Dealers and Integrators


A Cultural Blending

A Cultural Blending

The concept of “securing security” emerged when physical security was being affected by cybersecurity attacks.

Smash and Grab

A few years ago – three to be exact – I became the legal guardian of a granddaughter, and with that came the finding of a daycare that not only provided a good learning environment, but a haven of safety and security.

What’s Trending for 2018

What’s Trending for 2018

Technology is perpetual motion personified. It is always marching forward, striving to become smarter, faster, more resilient, and more efficient than its predecessor.

The Formula for Data Security

Because Involta houses an organization’s most critical equipment and disseminates highly sensitive data, their facilities required a layered approach to their security solution—including access control, video surveillance, wireless locks and more—to ensure access is granted only to the appropriate person.

Festive Security

Festive Security

The 300,000 person Fremont Festival of the Arts, one of the largest street festivals west of the Mississippi River and toted as California’s premiere art, wine and music festival, is no small undertaking. The threat of an attack is a real possibility.

COPS Monitoring Receives SOC 2 Type I Attestation Report

Independent audit verifies COPS Monitoring’s internal controls and processes adhere to the highest standards

Making the Case

Established security integrators often deal with prospects who are also considering solutions that let them eliminate live monitoring and keep an eye on their homes via smartphone.

It’s a Woman’s World

It’s a Woman’s World

As with the technology in the industry, times are changing and Nancy Ford, and many other women, are now filling the rank and file of a booming industry.



The New First Responder

The New First Responder

People are constantly on the move—particularly in busy transit hubs—and passengers need to know where they should be and by when.

Biometric Ideas

Biometric Ideas

To best leverage the advantages of biometrics, integrators should follow the tips outlined below to take advantage of the primary benefits of biometrics, which are enhanced security and convenience.

Putting the Customer First

Boxerbaum was driven by good work and making the world a more secure place, but he also was a techie interested in futuristic gadgets.

Retail Under Fire

A recent data security report, published by Thales, revealed that 62 percent of all retailers worldwide have experienced a data breach within the past year.

Multi-dimensional Applications

According to a number of studies, hospital crime and violence have been growing at an alarming rate in recent years. The wide variety of security threats that healthcare facilities face include theft by employees or visitors, violence or threats from visitors or patients, and other crimes of opportunity.

Taking Stock of Security

Throughout the course of a calendar year, we take a look at numerous security solutions, events and, in our case, publications. In this issue, we have a specialty publication that focuses on government security. Security in the public sector is a big deal.

Time for an Upgrade

Time for an Upgrade

When a regional traffic management center in Washington state outgrew its building—as well as the size of its roadway monitoring system— the staff realized it was time not just for a physical upgrade, but a technological one, too

Cannabis Cash - How do you secure your place in the weed business?

Cannabis Cash

Where is all the money in the marijuana business going? Who is moving the cash or product as it seems to be in the news all the time? Here we share why it’s important to your business that you know how this is all happening.

Three-Alarm Fire at Downtown Dallas Hotel Gives Some ASIS Attendees an Early Wake-Up Call

ASIS attendees staying at the downtown Dallas Hampton Inn got a rude wake-up call at about 3 a.m. this morning as a fire in a nearby parking structure forced an evacuation of the hotel.

Exploring ASIS in Dallas

If there is any question about Dallas as a host city for ASIS, that should be cleared up after day one of 2017 ASIS. My opinion and observation is that attendees crowded the aisles and show floor in number this exhibition hasn't seen in years.

Views from ASIS Show Floor

Views from ASIS Show Floor

If there is any question about Dallas as a host city for ASIS, that should be cleared up after day one of 2017 ASIS. My opinion and observation is that attendees crowded the aisles and show floor in number this exhibition hasn't seen in years.

What Happens When Your Employees

What Happens When Your Employees' Equipment Is Left Unattended?

The Importance of Locking Down Multiple Devices in the Office

Featured

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3