Critical Infrastructure


NitroSecurity, Waterfall Security Solutions Integrate Physical and Enterprise Management

Security information and event management solutions now can report over unidirectional gateways and collect logs and events.

3VR, Hi-Tech Solutions Partner for Transportation, Critical Infrastructure

The companies have paired image processing and computer vision technologies with an intelligent video search management platform.

North American Cable Equipment Announces Winter Stimulus Program

The company is offering pre-built headends with deep discounts on assembly costs.

New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.

Security Money Goes Missing

I’m no fan of the current administration in Washington, D.C., especially when it comes to spending money. The White House, it would seem, pays its bills by printing more money and borrowing from a creditor that has no interest in democracy.

scalable systems

Scalable Systems

Technological refinements and cost effectiveness in video surveillance systems are changing the security industry as we know it. Just about every aspect of a surveillance installation benefits from enhanced capabilities.

oil rig security camera

Keeping Infrastructure Resilient

The threat against a network of gas pipelines goes far beyond the possibility of terrorism, and includes natural causes and careless excavation. Security, as well as the inherent design and operation of a natural gas pipeline system, can help reduce the probability of an incident, which could have an adverse affect on the nation.

Integration Frustration

Many of today's security systems and products integrate with each other, and thanks to end user demand, manufacturers have made integrating with multiple security products easier. But while product integration is a huge advantage to the end user, and manufacturers regularly provide lists of compatible products, it is important to understand how compatible two products really are.



gradesheet

Making the Grade

Over the past decade, as a result of tragedies at school and college campuses nationwide, student and staff security has become a high priority. Also in the last 10 years, driven by an increase in the population of school-aged children, new school construction and the renovation of existing facilities have surged.

Wireless Security

The Wireless Linchpin

This year is the turning point for the deployment of large-scale, multi-service municipal wireless mesh networks expanding upon their public safety wireless networks for a variety of municipal and government services.

Fundamental Facilities

Technology from the security industry fulfills an essential role in protecting the nation's critical infrastructure. This is defined by a Homeland Security Presidential Directive as physical and virtual systems that are "so vital to the United States that [their] incapacity or destruction would have a debilitating impact on security, national economic security, national public health or safety."

Deployment Strategies

As the necessity for public and personal safety increases, the demand for surveillance solutions requiring the most rigorous, video-based security standards continues to grow.

ComNet Partners with Convergint to Offer Signal Communication Solutions

Communication Networks of Danbury, Connecticut, or ComNet, a manufacturer of fiber optic transmission and networking equipment, has been added to the product offering of Convergint Technologies.

Bosch Will Provide Turnkey Security Installation to Hamburg-Moorburg Plant

Bosch Security Systems will provide communications and security technology to a Hamburg-Moorburg coal-fired power plant run by Vattenfall Europe Generation AG & Co. KG. The contract includes everything from public address systems to alarm signaling and evacuation, as well as fire detection technology, video surveillance, and communication and low-voltage networks for dual-unit plants.

MoMA Modernizes Network Infrastructure

MoMA Embraces New Internet Applications and Improves Threat Protection with PA-2000 Series Next-Generation Firewalls

Perimeter Prowess

Acts of terrorism can be carried out in many forms and at various locations around the world. Those who pose the most risk are individuals or groups that breach secured areas of critical infrastructure facilities, such as seaports and airports, government buildings or power and chemical plants.

Brain Power

Security directors face large problems in large facilities. Officials at airports, seaports, industrial facilities and other large installations deal with a unique set of security problems. They also have a unique set of limitations. They must protect against a variety of security threats, many of which are unknown, and they must address these issues with limited manpower. They also are dealing with creative enemies who are always adapting and enhancing their sly methods.

Getting Carded

The potential for catastrophic injury in the petrochemical industry makes safety training and credentialing of employees imperative. Coordinating this process for a variety of industries, including many in the petrochemical fields of southern Alabama, is Training Solutions for Construction and Industry.

Trial and Error

With 1.3 million workers at 3,200 port facilities and on 10,000 U.S. flagged vessels, the initial TWIC roll-out seemed like a good place to start securing U.S. transportation locations. The Transportation Security Administration is requiring all port employees to use tamper-resistant smart cards, which include encrypted magnetic stripes, bar codes, and contact and contactless technologies.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3