination.

ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.

I’m Sold on Biometrics

ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.

Looking London in the Eye

Looking London in the Eye

Paris has the Eiffel Tower; New York has the Empire State building; Sydney has its Opera House; Rome has the Coliseum; and London has the London Eye, a well-known symbol for an extraordinary city.

E-Mobilizing Emergency Management

While most organizations have developed highly sophisticated, comprehensive emergency plans, they are often lacking the communication vehicle to meaningfully convey them and make them accessible to a wide audience before, during and after an event. Mobile devices provide a simple, efficient and secure channel to proactively get the most up-to-date plans and best practices into the right hands and mitigate overall risk.

AvaLAN Wireless Celebrates 10 Year Anniversary

Developer and manufacturer of long-range industrial wireless Ethernet radios embraces 10 years of business success.

Hacking Hospital Equipment is Child

Hacking Hospital Equipment is Child's Play

Shocking results of a two-year security study of a healthcare network revealed via weak passwords, lack of authentication and embedded web servers.

Radiant Logic Announces ADAP, an Open Source REST API Layer for LDAP

Identity management company innovates with a REST API for directories - now available for download.

KS Mobile Announces New CM Security Heartbleed Scanner App

KS Mobile Announces New CM Security Heartbleed Scanner App

Heartbleed scanner identifies over 1,700 vulnerable mobile apps.

Eileen Turner serves as the Product Manager for the web fraud portfolio of Trusteer, an IBM Company, part of IBM’s Security Systems division.

When Online Fraud Targets You

When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.

North American Cable Equipment Inc Announces Release of Expanded Interactive Online Product Catalog

196 page catalog is easily accessible via smart phone, computer or tablet and includes all five NACE brand product lines.

Thieves Roping Security Cameras

Thieves Roping Security Cameras

Security cameras yanked from exterior of businesses with rope; are the suspects setting these businesses up for something worse? (Video included)

Featured

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

  • Human Risk Management: A Silver Bullet for Effective Security Awareness Training

    You would think in a world where cybersecurity breaches are frequently in the news, that it wouldn’t require much to convince CEOs and C-suite leaders of the value and importance of security awareness training (SAT). Unfortunately, that’s not always the case. Read Now

  • Windsor Port Authority Strengthens U.S.-Canada Border Waterway Safety, Security

    Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.