Emerging Technologies


U.S. Air Force, Lockheed Martin Complete Environmental Testing of the Nation's Next Missile Warning Satellite

Lockheed Martin has successfully completed thermal vacuum testing of the U.S. Air Force's second Space Based Infrared System geosynchronous satellite.

Securitys Range and Capabilities

Security's Range and Capabilities

The mobility and convenience offered by handheld devices has caught the attention of manufacturers and integrators, who are now marketing numerous security solutions.

Engineers Developing Military Applications for Smartphones

Engineers from the MU College of Engineering, with funding from the U.S. Army/Leonard Wood Institute, have enhanced popular smartphones to be able to find and track targets.

Department of Defense Announces Successful Test of Army Advanced Hypersonic Weapon Concept

A first-of-its-kind glide vehicle, designed to fly within the earth’s atmosphere at hypersonic speed and long range, was launched from the Pacific Missile Range Facility, Kauai, Hawaii to the Reagan Test Site, U.S. Army Kwajalein Atoll.

HID Global and Sony Introduce NFC-enabled Contactless Smart Card Reader Platform

HID Global, a source for secure identity solutions, and Sony Corporation recently introduced a jointly developed contactless smart card reader platform that embeds secure access control capabilities and Near Field Communication (NFC) functionality into laptops and other mobile devices.

Naval Research Laboratory's MIGHTI Selected by NASA for Potential Space Flight

A Naval Research Laboratory instrument designed to study the Earth's thermosphere is part of a future science mission that has been selected by NASA for evaluation for flight.

3i-MIND and iJET Partner in the Software Solutions Market

In today’s world, theft, espionage, the discrediting of corporate reputations and other disruptive activities are carried out on social networks and in public forums online. As a result, operational risk reduction requires a combination of subject matter expertise and open-source tools. Without one or the other, corporate security officers and their teams lose the upper hand in the battle against threats to their people and operations. This is the premise behind the integration of OpenMIND in iJET’s existing solution set.

Increase Security Not Complexity

Increase Security Not Complexity

As any security officer will tell you, there’s a compelling reason for integrating access control with a video management system (VMS). Key cards and PINs are just the first line of defense against unauthorized access.



The Future of Airport Passport Control

Digital security specialists, major European electronics makers and experts in biometrics are working together to make passport control at airports faster.

Software Keeps Sensitive Data Confined in Physical Space (With Video)

In a breakthrough that could aid spies, keepers of medical records and parents who want to prevent their kids from "sexting," a team of Virginia Tech researchers has created software to remotely put smart phones under lockdown.

Crime-fighting Tool Identifies Suspicious Individuals at Crime Scenes

A team of University of Notre Dame biometrics experts are developing a crime-fighting tool that can help law enforcement officials identify suspicious individuals at crime scenes.

Researchers Develop a Laser That Could Detect Roadside Bombs

A research team at Michigan State University has developed a laser that could detect roadside bombs.

NASA Scientist Unveils New Chemical Detection Technology

NASA scientists are creating technology that can detect hazardous chemical compounds in the air with a smart phone.

McAfee Highlights Discrepancy Between Data Center Security Perceptions and Reality

McAfee recently released the results of a survey conducted by Gabriel Consulting Group (GCG), an independent analyst firm, showing a serious disconnect between security perceptions and reality among IT Enterprise security managers.

Not for the Faint of Heart

Not for the Faint of Heart

Providing security in the government sector is not for the faint of heart or the uncommitted. The government sector requires expertise in high-level security applications, advanced compliance requirements and the challenge of securing funding.

Verification Versus Priority Dispatch

Over the last decade, the alarm industry has spent millions of dollars and thousands of hours addressing the issue of preventing unnecessary police dispatches from alarm systems.

Lets Work Together

Let's Work Together

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.

Securing Products on the Go

Securing Products on the Go

Distributors worldwide are increasingly challenged with enhancing the effectiveness of their operations. In an industry characterized by high turnover, strict regulations, slim margins and tenuous customer loyalty, retail distributors need to make smarter decisions and manage their businesses more effectively.

Axis, ADT Commercial Announce First Hosted Video Solution Installation

Axis Communications recently announced its first installation with newest hosted video solution provider partner ADT Commercial at Alco Watch & Jewelry in New York City. ADT Hosted Video, which makes its debut at ASIS 2011 in Orlando, utilizes Axis network cameras along with the AXIS Video Hosting System (AVHS) platform to provide video recording and management that is centrally managed by ADT and allows anytime, anywhere video access without the need for an onsite DVR.

ISee3D Unveils Single Lens 3D Technology

ISee3D Inc., developer of single lens 3D technology, announced recent industry-specific updates and advances. ISee3D is introducing a modified lens solution that cuts 3D down to size and increases frame rates, making practical a range of applications and bringing 3D to more markets, such as consumer, automotive, industrial and medical devices.

Featured

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3