Facility Security


Just How Safe and Secure are Inflight Meals

Just How Safe and Secure are Inflight Meals

Recent report raises questions about airline food safety and security.

VidSys Demonstrating its New Release 7.7 PSIM Software at ASIS

National Language Support means that the software can easily adapt to various languages without code changes.

Tyco Brings CEM to Americas

The security products company brings its brand of intelligent access control solutions over.

Columnist Says Those with Footage Have the Power

Columnist Says Those with Footage Have the Power

In the aftermath of the Ray Rice Scandal, it comes down to those with the camera footage.

Siemens Building Technologies Teams with Quantum Secure

Significantly expands global channel for SAFE Suite of software products.

Honeywell Announces Expanded Vista Panel Support Capability for Crestron Dealers

VISTA Security Panels can now communicate with Crestron 2- and 3-Series Control Systems through Honeywell 4232 Connected Building Module.

Security at NFL Stadiums a Top Priority

Security at NFL Stadiums a Top Priority

As the season gets underway, stadiums are taking some new security measures

Google Maps Sees Every Nook and Cranny Inside Buildings

Google Maps Sees Every Nook and Cranny Inside Buildings

Google believes Cartographer will be useful for trade shows, conferences and concerts.



3-D Printed Skeleton Key Can Open Almost Any Lock in Seconds

3-D Printed Skeleton Key Can Open Almost Any Lock in Seconds

Quickly breach high-security locks by using a printed "bump" key.

Eastern Michigan University Nearing Completion of Major Security Upgrades

Eastern Michigan University Nearing Completion of Major Security Upgrades

The university is installing new security cameras and AEDs with more upgrades to follow

Protect a Key

When Steven Shaker wants to know who last took a car on his lot out for a demo or wants to see the demo history of a specific vehicle, all he has to do is go to his computer and check the Morse Watchmans KeyPro software for the answer.

Enhancing the Customer Experience

Consumers’ expectations about their shopping experience at brickand- mortar, retail stores are changing. Mobile devices allow consumers to find any information they need with just a few clicks of a button, and this sense of immediacy has spread to how they shop.

Local Police Searching Security Cameras for Evidence in Arson of Football Player’s Vehicle

Arkansas quarterback Brandon Allen’s car was burned on Aug. 25

Advantech's 7" Handheld Pocket Pad Brings Full-size Computing to Mobile Healthcare Applications

Designed especially for use in clinical applications such as EMR, BCMA/CLMA, CPOE, PACS and radiology, is an extension of hospital information system (HIS) and is an ideal PDA.

Tips and Strategies for Securing Datacenters

Tips and Strategies for Securing Datacenters

It's a given that datacenters have sophisticated cybersecurity tools, but what about the facility itself?

Elementary Schools in Winston-Salem, N.C., Install Security Cameras in Every Classroom

Elementary Schools in Winston-Salem, N.C., Install Security Cameras in Every Classroom

The WSFCS school system also installed GPS trackers on every school bus

IRONCLAD Provides Solar Farms with Complete Perimeter Security Solution

Effective perimeter security that will prevent strangers from entering restricted areas.

Hospital Security Breach Steals Data from 4.5 Million Patients

Hospital Security Breach Steals Data from 4.5 Million Patients

Community Health Systems in Central Florida hospitals are affected by the breach

Nuclear Regulatory Commission Computers Hacked

Nuclear Regulatory Commission Computers Hacked

Internal investigation reveals three breaches in past three years, twice foreign related and once unidentifiable.

German Artists Claim Responsibility for the White Flags on the Brooklyn Bridge

German Artists Claim Responsibility for the White Flags on the Brooklyn Bridge

Two artists say they made the flags themselves

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.