Top Stories


Largest Hospital System in New York Arms Guards to Prevent Mass Casualty Attacks

Largest Hospital System in New York Arms Guards to Prevent Mass Casualty Attacks

Qualified security guars at North Shore University Hospitals will now be armed amid shooting incidents in New York.

Structured Innovations Announces Merger with Legacy Marketing Reps

Leading Ohio-based manufacturers’ rep firm joins forces with top security rep firm in the Great Lakes region to offer communication infrastructure, A/V and security solutions.

Secret Service Issues Guide to Identify Threats for Schools

Secret Service Issues Guide to Identify Threats for Schools

A threat assessment program create standards for teachers and peers to identify threats before they happen.



Altronix Expands Trove Access and Power Integration Solutions with Paxton Access

Provides integrators with greater flexibility and efficiency

Keeping Your Office Safe and Secure

Keeping Your Office Safe and Secure

Office security is always important, but in the summer, it can get more lax.

Three Ways To Ruin A Security Director

Three Ways To Ruin A Security Director's Day

Whether your title is Security Director or you just have the responsibilities of one, there’s a lot riding on your shoulders.

Be Strong

Be Strong

Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?

Keeping Your House Secure

Keeping Your House Secure

Conversations about what can be done to keep violent weapons and dangerous materials from falling into the wrong hands continue to dominate the political discussion, leaving communities wondering about what they can do to prevent the next school or church attack.

Protecting Your Data

Protecting Your Data

Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.

Key Considerations

Key Considerations

Having both specific and shared goals is what makes medical centers quite unique to security. Rarely are two buildings alike, yet they all have common needs, requirements and goals.

Trusted Identities

Trusted Identities

As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.

Integrate to Save

Integrate to Save

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT.

Layering Facility Security

Layering Facility Security

Today’s facility operators must prepare for virtually any event from vandalism to a terrorist attack. With facilities ranging in size and use—from an emergency communications center to a multi-family apartment building—there’s no readily available one-size-fits-all security plan.

Bollards at the Benz

Bollards at the Benz

While the threat of terrorists planning to attack soft targets, such as stadiums, increases, stadium security professionals must look for the weak points throughout their facilities to determine where fanatics are most likely to assail.

Swinging For The Fence

Swinging For The Fence

With more than 120 permanent network cameras in place at Volunteer Stadium and Howard J. Lamade Stadium, Little League International works to add new technologies each year to keep the installation as secure as possible

Red Hawk Buys SDT to Grow Presence in Philadelphia Region

Red Hawk Fire & Security, LLC. has announced the purchase of Security and Data Technologies, Inc., (SDT) to continue extending its reach to customers in Philadelphia, and the tri-state area of Eastern Pennsylvania, Central and Southern New Jersey and Delaware.

The New World We Live In

I’m old enough to remember fire alarm drills and hiding under my desk as a youth. The fire alarm drills were great because we were able to leave the classroom and go outside. I never understood hiding under the desk, but went along with it anyway. That’s the world I grew up in.

Comparing Wireless Communication Protocols

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Our goal of clustering attacks on web applications is two-fold

Reducing Crime

Reducing Crime

With police departments often being under budgeted and over worked, resulting in reduced patrols and delayed response, many business owners have come to expect that valuable assets stored outdoors are going to be subject to theft and vandalism, and these costs just need to be absorbed.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3