Top Stories


New York Skyline

The Cost of Security

Traveling to and participating in ISC East is always a pleasure. For me, I can get a little closer to learning about security solutions, and possibilities for integration tomorrow. I always ask the question of “this is a great solution, but what will it do tomorrow?”

Risk-based Approach to Festivals and Fairs

Risk-based Approach to Festivals and Fairs

The event security industry, which includes concerts, conventions, sporting and other special events, was one of the sectors hit hardest by the global pandemic, as events ground to a halt overnight, but the sector has come roaring back to life with lightning speed.

Creating a Stance

Creating a Stance

Video security systems have been effective deterrents to crime because of its ability to capture and present evidence of events that have happened. Such systems can be invaluable in protecting people and assets.

Key Tech Trends

Key Tech Trends

Video analytics is in the midst of a revolution. For decades, the video surveillance goal was primarily to record video for later review in the event of a security-related incident.

Driving Security to News Heights

According to a 2022 study conducted by Ponemon Institute, the average U.S. enterprise manages approximately 135,000 endpoint devices. Given that most, if not all of these devices require dependable power to maintain functionality, the need to deliver reliable power efficiently to devices, which is critical to building safety, security and comfort have never been higher.

Control Your Room

Control Your Room

There is an understanding that doing a job right requires the right tools. However, recent years have seen rising awareness that furniture does not merely provide a post from which to do a job. Instead, contributing to successful outcomes requires the right furniture.

Looking Forward to 2023

Talking to an industry associate in early November, we laughed a little bit about the fact that it is (almost) 2023. Well, we were planning for print material for next year. The conversation led us into a quick discussion about Y2K.

Video Metadata: Describing the Details that Matter

Modern surveillance systems generate an overwhelming (and mostly unused) amount of data. This is especially true when recording video in 24/7 operations, which is essential to capturing evidence, incidents and events



Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.

Debunking the Misconceptions of Open Source Security Platforms

The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.

FCC Bans Equipment Authorizations for Chinese Telecommunication, Video Surveillance Equipment Deemed Threat to National Security

FCC Bans Equipment Authorizations for Chinese Telecommunication, Video Surveillance Equipment Deemed Threat to National Security

The Federal Communications Commission adopted new rules prohibiting communications equipment deemed to pose an unacceptable risk to national security from being authorized for importation or sale in the United States.

Free Classes on Napco’s Air Access & E-Access Cellular- or Cloud-Based Access Control Now Available Online, Locally at all Napco Distributors

NAPCO Security Technologies is pleased to offer expanded free trainings to dealers, locksmiths and integrators on both its easier-to-install, faster-to-deploy, cellular- or cloud-based access control system solutions.

Genetec Guides Utility Companies on Security System Support for NERC CIP Compliance

Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC).

The Products are Nice, But People are the Key

The Products are Nice, But People are the Key

There is nothing like a product tradeshow to get your hands a “little dirty” handling and asking questions about new products. When all is said and done, the people make the difference.

ADT Commercial Selects Philippe Sawaya as First-Ever Director of Artificial Intelligence

ADT Commercial has announced recently that Philippe Sawaya has been selected as its first-ever Director of Artificial Intelligence (AI). In his new role, Sawaya is leading company efforts in the development and deployment of AI with exceptional analytical capabilities to support the specialized needs of commercial customers across industries.

ISC East Recap: The Proof is in the Puddin’

Many comments offered regarding tradeshow attendance, and person-to-person events following that crazy pandemic were answered quickly by attending ISC East 2022. Sure, events like this have been making their way back into mainstream professional contact

ALPR Cameras Enables New Services for Car Wash Franchises

Genetec, a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Sonny’s The CarWash Factory has integrated Genetec™ AutoVuTM Sharp V ALPR (automatic license plate recognition) cameras into its point-of-sale (POS) solutions used by car washes to create a frictionless retail experience for consumers, new marketing opportunities, and more efficient operations.

Predicting the Cyber Future

Predicting the Cyber Future

A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more perceptive.

Dedrone Integrates Axis Communications’ Camera to Deliver Multi-Sensor Airspace Security Solution

Dedrone recently announced that it has formed a partnership with Axis Communications to incorporate Axis network cameras into Dedrone’s counterdrone command and control (C2) platform, DedroneTracker.

Warsaw Skyscraper Uses Mobile Access Control to Maximize Security, Efficiency

HID, provider of trusted identity solutions, recently announced the successful implementation of its mobile access solution, HID Mobile Access, and mobile-enabled Bluetooth® readers at the new Skyliner skyscraper in Warsaw, Poland.

Shooting at University of Virginia Leaves 3 Dead, 2 Injured

National news reports that a shooting at the University of Virginia in Charlottesville, Va., left three university football players dead and two more individuals wounded on Sunday night. Suspect Chris Darnell Jones, 22, has been taken into custody.

Three Critical Questions

Three Critical Questions

It was never really a question “if” video analytics technology would live up to its promise as “the next big thing” in physical security; it was simply a matter as to when the industry would start adapting the solution en masse.

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Vulcan Cyber, developers of the unified cyber risk and security posture management platform, recently announced the latest results of its ongoing research into vulnerability risk management initiatives and risk impact on business operations. The survey finds 75% of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets

ADT Commercial Recognized for Employing Military Veterans

For the first time, and just in time for Veterans Day, U.S. Secretary of Labor Martin J. Walsh recognized ADT Commercial as one of the 835 recipients of the 2022 HIRE Vets Gold Medallion Award presented by the U.S. Department of Labor.

Old Spaghetti Factory Improves its Security Infrastructure

Interface Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, recently announced that The Old Spaghetti Factory (OSF), a family-owned and operated restaurant chain with over 40 locations across 13 states, has chosen Interface’s suite of managed services to transform its network, voice and security infrastructure.

Hanwha Techwin Highlights Full Line of Intelligent Surveillance Solutions at ISC East

Hanwha Techwin is highlighting a diverse range of intelligent video surveillance solutions during ISC East 2022, Booth 701, at New York’s Javits Convention Center, Nov. 16 - 17.

Netwatch North America Integrates with Eagle Eye Networks to Expand Proactive Video Monitoring Services 

Netwatch North America, the leader in proactive video monitoring solutions, today announced a premiere partnership with Eagle Eye Networks to integrate the Eagle Eye Cloud VMS (video management system) with Netwatch’s proactive video monitoring service.

Oklahoma Casino Uses Face-Based Security Software Incorporated in Its Cameras

Oklahoma Casino Uses Face-Based Security Software Incorporated in Its Cameras

Vision AI company Oosto announced its partnership with Muscogee Nation Gaming Enterprises, one of the largest tribal casino owners and operators in the U.S., to protect its flagship River Spirit Casino and Resort’s gaming floors in Oklahoma, with face-based security software incorporated throughout its facility’s cameras.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3