Incident Response


Sky Raiders

Today’s airports are at the frontline of homeland security. Checking for shoe bombs, banned liquids and suspected terrorists are part of the daily routine for airport security personnel. In fact, airport vulnerability has become such an issue that the Department of Homeland Security assigns the airline industry its own threat level designation. For example, airports can be assigned to threat level orange, meaning “High Risk of Terrorist Attacks” while the rest of the nation is at yellow, or “Elevated Risk.”

Question & Answers From the Product Manager's POV

American Fibertek Inc.’s V’nes stands for Video Network Enterprise Solution. It is an integrated and standardized network transmission solution designed specifically for professional security applications with a specialized open path to truly integrate IP and analog systems operation.

You Can Run, but You Can’t Hide

Maintaining the security of any large residential institution housing hundreds or thousands of people can be a daunting task. The problems faced by those in charge of preserving the peace in these facilities can mirror those of any urban police department. As in any diverse population, there are those who will remain lawful and those who look to circumvent the rules that serve to regulate the peace.

The Art of Smart

It's a terrifying thought -- a hacker breaks past a company's firewall and has unlimited access to a jackpot of data, from employee information to trade secrets and financial details.

From the Product Manager's POV

New technologies are taking the world by storm. That means the security industry is in the midst of change and product rebirth. The same holds true for recording devices. DVRs are cost-effective, and NVRs are state-of-theart. Not sure which to choose? Read what Panasonic group manager Steve Surfaro has to say and then decide.

Sophisticated Surveillance

iControl Networks, GE Security Introduce Web-Based Security Solution

iControl Networks has introduced a Web-based solution to monitor and control the home, and will be introducing Home Security 2.0, along with partner GE Security.

Counter Attack

HEALTHCARE providers today deal with threats not thought of a few years ago. In the past, a family’s gravest concern was infectious disease, and if there were significant security threats, many people were comfortably oblivious of them. Today, healthcare facilities must be aware of multi-dimensional threats such as infant abduction, drug theft, workplace violence and even terrorism.



The Borne Security

CHILD abductors are seldom spontaneous. When they're bent on taking children from a facility such as a hospital, they'll stalk it, scope it out to determine its security features, and watch it like at hawk. But at WakeMed, abductors find Deputy Police Chief Scott Holzshu and his 71-officer police force watching too, using technology to make sure that security is as tight as possible.

Instituting Security

THE Institute for Advanced Learning and Research in Danville, Va., is a state-of-the-art facility built in 2005 to serve as a catalyst for economic and community transformation in an area recently impacted by the loss of thousands of manufacturing jobs. By providing advanced learning programs, strategic research and technology transfer conferences, and outreach and technology programs in the region of south Virginia, IALR is helping the community's workforce to adapt to a changing economy.

On Defense

IN a sea of 20,000 people at a concert or sports event, security becomes even more complicated than usual.

At the Heart of the Matter

THE operation of a busy regional hospital has enough challenges without taking into account the security of its staff. For Hotel Dieu Grace Hospital, located on the Detroit River in Windsor, Ontario, the priority was finding one system that would allow hospital workers to immediately reach out to security in an emergency situation.

Improving Evolution

YOU’VE heard it all before. “We’re living in a post-9/11 world.” “The terrorist threat is higher than ever.” “It’s just a matter of time before the next Sept. 11.” Yes, it’s tired. But unfortunately, it’s the truth. The fact is, terror threats continue to be a top concern at critical infrastructure sites. And domestic criminals continue to evolve and become smarter and more savvy in efforts to thwart security measures.

Surveillance Warm Up

THERMAL security cameras are imagers that see heat, or thermal energy, in an object. The human eye cannot detect thermal energy.

Hot Shots

IN today’s troubled times, large industrial sites are in more danger of security breaches than ever before. With miles of perimeter fencing and multiple entrances to secure, large petrochemical plants are a complex security challenge.

Protection Outside the Lines

WORLD events indicate the rate of growth in perimeter security requirements will continue to escalate for the foreseeable future. Airports, seaports and petrochemical facilities certainly qualify for increased protection, but schools, storage facilities, sporting events, bridges and tunnels are examples of new targets needing protection.

Making a Change

THE security industry has gone through many paradigm shifts during the last 100 years. As is the case with every paradigm change, there are winners and losers. The security industry is no different. Business paradigm shifts seem to always create new opportunities. However, some of those opportunities leave a wake of destruction and demise in its path. Seeing and understanding a new paradigm before it happens can make or break any company, regardless how big or small the company might be.

Tailoring Transformation

THE retail banking industry is undergoing a significant transformation accompanied by increasing regulatory compliance requirements, consumer demands and industry consolidation—all while working to provide the best in customer service and maintain operational efficiency.

Hands Up

Today, three out of four bank robbers are caught within 18 months of their crime. FBI and local law enforcement efforts are aided by financial institutions using current technological advancements along with specialized training and practices by bank employees.

An Eye On It All

IN an age when the need for increased security services is at an all-time high, managing security information has become more efficient, flexible and powerful.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3