Critical Infrastructure


HID Access Control Solutions Increase Security at Power Plant in China

HID Global announced today that the company’s network access control solutions and contactless readers have been deployed at the Fuxi power plant in China’s Sichuan province. The new system provides increased security that ensures the operational safety of production and facility areas, offers real-time monitoring at the central station and enables security administrators to remotely close facility doors for improved safety management.

White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Critical Infrastructures Built to Withstand Almost Anything

In an ideal world, every tunnel, train terminal, and critical building would be built like a fortress to withstand any emergency. But in the real world, construction costs matter and engineers "build to code." While Americans can take comfort that their critical infrastructure meets minimum codes for safety, when terror—or nature—hits especially hard, minimum codes provide minimal comfort.

A Tale of Three Cities

Salvaging the existing investment in coax cabling is often the number-one reason surveillance users are reluctant to switch to network video. The perceived cost of storage is a close second.

New Index Ranks Ability of G20 Nations to Withstand Cyber Attacks, Harness Digital Environment

A benchmark study of 19 of the world’s 20 leading economies found that the United Kingdom and the United States lead Group of 20 (G20) countries in their ability to withstand cyber attacks and to deploy the digital infrastructure necessary for a productive and secure economy. The index also found that several major economies—Argentina, Indonesia, Russia and Saudi Arabia—do not have cybersecurity plans and do not appear to be developing them.

Power to the System

Power to the System

Power supplies are a vital system component but are not always considered to be mission critical. Often situated in a utility area, power supplies are essential to continuous, trouble-free operation.

Powering Your Campus

Powering Your Campus

By the time disaster strikes, it is too late to take many of the important steps to protect a campus. Unfortunately, many educational institutions overlook disaster preparedness planning or simply assume a calamity won’t happen on their campus.

Symantec: Global Critical Infrastructure Providers Less Aware and Engaged in Government Programs

Critical infrastructure providers come from industries that are of such importance that if their cyber networks were successfully attacked and disabled, it would result in an actual threat to national security.



Lets Work Together

Let's Work Together

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.

Tale from the Dark Side

Tale from the Dark Side

In this autumnal month of witchery, trickery, and general tom-ghoulery, there comes a Halloween-worthy tale disturbing enough to haunt the mind of any business owner or information technology professional.

Finding Financing

Finding Financing

Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.

Securing Products on the Go

Securing Products on the Go

Distributors worldwide are increasingly challenged with enhancing the effectiveness of their operations. In an industry characterized by high turnover, strict regulations, slim margins and tenuous customer loyalty, retail distributors need to make smarter decisions and manage their businesses more effectively.

Achieving Integrated Security Excellence

Achieving Integrated Security Excellence

With the number of IT devices used in businesses today growing rapidly, organizations are seeking solutions that not only reduce risk and secure property and staff, but also offer IT and security convergence for maximum protection of people and property across buildings systems.

PureTech Systems Offers Internship Program for Students

The internship program for Arizona college students is entering its third term.

Ethernet Direct to Donate Percentage of Profits to Twin Towers Orphan Fund

Five percent of all gross profit made in the month of September will be donated to the Twin Towers Orphan Fund.

On The Cyberwar Path

On the Cyberwar Path

If, like me, you’re geeky enough to still recall certain scenes from 1983’s “WarGames” (and right now I can still pretty clearly see Barry Corbin as the general saying to Dabney Coleman’s character, “After very careful consideration, sir, I’ve come to the conclusion that your new defense system sucks”), then the news permeating the summer about the Pentagon publishing (in part) its first formal cyberwar strategy probably was no big surprise. In fact, the only eye-opening part might have been that prior to this summer it didn’t already have one.

WAGO Names 2010 National and Regional Distributors of the Year

WAGO Corp. has named long-time distributors, Heilind Electronics and B.W. Clark Inc. the 2010 National Distributor and Regional Distributors of the Year.

Massachusetts Sheriff's Department Deploys COLDSTORE Surveillance Storage System

After a lengthy search and the evaluation of multiple potential storage solutions, the Worcester Sheriff's Department has chosen Veracity's COLDSTORE as the surveillance storage system for a new 300+ camera project. COLDSTORE will be used to provide over 500TB of storage in conjunction with Genetec's Security Center 5.0 Unified Security Platform.

clouDevice VDI Thin Clients Receive Citrix Ready Verification

Interphase Corp. recently announced that clouDevice VDI (virtual desktop infrastructure) thin client devices have received Citrix Ready verification for Citrix XenDesktop.

USFA Releases University Housing Fires Report

FEMA’s United States Fire Administration (USFA) has issued a special report focusing on the causes and characteristics of fires in college and university residential buildings that include dormitories and fraternity and sorority houses.

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3