Dealers and Integrators


Driving a Good Bargain

In the business world it seems like the big money is going after the bigger players. You know, you sell a security installation at one fast food joint, and pretty soon the entire country is yours for the taking.

Going To Market

Back in the day when the security industry was still maturing, the typical sales channel for the manufacturer consisted of a rep organization with assigned territories and dealers in the region, national account partners, distribution organizations and occasionally a buying club.

A New Season

A New Season

Spring evokes images of freshness—spring cleaning, after all, is meant to encourage people to re-organize, refresh and start anew.

Just Around the Corner

Just Around the Corner

You’ve seen them all over town: those little blue trucks moving from one security job to the next. Their installations and technicians are well known for using and understanding the latest technology and equipment.

Making Your Demands

In today’s highly competitive environment, it is extremely important that providers have both the experience to deliver the right solution and the ability to deliver strong customer service.

Two Isn’t Always Better

Higher-sensitivity fire detectors can do more than just spot threats earlier—they can actually lower long term hardware expenses for facility managers.

Learning From Certification

With the universal migration toward IP-based security systems and the increased demand for higher-level systems integration, the security industry is seeing a major shift in the roles of its professionals.

A Line of Sight

A Line of Sight

Video surveillance is both a science and an art. Success often depends on whether you match the right camera with the right lens.



Delivering Technology

Delivering Technology

An organization is a complex environment that is continuously growing to include more systems, buildings and processes and as a result, faces more risk, costs and threats.

Security is the Right Medicine

A few years ago, Adam Runsdorf had this idea of starting a third-party pharmaceuticals logistics company, specializing in healthcare. He started the company, Woodfield Distribution LLC (WDSrx), after obtaining multiple licenses to comply with federal, state and other government and regulatory authorities, which included facility security.

Reaching To The Clouds

Century 21 Action Plus Realty is one of New Jersey’s premiere real estate agencies, employing more than 250 sales professionals. The company has seven locations covering Monmouth, Ocean, Middlesex and Mercer Counties.

Making A Home Smart

Who values a smart home? According to a recent survey, most Americans do.

Action Video Q&A

The transportation industry continues to expand, but crime may be stalling growth. We talked with Ryan Nolan, vice president of global sales for Avigilon Corp., to discuss how advances in video analytics can help improve surveillance.

Controlling The Keys

Controlling The Keys

After a year of in–depth research and testing of many systems, the RJUSD found CyberLock’s access control system to be the solution that best fit the district’s needs, including installation and maintenance.

Alarming Trend with Police

I’ve been writing, professionally, for 40 years. The first story that I ever worked on was a triple homicide, and a contract murder that was related. Back then, I didn’t think reporting could get any worse.

Security by the Book

Security by the Book

Pick any county in the United States, money is scarce to non-existent, and in the pecking order of who gets the available money, the county library is way down the line.

Emergency Security

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

Terminal Upgrade

Terminal Upgrade

Terminal One at JFK International Airport had relied on a limited analog surveillance system and a separate, older IP system that were independent of each other.

Moni Smart Security Introduces Customer Bill of Rights

Company Leads Change in Customer Interaction with Home Security Providers

Get Back To Normal

Get Back To Normal

In an ideal world, security personnel would never be faced with making quick decisions in difficult situations. They would not have to respond to incidents or emergencies because such things would not occur.

Featured

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.