Top Stories


Texas Colleges and Universities Authorized to Perform Background Checks on Future Dorm Dwellers

Texas Colleges and Universities Authorized to Perform Background Checks on Future Dorm Dwellers

Students may have to submit to a background check before being permitted to live on campus.

Cultural Heritage Site Foils Thieves

Cultural Heritage Site Foils Thieves

Protecting pieces of history with a video surveillance solution based on machine-to-machine (M2M) communications.

Bogus iPhone Chargers Infect Your Device with Malware

Bogus iPhone Chargers Infect Your Device with Malware

It's time to recharge your iPhone battery, but before you plug in make sure it’s not a “Mactan!”

Providing Mercy

After dealing with proprietary systems that did not “play well” with each other, Mercy made the decision to replace them with non-proprietary, enterprise-level systems through Lenel.

A Strategic Edge

A Strategic Edge

Some equipment vendors can be hesitant when financing their customers. However, vendor financing is a significant way to gain a strategic advantage over the competition.

Situational Awareness

Situational Awareness

Remote situational awareness provides operators, security personnel and first responders with decision making data to appropriately and effectively respond to perceived threats.

An American Dream

An American Dream

Everyone loves a good story, especially if there is a bit of patriotism, some struggle and a sprinkle of romance. And, throw in a flight from communist dictatorship to America, it might mean tears to your eyes.

Pumping Up Fire Protection

Pumping Up Fire Protection

The Grundfos-Indianapolis manufacturing facility in Indiana, a plant that produces a broad selection of water pumping equipment, much of which results in small to large fire pump systems for commercial facilities, was in need of a fire alarm upgrade.



Raising Money

An electronic security and fire alarm company can be a great business for many reasons, including the ability to be successful at a range of company sizes or the fact that barriers to entry can be fairly low.

Using the Network for Security

Using the Network for Security

Joe from ABC Company has had the same security management system for 15 years in all of his buildings. He likes it; he knows it inside and out, and he can give training classes to his security guards on how to use it.

No Phone Calls Necessary

No Phone Calls Necessary

The success of ASAP didn’t happen overnight. In fact, there have been several efforts to help deal with alarm monitoring over the past 20 years.

WDR is Everywhere Lately

WDR is Everywhere Lately

The term wide dynamic range (WDR) is used to describe the function of a camera designed to produce clearer, more actionable images and/or video in circumstances where back light and intense illumination can vary excessively, especially when both very bright and very dark areas are simultaneously present in the camera’s field-of-view.

An Insight to Technology

As more systems are going online, the more these systems rely on a wireless backbone to deliver security in a world filled with technology, smartphones and tablets.

Looking forward for business

Looking Forward for Business

In the world of product distribution, Tri-Ed Distribution means business. In fact, President and CEO Pat Comunale is so excited about the security industry’s future, he plans to bring five, recently-acquired, data solutions centers into the security vertical.

Infrastructure as a Service

Infrastructure as a Service

In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.

Distance - The Other Variable

Distance – The Other Variable

Zoom cameras allow targets from hundreds of feet away to be viewed up close, while megapixel cameras can cover larger areas with fewer cameras. But is it really that simple?

The Truth about VLANs

The Truth about VLANs

A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.

Smart Technology

Traditionally, homebuyers have been most interested in modern kitchens or high-tech home features. And for most homebuyers, a lock was just that… a lock.

George Zimmerman Caught Speeding in Forney Texas

THE George Zimmerman zooms through Texas...or at least tries to.

Legendary Roadside Diner Deploys Avigilon High Definition Surveillance System

Legendary Roadside Diner Deploys Avigilon High Definition Surveillance System

Redamak’s faces challenges ranging from theft to fraud to employee safety.

Can Demand Match Supply For Wireless In Mobile Video Surveillance

Can Demand Match Supply For Wireless In Mobile Video Surveillance

IHS tracked the current adoption rates of wireless download technology across each vertical market.

Starbucks Stores To Allow Customers to Carry Guns

Coffee chain refuses to ban loaded guns from its shops in gun-friendly states.

Secura Key Launches 2 Door Access Control Panel with Ethernet

Secura Key Launches 2 Door Access Control Panel with Ethernet

Redesign was driven by ACP’s 16-bit Hitachi main processor unit becoming obsolete.

SightLogix Smart Thermal Cameras Deliver Real Time Security for Correctional Facilities

SightLogix Smart Thermal Cameras Deliver Real Time Security for Correctional Facilities

SightLogix SightSensor on display Aug 9-14 at the American Correctional Association’s Congress of Corrections.

SMARTCORE Leverages Lumidigm Biometrics for South Korean Immigration Project

SMARTCORE Leverages Lumidigm Biometrics for South Korean Immigration Project

Multi-factor authentication stations employ multispectral imaging for simultaneous capture of two index fingers.

Voltage Security Comments on Largest US Data Breach

Voltage Security Comments on Largest US Data Breach

The risk is still here and demands a data-centric approach to security.

Circuit of the Americas Hosts Formula One with Community

Circuit of the Americas Hosts Formula One with Community

Race control systems, and basic audio and video systems, were chosen to upgrade and/or supplement the A/V systems in many areas.

Tyco Security Products Completes Acquisition of Exacq Technologies

Tyco Security Products Completes Acquisition of Exacq Technologies

Easy to use and install network video management solution complements and expands Tyco’s network video solutions offering.

Lincoln Memorial Vandalized with Green Paint

Lincoln Memorial Vandalized with Green Paint

American history is tampered with as statue of 16th American President is paint spattered.

Polaroid Cameras Stop POS Shrinkage As It Happens

Polaroid Cameras Stop POS Shrinkage As It Happens

Retailers need to quit thinking of surveillance systems as repositories of what’s been seen and recorded and, instead, think of cameras as sensors in a system.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.