Top Stories


Control Your Room

Control Your Room

There is an understanding that doing a job right requires the right tools. However, recent years have seen rising awareness that furniture does not merely provide a post from which to do a job. Instead, contributing to successful outcomes requires the right furniture.

Looking Forward to 2023

Talking to an industry associate in early November, we laughed a little bit about the fact that it is (almost) 2023. Well, we were planning for print material for next year. The conversation led us into a quick discussion about Y2K.

Video Metadata: Describing the Details that Matter

Modern surveillance systems generate an overwhelming (and mostly unused) amount of data. This is especially true when recording video in 24/7 operations, which is essential to capturing evidence, incidents and events

Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.

Debunking the Misconceptions of Open Source Security Platforms

The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.

Genetec Guides Utility Companies on Security System Support for NERC CIP Compliance

Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC).



The Products are Nice, But People are the Key

The Products are Nice, But People are the Key

There is nothing like a product tradeshow to get your hands a “little dirty” handling and asking questions about new products. When all is said and done, the people make the difference.

FCC Bans Equipment Authorizations for Chinese Telecommunication, Video Surveillance Equipment Deemed Threat to National Security

FCC Bans Equipment Authorizations for Chinese Telecommunication, Video Surveillance Equipment Deemed Threat to National Security

The Federal Communications Commission adopted new rules prohibiting communications equipment deemed to pose an unacceptable risk to national security from being authorized for importation or sale in the United States.

Free Classes on Napco’s Air Access & E-Access Cellular- or Cloud-Based Access Control Now Available Online, Locally at all Napco Distributors

NAPCO Security Technologies is pleased to offer expanded free trainings to dealers, locksmiths and integrators on both its easier-to-install, faster-to-deploy, cellular- or cloud-based access control system solutions.

ADT Commercial Selects Philippe Sawaya as First-Ever Director of Artificial Intelligence

ADT Commercial has announced recently that Philippe Sawaya has been selected as its first-ever Director of Artificial Intelligence (AI). In his new role, Sawaya is leading company efforts in the development and deployment of AI with exceptional analytical capabilities to support the specialized needs of commercial customers across industries.

ISC East Recap: The Proof is in the Puddin’

Many comments offered regarding tradeshow attendance, and person-to-person events following that crazy pandemic were answered quickly by attending ISC East 2022. Sure, events like this have been making their way back into mainstream professional contact

ALPR Cameras Enables New Services for Car Wash Franchises

Genetec, a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Sonny’s The CarWash Factory has integrated Genetec™ AutoVuTM Sharp V ALPR (automatic license plate recognition) cameras into its point-of-sale (POS) solutions used by car washes to create a frictionless retail experience for consumers, new marketing opportunities, and more efficient operations.

Predicting the Cyber Future

Predicting the Cyber Future

A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more perceptive.

Dedrone Integrates Axis Communications’ Camera to Deliver Multi-Sensor Airspace Security Solution

Dedrone recently announced that it has formed a partnership with Axis Communications to incorporate Axis network cameras into Dedrone’s counterdrone command and control (C2) platform, DedroneTracker.

Warsaw Skyscraper Uses Mobile Access Control to Maximize Security, Efficiency

HID, provider of trusted identity solutions, recently announced the successful implementation of its mobile access solution, HID Mobile Access, and mobile-enabled Bluetooth® readers at the new Skyliner skyscraper in Warsaw, Poland.

Shooting at University of Virginia Leaves 3 Dead, 2 Injured

National news reports that a shooting at the University of Virginia in Charlottesville, Va., left three university football players dead and two more individuals wounded on Sunday night. Suspect Chris Darnell Jones, 22, has been taken into custody.

Three Critical Questions

Three Critical Questions

It was never really a question “if” video analytics technology would live up to its promise as “the next big thing” in physical security; it was simply a matter as to when the industry would start adapting the solution en masse.

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Vulcan Cyber, developers of the unified cyber risk and security posture management platform, recently announced the latest results of its ongoing research into vulnerability risk management initiatives and risk impact on business operations. The survey finds 75% of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets

Old Spaghetti Factory Improves its Security Infrastructure

Interface Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, recently announced that The Old Spaghetti Factory (OSF), a family-owned and operated restaurant chain with over 40 locations across 13 states, has chosen Interface’s suite of managed services to transform its network, voice and security infrastructure.

ADT Commercial Recognized for Employing Military Veterans

For the first time, and just in time for Veterans Day, U.S. Secretary of Labor Martin J. Walsh recognized ADT Commercial as one of the 835 recipients of the 2022 HIRE Vets Gold Medallion Award presented by the U.S. Department of Labor.

Hanwha Techwin Highlights Full Line of Intelligent Surveillance Solutions at ISC East

Hanwha Techwin is highlighting a diverse range of intelligent video surveillance solutions during ISC East 2022, Booth 701, at New York’s Javits Convention Center, Nov. 16 - 17.

Netwatch North America Integrates with Eagle Eye Networks to Expand Proactive Video Monitoring Services 

Netwatch North America, the leader in proactive video monitoring solutions, today announced a premiere partnership with Eagle Eye Networks to integrate the Eagle Eye Cloud VMS (video management system) with Netwatch’s proactive video monitoring service.

Oklahoma Casino Uses Face-Based Security Software Incorporated in Its Cameras

Oklahoma Casino Uses Face-Based Security Software Incorporated in Its Cameras

Vision AI company Oosto announced its partnership with Muscogee Nation Gaming Enterprises, one of the largest tribal casino owners and operators in the U.S., to protect its flagship River Spirit Casino and Resort’s gaming floors in Oklahoma, with face-based security software incorporated throughout its facility’s cameras.

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

IT and security leaders must address, on average, one cyberattack per week according to a new study released titled “The State of Data Security” by Rubrik Zero Labs. Rubrik, the Zero Trust Data Security Company, commissioned a study from Wakefield Research to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.

Drive Revenue Growth by Partnering with Solink

Attention all resellers and installers of security hardware and software! Have you looked into offering Solink to your customers? Solink partners with security technology resellers across North America with a unique selling model.

7 Ways to Get More ROI Out of Video Surveillance

Many businesses have security cameras in place. However, they are often underutilized because it isn’t always easy to find necessary footage, or the operational cost of collecting evidence is too high to justify its use. Solink can help you get more ROI out of your video surveillance system.

Solink’s Video Alarms Beat the Competition

Solink Video Alarms are creating a whole new category of alarm systems. Video alarms bring new functionality and improved ROI compared to traditional panel alarm systems.

Securing Overlooked IoT Devices from Cyber Criminals

Securing Overlooked IoT Devices from Cyber Criminals

When it comes to cybersecurity, many organizations overlook IoT devices; but it is imperative that they are given equal consideration, as these devices are connected to the internet (i.e. printers, security cameras and smart home hubs) and can serve as an open door for cyber criminals.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3