Top Stories


The Growth of IT Security

The Virtual Desktop Infrastructure (VDI) market is growing fast so much that industry analysts predict it will be worth over $5 billion within the next three years. Why did this take so long to arrive? After all, virtual desktops have been around since the 1990s.

Milestone Systems Elevates Bosch Security Systems To Elite Partner Status

Milestone Systems, the open platform company in IP video management software (VMS), has elevated Bosch Security Systems to the status of Elite Partner in the Milestone Alliance Partner program (MAP).

Axis Communications Announces U.S. Expansion Plan

Axis Communications, the world leader in network video, announces its U.S. Expansion Plan designed to bring Axis even closer to its partner network and end-customers while intensifying local resources to meet demand in the fast growing physical security market.

Cyber Security Insurance

People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.

Advanced Persistent Threats

Advanced Persistent Threats

An Advanced Persistent Threat (APT) is a piece of malware that is distinguished by the sophistication of its code, the vectors cybercriminals are choosing for attack and the perseverance with which they’re going after their targets.

Your Vendors: Cold Beer or Malicious Attack Vector?

Your Vendors: Cold Beer or Malicious Attack Vector?

The five golden rules of developing a strong network security strategy for managing vendor access.

Point of View Video Technology for the Security Industry

Point of View Video Technology for the Security Industry

Putting security into the eye of the beholder creates a stronger layered security plan.

Protect Against Attack

Protect Against Attack

The one thing consistent about malware attacks is that they continue to change quite a bit as time goes by. Initially, many attacks were unstructured and untargeted, indiscriminately honing in on large numbers of hosts in an attempt to find their vulnerabilities. The outcome of these initial attacks was often simple defacement or destruction of data with very few of the overall volume of these attacks covered in the news.



Technology From Fluidmesh, Mobile Pro Systems Help Protect Super Bowl XLVIII

When the final seconds of the Super Bowl play clock had ticked away, the Seattle Seahawks emerged victorious, walking away with a 43 - 8 win and the coveted Vince Lombardi Trophy. Their Super Bowl dreams had come true and they could finally breathe a collective sigh of relief. Amidst a sea of sports fans swarming MetLife Stadium in East Rutherford, New Jersey, the Seahawks were not the only ones exhaling. For the scads of security personnel charged with ensuring the safety of NFL players, fans and the many other people behind the scenes at the first outdoor, cold-weather Super Bowl, the real win was in pulling off the mega sporting event without incident.

Mission 500 to Stage 5th Annual Security 5K/2K at ISC West 2014

As part of its mission to support even more children in need, Mission 500 – having already met its original goal of sponsoring 500 children around the world – is continuing its efforts to assist children in crisis.

A Light of Freedom

A Light of Freedom

Security at the Statue of Liberty has never been taken for granted; it just hasn’t been a top priority of the government. That is not the case with the U.S. Park Police. They have used, to the best of their ability, security equipment that was appropriated but lacked the highest technology.

Keeping assets well protected

Keeping Assets Well Protected

There are tens of thousands of bank branches and financial services locations throughout the world. The business environment itself is complex, as it combines elements of high-end commercial services with a frontline, retail component.

Not All is Lost in War

Not All is Lost in War

The cold, brisk wind of December in Dallas attacked my body that was wrapped in a winter’s coat as I stepped out of my vehicle, ready to seize the not-so-ordinary work day ahead of me. A mist filled the air, kissing my cheek with coldness as harsh as death. You see, death was the reason I was here in the first place; yet, this was a place of happiness.

Increasing Security with Smart Credentials

Increasing Security with Smart Credentials

For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.

Making the Choice - Fixed costs, customized solutions and user convenience - determining factors in buying physical identity and access management

Making the Choice

The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.

Casino Doesn’t Bet on Security

Casino Doesn’t Bet on Security

Players Casino requested demos and ultimately selected OnSSI’s Ocularis, using encoders to migrate many of their existing analog cameras to avoid the expense and inconvenience of having to rip and replace every camera. One key factor in the decision for Ocularis was the software’s fast and easy training for both new and seasoned employees.

Forget Your Passwords

Looks like it is just about time for biometrics to make its long awaited debut. Yes, we have seen biometrics for quite some time, and it is true that the impact has been strong in the security world. But, get ready to see biometrics on steroids. It’s coming.

The Grisly Lure of Copper

The Grisly Lure of Copper

It is unbelievable how some people are so desperate for money that they risk their very lives for a quick buck. With copper as one of today’s most grisly lures, thieves scale fences to high-voltage distribution sites and cut the copper off live, megawatt lines.

New Jersey Cafe Savors Fire Protection with Added Reliability and a Side of Cost Savings

New Jersey Cafe Savors Fire Protection with Added Reliability and a Side of Cost Savings

Fire-Lite Alarms fire alarm system and Honeywell Power IP/GSM Communicator create economical, right-size solution for restaurant.

Stolen Vendor Credentials Responsible for Target Breach

Stolen Vendor Credentials Responsible for Target Breach

A strategy for the successful management of vendor remote access.

Silent Knight Educational Life Safety Code Seminars Resonate at Local Level

Silent Knight Educational Life Safety Code Seminars Resonate at Local Level

Nationwide seminar series to feature industry experts to present on application of local codes in fire alarm and emergency communication systems design.

WavestoreUSA Joins the Security Industry Association

WavestoreUSA Joins the Security Industry Association

SIA CEO Don Erickson says WavestoreUSA is a welcome addition to the SIA membership roster.

HID Global Increases Campus Safety and Security at Academy of Art University in San Francisco

HID Global Increases Campus Safety and Security at Academy of Art University in San Francisco

University can now more easily expand and adapt its access control infrastructure as needed to support growth and new capabilities without forfeiting earlier investments. (Video Included)

Honeywell Announces Compatibility with Savant Systems Home Automation Equipment

Honeywell Announces Compatibility with Savant Systems Home Automation Equipment

Installation professionals can offer Savant connected-home capabilities to homeowners who use VISTA alarm panels.

Tri-Ed Unveils New Website

Tri-Ed Unveils New Website

Features a more contemporary design and user-friendly menus allowing visitors to easily navigate.

$9.84 Credit Charge on Statement Could Indicate Fraud

$9.84 Credit Charge on Statement Could Indicate Fraud

What to do if your statement has a charge of $9.84 followed by an unfamiliar website URL.

Norwegian Law Firm Secured by Zwipe Biometric Card

Norwegian Law Firm Secured by Zwipe Biometric Card

“The fingerprint gives high security and since there is no PIN to remember, it is also very easy to use.” – Simonsen VogWiig, Partner.

Top Trends Impacting the Security Identity Industry in 2014

Significant changes are anticipated across physical and logical access control, secure issuance, identity assurance, visitor management, electronic ID (eID) and secure asset tracking.

Walter Reed National Military Medical Center Launches AtHoc IWS System

Walter Reed National Military Medical Center Launches AtHoc IWS System

AtHoc system deployment in joint command military medical center safeguards 12,000 personnel in main Bethesda, Md. location.

While blue lights were previously designed to make people feel safer, the reality is that smartphones are taking safety to the next level by providing better and quicker access to emergency support.

Moving Beyond the Blue Light: Smartphones Improve Facility Safety

While blue lights were previously designed to make people feel safer, the reality is that smartphones are taking safety to the next level by providing better and quicker access to emergency support.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3