Incident Response

Sky Raiders

Today’s airports are at the frontline of homeland security. Checking for shoe bombs, banned liquids and suspected terrorists are part of the daily routine for airport security personnel. In fact, airport vulnerability has become such an issue that the Department of Homeland Security assigns the airline industry its own threat level designation. For example, airports can be assigned to threat level orange, meaning “High Risk of Terrorist Attacks” while the rest of the nation is at yellow, or “Elevated Risk.”

Question & Answers From the Product Manager's POV

American Fibertek Inc.’s V’nes stands for Video Network Enterprise Solution. It is an integrated and standardized network transmission solution designed specifically for professional security applications with a specialized open path to truly integrate IP and analog systems operation.

You Can Run, but You Can’t Hide

Maintaining the security of any large residential institution housing hundreds or thousands of people can be a daunting task. The problems faced by those in charge of preserving the peace in these facilities can mirror those of any urban police department. As in any diverse population, there are those who will remain lawful and those who look to circumvent the rules that serve to regulate the peace.

The Art of Smart

It's a terrifying thought -- a hacker breaks past a company's firewall and has unlimited access to a jackpot of data, from employee information to trade secrets and financial details.

From the Product Manager's POV

New technologies are taking the world by storm. That means the security industry is in the midst of change and product rebirth. The same holds true for recording devices. DVRs are cost-effective, and NVRs are state-of-theart. Not sure which to choose? Read what Panasonic group manager Steve Surfaro has to say and then decide.

Sophisticated Surveillance

iControl Networks, GE Security Introduce Web-Based Security Solution

iControl Networks has introduced a Web-based solution to monitor and control the home, and will be introducing Home Security 2.0, along with partner GE Security.

Counter Attack

HEALTHCARE providers today deal with threats not thought of a few years ago. In the past, a family’s gravest concern was infectious disease, and if there were significant security threats, many people were comfortably oblivious of them. Today, healthcare facilities must be aware of multi-dimensional threats such as infant abduction, drug theft, workplace violence and even terrorism.

The Borne Security

CHILD abductors are seldom spontaneous. When they're bent on taking children from a facility such as a hospital, they'll stalk it, scope it out to determine its security features, and watch it like at hawk. But at WakeMed, abductors find Deputy Police Chief Scott Holzshu and his 71-officer police force watching too, using technology to make sure that security is as tight as possible.

Instituting Security

THE Institute for Advanced Learning and Research in Danville, Va., is a state-of-the-art facility built in 2005 to serve as a catalyst for economic and community transformation in an area recently impacted by the loss of thousands of manufacturing jobs. By providing advanced learning programs, strategic research and technology transfer conferences, and outreach and technology programs in the region of south Virginia, IALR is helping the community's workforce to adapt to a changing economy.

On Defense

IN a sea of 20,000 people at a concert or sports event, security becomes even more complicated than usual.

At the Heart of the Matter

THE operation of a busy regional hospital has enough challenges without taking into account the security of its staff. For Hotel Dieu Grace Hospital, located on the Detroit River in Windsor, Ontario, the priority was finding one system that would allow hospital workers to immediately reach out to security in an emergency situation.

Improving Evolution

YOU’VE heard it all before. “We’re living in a post-9/11 world.” “The terrorist threat is higher than ever.” “It’s just a matter of time before the next Sept. 11.” Yes, it’s tired. But unfortunately, it’s the truth. The fact is, terror threats continue to be a top concern at critical infrastructure sites. And domestic criminals continue to evolve and become smarter and more savvy in efforts to thwart security measures.

Surveillance Warm Up

THERMAL security cameras are imagers that see heat, or thermal energy, in an object. The human eye cannot detect thermal energy.

Hot Shots

IN today’s troubled times, large industrial sites are in more danger of security breaches than ever before. With miles of perimeter fencing and multiple entrances to secure, large petrochemical plants are a complex security challenge.

Protection Outside the Lines

WORLD events indicate the rate of growth in perimeter security requirements will continue to escalate for the foreseeable future. Airports, seaports and petrochemical facilities certainly qualify for increased protection, but schools, storage facilities, sporting events, bridges and tunnels are examples of new targets needing protection.

Making a Change

THE security industry has gone through many paradigm shifts during the last 100 years. As is the case with every paradigm change, there are winners and losers. The security industry is no different. Business paradigm shifts seem to always create new opportunities. However, some of those opportunities leave a wake of destruction and demise in its path. Seeing and understanding a new paradigm before it happens can make or break any company, regardless how big or small the company might be.

Tailoring Transformation

THE retail banking industry is undergoing a significant transformation accompanied by increasing regulatory compliance requirements, consumer demands and industry consolidation—all while working to provide the best in customer service and maintain operational efficiency.

Hands Up

Today, three out of four bank robbers are caught within 18 months of their crime. FBI and local law enforcement efforts are aided by financial institutions using current technological advancements along with specialized training and practices by bank employees.

An Eye On It All

IN an age when the need for increased security services is at an all-time high, managing security information has become more efficient, flexible and powerful.


  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • New Uses for AI

    New applications of AI in IP cameras are delivering precise detection, robust search capabilities, elevated data analysis and enhanced image quality. When combined with built-in analytics, AI can help streamline forensic investigations and also supports several mission-critical business functions. Read Now

  • The Critical Missing Piece

    As technology advances, security programs have invested heavily in advanced systems and sensors. These sensors generate massive amounts of data, often overwhelming the security teams tasked with monitoring them. AI technology promises to sift through this data, using logic and reasoning to differentiate potential threats from non-threats. Read Now

  • Computers Beginning to Come Back Online After CrowdStrike Caused Crash Friday

    Computers around the world are beginning to come back online after a defective update to Windows machines from cybersecurity provider CrowdStrike Friday affected almost 9 million machines. Read Now


New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3