Top Stories


Live From GSX: Wrap Up

Live From GSX: Wrap Up

Rebranding Your Name

As I ponder the final message from Global Security Exchange (GSX), I have to think that the rebranding of ASIS to GSX was a mistake. After spending two and a half days on the show floor, and talking to numerous people, not a single person referred to the show as GSX.



29 Complete Homeland Security Master

29 Complete Homeland Security Master's Degree Program

These graduates will join a national cadre of cohorts who are helping keep our nation safer.

New York City Launches Security App

New York City Launches Cybersecurity App

The smartphone application will help New York City residents increase their personal cybersecurity.

Facebook Hacked: 50 Million Users

Facebook Hacked: 50 Million Users' Data Exposed

Attackers stole log-in credentials, allowing them to take over user accounts.

California Law Demands More Security From Connected Devices

California Law Demands More Security From Connected Devices

Ohio University to Spend $1 Million on Security Following Sexual Assaults

Streamlined for Success

Streamlined for Success

In a new industry with strict regulatory requirements, the video surveillance system is everything but ordinary. First, it had to be a modular system to allow the company to scale it through the multiphase project.

Enhancing Security

Enhancing Security

Video analytics solutions are enabling organizations to realize the full value of their video surveillance resources and enhance safety, security and overall business operations.

Complete Perimeter Solution

Complete Perimeter Solution

A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples.

An Eye on the Campus

An Eye on the Campus

Every day, tens of millions of parents entrust schools with their children’s safety and every day, those parents worry if that trust is misplaced. In addition to the frequent headlines about school shootings, children deal with other pressing issues at school, whether it’s bullying, drugs or harassment.

Keeping the Bad Guys Out

Keeping the Bad Guys Out

Protecting government agencies requires the widest palette of security solutions with facilities ranging from a storefront military recruitment center to a bustling international airport or a biological research center.

Offering More than Products

Offering More than Products

In the security industry, our mission is critical: protect the people, places and things that matter most.

Total Cost of Ownership

As cloud computing and software as a service (SaaS) have evolved, video surveillance as a service (VSaaS) or cloud surveillance, has emerged as the most popular option for businesses seeking to simplify their physical security installations.

Making Your Expertise Unique

Making Your Expertise Unique

Every businessperson wants to bring something different, or unique, to the table when they talk about their business solutions. In the security industry, or more particularly, the security consultant, the same applies. You’ve got to have a secret sauce.

Solving Problems

Solving Problems

The industry is changing so rapidly that the following statement might seem bold but it’s true. No one wants to buy a camera.

Creating Cloud Platforms

Creating Cloud Platforms

Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3