Top Stories


Benefits and Challenges

Benefits and Challenges

The first IP network-based megapixel (MP) cameras were a disruptive technology. They were often more expensive on a unit basis than their familiar analog counterparts.

Integrators Look at Video Intercoms

Integrators Look at Video Intercoms

System integrators count on video intercoms to secure virtually any facility, whether it’s a remote water pump station, a pharmaceutical manufacturing plant or a multitenant apartment building. Intercoms add a valuable layer of security by letting employees or residents control who enters their facilities.

Join the Team

Join the Team

Winning more business is typically thought of as using marketing, advertising, referrals, or even cold calls and precision pitching to secure new opportunities at new clients. When it comes to physical security integration, there are after all, only so many doors to secure in your area of operation.



All On Board

Traditionally, security directors deployed physical access control systems to secure doors and IT managers controlled their networks. Physical security and IT security were managed independently and operated in silos. Today, this model is no longer successful.

The Evolution of a Standard

Like many other standards, ONVIF has evolved incrementally and its development, use and acceptance have as well. The journey ONVIF is on is actually quite typical for a standards organization.

Case Study: Everett Public School System Chooses Hanwha Techwin Cameras

Case Study: Everett Public School System Chooses Hanwha Techwin Cameras

The information technology department of the Everett Public School district was asked to design a modern security system that would serve the district’s current needs, be cost effective and handle future expansion.

Make the Right Choice

Make the Right Choice

Whether your business is contemplating an upgrade or delving into a comprehensive video surveillance system for the first time, it’s important to consider how a modern VMS integrated with state-of-the-art security devices can provide not only security but also analytics and business intelligence to help you move beyond visual security into understanding your entire environment.

Technology at the Door

Advancements in emerging technologies require leadership, critical thought about the future, and a willingness to take risks. Stretching oneself to integrate with new technologies is critical, of course, but the true promise of innovation is offering new solutions to the market.

Service Driven Security

Service Driven Security

Efficiency is part of Climatec’s DNA—after all, much of their work is in energy and access solutions—but efficiency doesn’t mean taking shortcuts. Climatec believes in client-focused, service-driven work and solutions.

The New Reality

Technology marches ever forward, lockstep with ‘Moore’s Law.’ However, the influx of technological change affects different industries in different ways.

Digital Security in a Zero Trust World

Digital Security in a Zero Trust World

We’re hearing about security breaches every day in the news. From retailers like Target and TJ Maxx, to financial services firms like Equifax and J P Morgan Chase, and government agencies like the Securities & Exchange Commission (SEC), it seems like no organization is safe.

Artificial Intelligence and Drones

I went shopping after Christmas. Right there, on sale, I spotted a drone. I couldn’t take my eyes off of the box and for whatever reason, I felt compelled to buy it.

Instruction vs. Deduction: Deep Learning and Advances in VCA

As camera counts and the data they provide grow ever-larger, it becomes increasingly difficult for organizations to monitor, perform investigations, and draw useful conclusions from the valuable information gathered by their video surveillance infrastructure.

Security with an International Flavor

Security with an International Flavor

Based on its extensive experience in airport operations, ASUR determined that it needed to redesign video security at Cancun Airport to have one system operating across all four terminals.

Radical Departure on the Edge

After several business trips to California, I did bump in to something a little radical and most certainly worth a story. The story begins with Steve Reinharz, a man who is living on the leading edge of technology. It is the people, or things that he associates with that brings pause.

Security Sparks Growth

Security Sparks Growth

With the decline in shopping mall popularity and a rise in online buying, many businesses are desperate for busy new places to set up shop. And, with air travel at an all-time high, many airports are working to upgrade their terminals, making them more comfortable, competitive and profitable for all involved.

A New Kind of Employee

A New Kind of Employee

More than 22 years ago, Steve Reinharz decided he wanted to become part of the security industry. He stepped into his first integration at a local gas station.

A Privacy Balancing Act

A Privacy Balancing Act

Privacy. It’s gone beyond buzzword into a class of its own: basically, privacy of the individual is of the ultimate importance, and all else must fall away in our efforts to preserve it.

Cyberattack Continues to Plague the City of Atlanta

Cyberattack Continues to Plague the City of Atlanta

It is one of the largest cyberattacks against a major U.S. city.

San Antonio Boosts Security for NCAA Final Four

San Antonio Boosts Security for NCAA Final Four

San Antonio Police Chief William McManus said his department has partnered with 12 other agencies to collect intelligence and keep the events and attendees safe.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3