Top Stories


Dedication Not to Be Taken Lightly at ISC West 2014

Dedication…I have been pondering this word since non-morning person, me, booked my flight to ISC West 2014 at 5:30am on March 12, 2014! Oh yes, Starbucks will definitely be my friend as I wake up at 2:15am on Wednesday morning to fly from Dallas to Houston and then from Houston to Las Vegas to make my first appointment of the day at 10:00am.

High-Tech Solutions

High-Tech Solutions

Nearly everyone is familiar with the standard manned guard booth in which a person sits and allows drivers in and out of a facility; however, border stations, government buildings, military bases and other locales where there can be a “very unwanted guest” all use much highertech security booths.

Raising Concerns

Raising Concerns

Wireless transmission is usually a topic that raises many concerns in the security world. It seems common knowledge nowadays that a wireless network can be easily hacked, and private information can end up on the Internet or someone’s identity can be stolen.

College Upgrades

College Upgrades

Reflecting the uniqueness and diversity of the local Queens’ community, for more than 50 years, Queensborough Community College has served students from Queens and the entire New York City region as a starting place to pursue their academic and career goals.

Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

One might think that a military base is among the most secure places in the country. Unfortunately, though, the sprawling nature of military bases makes them difficult to secure effectively, which leaves these sites vulnerable to a wide range of threats.

Barix Simple Paging Solution Debuts at ISC West

Out-of-the-box solution integrates fixed and mobile paging over the IP network.

aptiQ Alliance Program Members Highlighting Open Systems at ISC West

Showcasing how to extend aptiQ smart cards and NFC-enabled smart phone credentials to diversity of applications.



Help Children in Need by Participating in Mission 500 Events at ISC West 2014

Industry supports Mission 500 with great line-up of events and programs.

TSA Plans Mandatory Active Shooter Training for Airport Employees

TSA Plans Mandatory Active Shooter Training for Airport Employees

The agency released a 26-page report after an internal review that followed the fatal shooting of an employee in November 2013 at LAX.

So Much to See, So Much to Tell

It's really nice being a part of Security Products magazine and Security Today because I get to learn all about what's going to be at ISC West before the show.

How to Get the Most out of ISC West 2014

In mere days, I will be beating my feet around the showroom floor at ISC West 2014, engaging with companies regarding the latest and greatest when it comes to the security industry, and of course, tweeting!

Locked Tight Access Control

Michael Cochran, VP of Support Services & Safety Officer at Nix Hospital System, LLC in San Antonio, says he has found the biggest no-brainer on the planet. What is it?

U.S. Wine and Spirits Superstore Chain Deploys March Networks Video Surveillance

March Networks, a global provider of intelligent IP video solutions, today announced that America's largest wine and spirits superstore Total Wine & More has standardized on its next-generation retail video surveillance solution.

Here We Go Again

It is officially less than a week before ISC West in Las Vegas. I’m tuning up by walking the stairs at work, and trying to find a new pair of comfortable shoes. ISC West means miles of walking and a listening ear.

International Tourism Safety Conference Will Co-Locate With ISC West

The International Tourism Safety Conference is an annual gathering for hundreds of safety and security officials in the travel and tourism industry worldwide and focuses on providing delegates with new information, trends, equipment, strategies and best practices in keeping visitors safe.

ISC West Joins With The National Sheriffs Association

ISC West is pleased to announce its Corporate Partnership with the National Sheriffs’ Association. ISC West joins NSA in an effort to support those who protect and serve.

Sanjay has been involved designing and building security products for over 20 years. Most recently, he works with mobile based personal security systems called SafetyLINK.

SafetyLINK - Panic Button Involves Community

SafetyLINK is the world's first wearable safety device that protects children and seniors. It alarms people to summon for help easily, cost effectively and discreetly.

Solink Introduces Contextual Analytics to Help Customers use Video to See Big Data

Unique, event-based video discover platform coming to ISC West 2014.

Sentry360 Announces Large 360-degree Camera Deployment in Mass Transit

5800C2W convert to wireless module paves the way to expand connected home and business offering with easy upgrades to LYNX Touch.

Securitron M380 Wins GOOD DESIGN Award

Finalist in Architizer A+ Awards alongside Adams Rite RITE Door.

Modern Day Spider Man Climbs to Top of WTC

Modern Day Spider Man Climbs to Top of WTC

Teen finds his way to the spire by getting past at least four layers of security.

EID Passport Continues to Expand Identity Management Customer Base in Government Sector

EID Passport Continues to Expand Identity Management Customer Base in Government Sector

Further integration with new facilities confirms trusted relationships.

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves fling dirt and soil to get to their pot of gold in Manchester, UK.

FST21 Welcomes its New Baby - SAFEI

FST21 Welcomes its New Baby - SAFEI

Fully-integrated access control controller that delivers advanced, secure and convenient In Motion Identification access control within the market.

IC Realtime Raises the Bar with 720-Degree Video Surveillance Camera Technology

IC Realtime Raises the Bar with 720-Degree Video Surveillance Camera Technology

Test platform is 2013 Grand-AM Rolex GT championship-winning team, Scuderia Corsa Racing with Ferrari, where camera is mounted atop 458 Italia racecar to stream HD video from racetrack to Ferrari guest’s devices. Both racecar and cameras will be on display at IC Realtime’s ISC West tradeshow exhibit booth #23005.

Observint Launches Alibi Product Line

New line features simple, smart and extremely cost-effective IP and analog video security solutions.

Knowledge of Compliance is Key for Casino Security

Knowledge of Compliance is Key for Casino Security

Stringent compliance regulations calls for selecting, deploying and maintaining the right surveillance system with the knowledge, experience and agility of the integrator.

Using Stolen Passports Uncalled For

Using Stolen Passports Uncalled For

Two passengers who boarded disappearing Malaysia Airlines jet with stolen passports could have been identified by authorities within seconds possibly minutes.

aptiQmobile Now Included in the Samsung Solutions Exchange

NFC-enabled Samsung smartphones can now be easily used as ID badges for access control and other applications.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3