Facility Security


Guardly Enterprise E911 Solution Improves Active Shooter Response

New indoor positioning systems enhance ability for security teams to detect shooters earlier and locate people inside buildings.

HID Global's NFC Tag Technology Reduces Fraud in Home Healthcare Market

Integrity caregivers established “proof of presence” by tapping HID Global’s trusted tags with their NFC-enabled smartphone, eliminating opportunities to falsify records.

Author Cancels College Visit over Gun Policy and Security

Author Cancels College Visit over Gun Policy and Security

Dana Loesch was scheduled to speak about her new book ‘Hands Off My Gun’

Man Still Missing from Broncos Game

Man Still Missing from Broncos Game

The 53-year-old was last seen during halftime of the Broncos vs. Chargers game

Security Situation Investigated on Flight to Charlotte

Security Situation Investigated on Flight to Charlotte

Passengers were stranded for more than an hour after their plane landed.

Pennsylvania School Boosts Security after Reported Sighting of Alleged Killer

Pennsylvania School Boosts Security after Reported Sighting of Alleged Killer

Eric Frein, the suspect of a deadly police ambush, was allegedly spotted near his old school

New SightLogix Certified Partner Program Targets Regional, Entrepreneurial Integrators

Program advocates technology specialization and innovative new business development practices.

Security Within Reach

Since the aftermath of 9/11, the United States has intensified transportation security efforts across the board. For most of us, stronger security measures have been focused at the nation’s airports, where travelers are subject to more stringent screening protocols.



Cutting-edge Surveillance

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur.

Securing the Old with the New

To accomplish such a comprehensive and multi-stage migration and expansion— and avoid issuing brand new credentials to nearly 20,000 employees —the team devised a strategy to run C•CURE 9000 on the front end using proximity technology with the legacy access control system running in the background to support the existing magnetic stripe cards.

Putting Out the Welcome Mat for Video Surveillance

For Conlin Properties, IP surveillance cameras from Axis Communications have played a critical role in the program’s success. Executives estimate that they have seen a 40 percent reduction in incident calls since they started using and publicizing these cameras.

USSS Director Writes Testimony Regarding White House Perimeter Breach

USSS Director Writes Testimony Regarding White House Perimeter Breach

Director Pierson brings up some new concerns about the Secret Service.

Sidney Airport Triggers Full-Scale Security Alert after Man on iPad wanders through Exit

Sydney Airport Triggers Full-Scale Security Alert after Man on iPad wanders through Exit

A man wandered into a secure area via an exit while focused on his iPad.

Investigation into Pacific Gas & Electric’s Security Shows Weaknesses

Investigation into Pacific Gas & Electric’s Security Shows Weaknesses

A local NBC affiliate in the Bay Area looked into the security of a utility company that was attacked a year ago.

Secret Service Reviews White House Security after Intruder Enters Mansion

Secret Service Reviews White House Security after Intruder Enters Mansion

A military vet who served three tours in Iraq jumped the White House fence and entered the front door

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

Xentry Systems Integration and Ascom Partner

Partnership streamlines mission critical healthcare communications for customers.

Just How Safe and Secure are Inflight Meals

Just How Safe and Secure are Inflight Meals

Recent report raises questions about airline food safety and security.

VidSys Demonstrating its New Release 7.7 PSIM Software at ASIS

National Language Support means that the software can easily adapt to various languages without code changes.

Tyco Brings CEM to Americas

The security products company brings its brand of intelligent access control solutions over.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3