Critical Infrastructure


Protecting Our Water Supply

Protecting Our Water Supply

Maintaining the security of our nation’s water supplies is serious business. Attacks from a lone vandal to a team of foreign terrorists could, within hours, result in widespread illness or economic disruption.

Tornado Tracking

Tornado Tracking

April 28, 2014, stands out in the memory of the residents of northern Mississippi as a violent F4 Tornado left a wake of major damage killing 10 people and injuring more than 80.

Meeting the TWIC Mandate

Meeting the TWIC Mandate

The Greater Lafourche Port Commission, located on the Gulf Coast in Louisiana, facilitates the economic growth of the communities in which it operates by maximizing the flow of trade and commerce.

Middle Atlantic Products Hires Product Managers

New Appointments Strengthen Company's Commitment as AV Infrastructure Market Leader.

Thinking Outside The Cloud

A series of Microsoft commercials beginning in 2010 brought the concept of “the cloud” into our cultural lexicon. The ensuing five-plus years have grown awareness and adoption of the concept behind that term, especially in the consumer arena.

Inmates Recaptured: What Were the Security Lapses?

Inmates Recaptured: What Were the Security Lapses?

Three California inmates who escaped from a maximum security facility have been recaptured. Now the investigation focuses on how it happened.

3 Inmates Escape from Maximum-Security Jail

3 Inmates Escape from Maximum-Security Jail

California officials are asking for the public’s help to find three inmates who escaped from jail.

Upscale Panama City Property Using ASSA ABLOY Hospitality

The property is using VingCard Visionline, Signature RFID locks and Elsafe Sentinel safes.



Protect Your Data - In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Protect Your Data

In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

The Quest for Smarter Power - Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

The Quest for Smarter Power

Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

Getting Involved - Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Getting Involved

Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.

Knowing Your Access Control

Knowing Your Access Control

With four or more access points around your property, there is no way that you can keep eyes at all entry points, especially if all can’t be viewed from a single location.

Sound the Alarm

Sound the Alarm

To support safety and notify personnel in the case of an emergency, Peru LNG’s needed a general alarm and mass notification system (MNS).

India and Pakistan Join Expanding Security Organization

India and Pakistan Join Expanding Security Organization

The organization is led by Russia and China.

Trusted Resources Promote Safe, Secure Environments

Online Exclusive: Trusted Resources Promote Safe, Secure Environments

Mitigate insider threat and improve perimeter security and personnel assurance to ensure only trusted resources have access.

Bus Lanes Get a Makeover - The Rapid riders will have access to First Responders

Bus Lanes Get a Makeover

The Rapid bus system in Grand Rapids, Mich. has had its share of heated debates over the past several years, with detractors bemoaning its lack of use and proponents promising major economic benefits with expansion.

Protection Beyond Fences - Early warning detection and identification of threats inside and outside the fence line

Protection Beyond Fences

Recent terrorist attacks on substations and the potential for simultaneous attacks across the United States put the entire country at serious risk for major power interruption.

Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web

Survey Says 90 Percent of Americans Feel They Have Lost Control of Their Personal Information on the Web

The survey was conducted by the Pew Research Center.

The Largest Mass Transit Deployment

Helping the Chicago Transit Authority (CTA) reduce violent crime and robberies by up to 35 percent was a mission Sentry 360 relished. Providing their Ultra HD surveillance cameras and systems, the Plainfield, Ill., camera manufacturer was involved in the largest 360-degree install in mass transit history.

G4S Technology Chosen to Deploy Second Phase of Critical Infrastructure

Ongoing technology partnership between Iberdrola USA and G4S Technology continues to transform physical security for the energy and utility industry.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

New Products

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • Paxton10 CORE Cameras

    Paxton10 CORE Cameras

    The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3