Facility Security


Wireless Video Surveillance System Protects Illinois Mall

Merchants, assets and shoppers at the 1 million-square-foot Golf Mill Shopping Center in Niles, Ill., are better served since the installation this month of a new wireless video surveillance system.

Intelligent Video Helping To Prevent Copper Theft

Arteco recently announced the installation of IVS systems in The Columbus Division of Electricity utility substations, in Columbus, Ohio, for the purpose of preventing copper theft and other security related issues.

Wireless Technology Enhances Hotel Security

ZigBee technology from Ember is helping hotels keep their guests' valuables safe and secure while providing a better customer experience and more efficient hotel operation. The company partnered with SAFLOK, a hospitality security technology provider, to ZigBee-enable wireless in-room systems around the world.

New Zealand Banks Use NVR Technology To Improve Security

One of New Zealand’s leading financial institutions, the Bank of Zealand is a member of the National Australia Bank group, has assets of NZ $56.4 billion and operates 180 branches across the country. BNZ had been using the same tape-based analog recording system for 16 to 18 years, and officials wanted to upgrade to modern technology.

A Lifeline to Protection

Newton Memorial Hospital opened its doors in 1932 with 40 acute care beds and 10 bassinets to provide healthcare to Sussex County, N.J. After acquiring 10 acres of land adjacent to the original parcel in 1961, NMH constructed a wing to house a new radiology department, clinical and pathology laboratories, an emergency room, an intensive and coronary care unit and a 20-bed general medical surgical unit. This expansion increased the hospital’s bed count to 148.

A Safer Sanctuary

Protecting the safety of vulnerable adults used to keep Lara Parsons awake at night. Not anymore. The introduction of a security system built around plastic photo ID cards now helps Parsons, director of development at Shoreham Village, get a better night’s sleep.

Brivo Systems Technology Provides 24-Hour Access Control

Brivo Systems, a provider of Web applications for access control and security systems, recently announced that eFit Financial, provider of health club management software and services, has signed up more than 20 customers for its new 24-hour access service.

A Burning Need

The protection of life and property within government facilities nationwide requires a proven solution that’s flexible, yet cost-effective. Using the E3 Series® emergency evacuation system by Gamewell-FCI, two facilities—different in both form and function—got all the protection they required.



Design Dynamics

A comprehensive fire and life safety design requires a cohesive blend of alarm and detection capabilities, an appropriate suppression system and a number of other building construction features related to occupancy, facility type and use of space. Planning, an often overlooked component, is integral to keeping occupants safe.

Stopped In Their Tracks

Before Sept. 11, 2001, perimeter security provided an extra barrier of protection for an airport and its people—typically from hijackers and vandals. Although that is still true, there is now an added threat. Today, we cannot afford to let a terrorist or attacker get near airport facilities, people or passengers. In all too many cases, getting close is all they have to do.

Taiwan University Launches Campus-Wide Video Surveillance With Wireless Mesh Network

Taiwan’s Tajen University now ensures campus safety and delivers Wi-Fi access to its 12,000 students and staff using a wireless network infrastructure from Firetide Inc.

University Of Minnesota Uses Two-Factor Authentication Solution

Secure Computing Corp., a enterprise gateway security company, recently announced that University of Minnesota has selected the company's Secure SafeWord (formerly known as SafeWord) as a two-factor authentication solution for 8,000 staff and faculty members.

HID Global Launches IT Channel Program

HID Global recently announced the launch of the HID Global IT Channel Program, established to facilitate identity and access management with leading third-party IT vendors focused on providing secure data access software and integrated strong authentication solutions.

Optellios Announces Hardened, Multi-Zone Intrusion Detection System

Optellios Inc. announced recently that it will be launching a new family of FiberPatrol intrusion detection systems featuring modular, environmentally hardened 4-zone alarm processors. The company will be demonstrating the product at Booth 1044 at ISC West.

RFID Solution Protects Newborns During Hospital Stay

It’s some of the worst nightmares for the parents of a newborn -- their child being abducted or switched during the hospital stay. But thanks to a RFID solution from Xmark, parents are resting just a little easier.

Generation Next

Building security has moved beyond locks and dependable security guards. Today’s threats require sophisticated security. The next generation of access control will converge physical and network security into one manageable entity.

A Boost at the Border

Mention border security, and you might imagine the intersection of two countries, or perhaps the border separating government facilities from private land. But border security also can be defined as perimeter security, which expands the concept to encompass walls, fences, roads and other perimeters around businesses, schools, prisons, utilities, research facilities, and other properties and buildings.

A Way Out

They may not be as cutting edge as video analytics and other new security breakthroughs— but every building has them.

Information is Power

When an incident occurs on campus, the main obstacle is bridging the gap between those who have information concerning the event and those who need to know. Two examples can be used to analyze this problem.

Sound the Alarm

If you pick up any local employment guide, you cannot avoid seeing the many call centers with ads that read, “Customer service representatives wanted—immediate hire.” Why are these call centers continuously struggling with hiring and turnover?

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.