Top Stories


FBI Reports That Violent Crimes Rose in 2012

FBI Reports That Violent Crimes Rose in 2012

However, property crimes and arson offenses declined, according to the agency's Preliminary Annual Uniform Crime Report, released June 3.

2nd Annual Career Pavilion at ASIS 2013

2nd Annual Career Pavilion at ASIS 2013

Attendees of ASIS 2013 and the third annual (ISC)² Security Congress will get answers to their career-related questions and challenges, and learn how best to position themselves on the job and in leadership roles.

VMP Launches 19 Inch 27U Rack Enclosure at 2013 InfoComm

VMP Launches 19 Inch 27U Rack Enclosure at 2013 InfoComm

The ER-EN27 comes complete with integrated cooling fans and lockable, removable side panels allowing for the organization of multiple electronic components, while providing essential thermal management as well as protection from thermal issues, damage and theft.

Ingersoll Rand Launches Campaign to Secure Military Barracks

Ingersoll Rand Launches Campaign to Secure Military Barracks

Schlage offers “Try Me” Program for barracks using hotel locks.

Getting the Dealer to Buy In

For many security industry professionals, one of two things often comes to mind when they hear the term, “video analytics.” One: high-tech, critical-infrastructure protection in applications such as airport security.

On the Move - Rob Phillips

On the Move

Apps are more prevalent than ever. The best ones are clean, fast and easily navigable for all ages, not just the world’s youngest millionaires.

Upgrading to video verification

Upgrade to Video Verification

Most of the 30 million classic burglar alarms installed since 1970 fail to meet growing consumer expectations of what a modern burglar alarm should be.

True Integration

True Integration

Charlie Howell’s childhood was hardly conventional. While other children were reading comic books, he was poring over repair manuals and installation diagrams.



All Flights Go

All Flights Go

Post Cold War, some of the threats have changed, but the squadrons’ mission remains the same—to master the tactics of foreign air forces.

Project Management

I recently participated in a webinar titled Industrial Security in the Real World: Practical Steps, which indirectly discussed how some fundamental tenants of project management were applied to this topic.

hosted video can be lucrative

Hosted Video Can Be Lucrative

If you’re limiting your business to selling surveillance technology as a capital expense, you’re leaving a lot of money on the table.

Veterans Memorial Service

In 2011, his mother, along with several other volunteers, joined forces with the Cedar Park Veterans Memorial Citizens Advisory Group to honor military veterans who have given their lives serving our country.

The Circle of Life for Your Central Station

What job function does the staff of full-service central stations spend the most time performing? Processing signals? Taking calls? No! The answer is data entry.

healthcare on guard

Healthcare on Guard

As the largest healthcare provider in the Twin Cities’ East Metro area, HealthEast Care System is dedicated to offering its patients the highest quality medical services.

security and building automation systems converge

Security and Building Automation Systems Converge

Here’s a typical building systems setup in a large commercial office facility. The security function—video, access, intrusion, fire and other systems—is run over a dedicated network.

On a wing and a prayer

On A Wing And A Prayer

Newfoundland and Labrador-based commercial service provider Cougar Helicopters doesn’t take safety and security lightly.

In the Customer’s Shoes

As IP technology and advanced video surveillance systems become increasingly popular, video analytics have officially entered the mainstream.

Here Comes the Sun

Lady Gaga, the Dallas Stars, the Dallas Mavericks and parking lots might seem like strange bedfellows, unless you’re heading to the American Airlines Center to watch a concert or game.

Turn Up the Heat on Bad Guys Using Thermal Imagers and Night Vision

Online Exclusive: Turn Up the Heat on Bad Guys Using Thermal Imagers and Night Vision

Thermal imagers allow you to “detect” a target by amplifying the heat signature of something or someone, where night vision amplifies ambient light by millions of times so that you can “identify” a target in minimal light.

A Breakthrough in Seamless Migration to IP from Speco Technologies

A Breakthrough in Seamless Migration to IP from Speco Technologies

New NVR with built-in PoE simplifies IP install.

Avigilon Acquires Access Control Company

Avigilon Acquires Access Control Company RedCloud

Through this acquisition, Avigilon adds a complementary product line to its end-to-end, high-definition surveillance solution and provides the company with access to a growing segment of the global security market.

Baby You Can Drive My Car

Baby You Can Drive My Car

FST21 and SAFE partner to deliver the ultimate safe car.

Bosch Signs New Distribution Agreement with Ingram Micro

Bosch Signs New Distribution Agreement with Ingram Micro

World’s largest technology distributor expands physical surveillance portfolio with addition of Bosch.

Berk Tek Leviton Technologies Alliance Launches New Combined System Solutions

Berk Tek Leviton Technologies Alliance Launches New Combined System Solutions

System details, specifications and third-party, verified system, test results available at newly launched website.

New Samsung 1.3 Megapixel PTZ Camera Features 30x Optical Zoom

New Samsung 1.3 Megapixel PTZ Camera Features 30x Optical Zoom

SNP-5300H delivers outstanding performance with extreme added value.

Twitters Two Factor Authentication How to and Why You Should

Twitters Two Factor Authentication How To and Why You Should

Are you doing all you can to protect your Twitter account?

Commercial and Retail Buildings to be the Fastest Adopters of Remote Monitoring Services

Commercial and Retail Buildings to be the Fastest Adopters of Remote Monitoring Services

Commercial and retail end users will drive the growth of remote monitoring services in intelligent buildings, accounting for more than 80 percent of the $400 million market in 2016, according to a new study by IMS Research

Security Industry Association Thanks Sponsors of SIA Government Summit

Security Industry Association Thanks Sponsors of SIA Government Summit

Event helps participants do business with the federal government.

New G Lite Compact Illuminators by Geutebrunk

New G Lite Compact Illuminators by Geutebrunk

Neat and discreet unobtrusive illuminators for use with day and night cameras.

Representative Patrick Meehan to be Keynote Speaker at SIA Government Summit

Representative Patrick Meehan to be Keynote Speaker at SIA Government Summit

Chairs subcommittee on cybersecurity, infrastructure protection and security technologies.

Featured

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

  • Teaching AI New Tricks

    You have probably heard that AI-enabled security cameras are evolving the role of traditional surveillance cameras, shifting the focus from passive monitoring to active problem-solving and operational insights. AI technology changes fast, so what is new can be considered only news in just a few months. Read Now

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.