Emerging Technologies


Live From ISC West 2017 Now Available

Live From ISC West 2017 Now Available

The live webpage will frequently update with content from the show floor.

FCC Investigating Nationwide 911 Outage for AT&T Users

FCC Investigating Nationwide 911 Outage for AT&T Users

Users of AT&T’s wireless network found themselves without the ability to call 911 last night.

Protect Against the Drone

Protect Against the Drone

Mass-market drones have exploded in popularity over the last few years, with smaller price tags allowing thousands of hobbyists to purchase their own. From casual flyers to news organizations, the rising number of drones (UAVs) flying overhead brings serious security concerns with it.

Security Tight for Super Bowl Sunday

Security Tight for Super Bowl Sunday

Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.

Video Trends To Focus On

Video Trends To Focus On

If these technologies aren’t on your radar, they probably should be. These product categories are rapidly growing in popularity and for good reason.

What

What's In Store

What’s ahead in 2017? In 2016, we saw video surveillance and security increasingly become the focus of mainstream media conversations, with video playing a pivotal role in bringing terror suspects to justice (as it did recently in NYC) and with police body-worn cameras capturing sometimes controversial incidents that spark national conversations.

A Glimpse Into The Future Of IP Video

A Glimpse Into The Future Of IP Video

This year marks the 20th anniversary of the world’s first IP network camera, a technology that eventually revolutionized the video surveillance landscape.

Innovations, Solutions and a Renewed Sense of Pride

It’s an exciting time to be in the security industry, as evidenced by the successful year we have seen in regards to technology innovations, mergers and acquisitions, and a renewed sense of pride in the industry.



Your Best Project: Ten Security Design Tools You Must Try

Your Best Project: Ten Security Design Tools You Must Try

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Security Products Dad Will Love

Security Products Dad Will Love

Father’s Day is just around the corner; give Dad the gift of security with one of these products.

Hackers Take Over Outlander PHEV

Hackers Take Over Outlander PHEV

A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.

Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Solid ROI Metrics Support Case for PIAM

Solid ROI Metrics Support Case for PIAM

By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.

Revolving Security

Revolving Security

After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.

Always Something New

As technology in every industry grows by leaps and bounds, there will always be something new to talk about. However, the Internet of Things seems to cross all boundaries, and within an industry IoT becomes the building automation tool to make it all work.

China Unveils First Robot Security Guard

China Unveils First Robot Security Guard

Researchers in China have released details on the first robotic security guard aimed to stop riots.

TV Station Security Pays Off in Bizarre Standoff

TV Station Security Pays Off in Bizarre Standoff

A TV station in Baltimore is grateful for added security measures after bizarre standoff with costumed man.

FBI Paid Over $1 Million to Break into iPhone

FBI Paid Over $1 Million to Break into iPhone

The FBI was finally able to extract the data from the San Bernardino attacker’s iPhone, but was it worth the price?

Featured

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3