Top Stories


Cyber Impact

Cyber Impact

Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.

Ready for the Showdown

All signs are pointing to Las Vegas for ISC West. Even though I’m writing this two months ahead of the show, it is pretty much all that is on my mind, as far as work is concerned.

You Can Benefit

Sales of home automation systems and connected or smart locks are growing every year.



Keep It Simple

Keep It Simple

Over the past decade, high-tech devices, megapixels, Power over Ethernet, and many other new offerings and improvements have revolutionized the physical security landscape.

Private and Secure

Private and Secure

Cyberattacks are on the rise. Whether via IT infrastructure or internally, the Security Industry faces the challenge of guaranteeing that the data in their systems remains private, properly protected and encrypted.

Experience, Longevity Focused on Security

In November 2015, New York-based system integrator Total Recall Corp. celebrated 30 years of designing and delivering technologically advanced video surveillance security solutions for a variety of industries including law enforcement, government agencies and corporations.

Diversifying Company Assets

Diversifying Company Assets

You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.

Helping Security Directors Sleep at Night

Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more.

A Prayer For Security

Houses of worship have long been known as welcoming, open havens, offering support and guidance for people in need, but that mission is being challenged by active shooters and other criminals committing assault, theft, arson and vandalism.

Seven Superior Steps

Today’s instant economy requires that more of a company’s business processes be open to external stakeholders.

High-Level Threats

Our world is connected through travel now more than ever before. Globalization has made way for a constant coming and going, making border security more necessary.

Growing Connection

The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.

CLOUD-BASED SOLUTION

Cloud-based Solution

Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.

United Tech Rejects Honeywell

United Tech Rejects Honeywell's $90.7 Billion Offer

United Technologies rejected a $90.7 billion offer from rival supplier, Honeywell Inc.

Milestone Makes the Move to Open Platform Community

Milestone Makes the Move to Open Platform Community

Milestone Systems announced at the annual MIPS event their move from Open Platform Company to Open Platform Community.

Workplace Shooting Spree Kills 4

Workplace Shooting Spree Kills 4

A Kansas Sheriff believes a protection order sparked a shooter to kill 4 and injure 14 more.

Award Show Security at an All Time High

Award Show Security at an All Time High

This year’s Oscar show will be the first since the terrorist attacks in San Bernardino and Paris resulting in intense security of those attending.

A Child Tracker Website, uKnowKids, Admits Data Breach

Child Tracker Website, uKnowKids, Admits Data Breach

A website that contains information about children in case they go missing has admitted a glaring security hole that leaves the data of over 1,500 children exposed.

Featured

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities