 
                    
                                        
		            
                    SentryCon 2013, the 18th Annual Dealer Conference, will be held in Mobile, Alabama, April 17th-18th.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    IndigoVision is delighted to announce the addition of Sean Thompson as Canadian Sales Director.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    The Bais Yaakov School for Girls (BYLA), has been a proactive leader in the arena of school access security, taking some serious, ongoing steps to harden security on their campus.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    The fast-growing company for the security, datacom, telecom and electrical wiring markets has strengthened its distribution support. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    The effectiveness of access control really comes down to local decisions made at each door. However, enterprise systems are deployed and managed on a global scale, which presents a challenge of how to manage all those local access control decisions efficiently and effectively.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Selecting an enterprise security system is a little bit like buying a car. When buying a car, you choose the make and model of the vehicle, you choose tires made by a well-known manufacturer and recommended for the vehicle, and an audio system probably by a manufacturer outside the automotive industry. This way, you can get the best-of-breed approach.
                    
			            - By Ralph  C. Jensen
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    As prices fall and capabilities increase, new applications are emerging that leverage the advantages offered by thermal technology for securing outdoor assets. The result is a market tipping point for thermal cameras and an opportunity to use the best detection technology available for costs that meet or beat less-effective approaches.
                    
			            - By John  Romanowich
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Building owners have found that integrating an elevator destination control system with its security management system enhances these benefits for tenants because they can use their credential for both access control and elevator access, but careful planning is a must to ensure cost effectiveness.
                    
			            - By Kim  Rahfaldt
- Mar 01, 2013
 
            
    
                
	                 
                    
                                        
		            
                    PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device. 
                    
			            - By Ronnie   Pennington
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    On June 1, 2012, the California Department of Parks and Recreation (CDPR), in connection with various partner agencies, began a six-month construction project to restore wetland function within Malibu Lagoon State Park. 
                    
			            - By Ian  Johnston
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    System design and equipment choices designed to protect key assets have never been more diverse. IP-based systems offer many advantages for capturing and transmitting high-quality HD images via the Internet or a LAN connection for remote monitoring.
                    
			            - By Chuck  Westfall
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Today’s biometrics systems are moving identity authentication toward real time, accurate and secure, individual ID based on unique biometric characteristics, including iris patterns, fingerprint minutiae, facial structure or voice.
                    
			            - By Milind   Borkar
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    RMON provides its administrator the capability to monitor, analyze and troubleshoot a multitude of security threats from a distance. Keywords: from a distance— what’s the point of security if you have to put yourself in harm’s way?
                    
			            - By Joseph  Goudlock
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    The PEC works by singling out any pedestrians attempting access without proper credentials.
                    
			            - By Mike  McGovern
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Using a combination of fiber optic and copper wire for networking, UFP went with Class A, Style 7 circuitry, which provided a high level of survivability. 
                    
			            - By Peter  Ebersold
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Even though the product release of HD-CCTV is based on HD-SDI transmission technology, it has been rapidly increasing since the beginning of 2012. There has not been enough marketing about HDCCTV and its technology and products, so only the future will tell the tale.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Video surveillance software can help to count people traffic, register scratches on cars or show which customers need help in the store. End users find new, clever and creative ways to use open-platform software and integrate it with other solutions.
                    
			            - By Christian  Bohn
- Mar 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Use this advice to develop habits to create a personal smartphone security plan that is right for you.
                    
			            - By Ginger  Hill
- Feb 27, 2013
 
            
                
	                 
                    
                                        
		            
                    Tim Hobbs, a 12-year veteran of the security industry, is welcomed to the 3xLOGIC sales team. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Aiphone Communication Systems, a provider of communications and intercom systems for more than 60 years, names new executive leadership. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Community's sound system provides intelligible speech and quality music, all while abiding by the multi-use requirements of the venue. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Premier Program offers increased incentives while focusing on expertise and long-term growth.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    A new, intelligent, IP, door controller addresses longstanding customer demand for non-proprietary access control solutions.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Many auto thefts are crimes of 'opportunity.' Leaving the keys in your car (even a 'hidden' spare key) greatly increases your chances of having your car stolen. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    “I am excited to announce that IQinVision has qualified as a premier vendor and has joined the ranks in our Premier Vendor Program” said Craig Patterson, director of vendor management with PSA.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    CNL Software, a provider of physical security information management (PSIM), and Vanguard Integrated Solutions, a provider of security products and IP-based, integrated solutions, announced that they have formed a technology partnership.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    The number of infections has doubled since the arrest of the cyber-gang leader in Dubai, indicating continued proliferation of insidious viruses.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    FortiGuard Labs provide enhanced protection capability for their platforms while launching new, cloud-based sandboxing and IP reputation services to help stop advanced persistent threats (APTs).
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Cyber attacks worsen, but only one in five organizations believe they are effective at stopping them.