Top Stories


The IP Evolution

A few advantages with IP-based systems worth mentioning are remote access anytime, anyplace; digital images do not degrade over time; real time analytic capability; and content distributed electronically quickly and easily.

Are We All in on Security

I suppose it’s only a matter of time before another obscene, violent act will make headlines across the world. I do not wish for this, but these days it seems to be one wave after another.

Maintaining Customer Trust

Maintaining Customer Trust

There are a few things you should know about the consulting business in the security industry. First, it is a must to be a trusted security advisor.



Making the Case

Established security integrators often deal with prospects who are also considering solutions that let them eliminate live monitoring and keep an eye on their homes via smartphone.

It’s a Woman’s World

It’s a Woman’s World

As with the technology in the industry, times are changing and Nancy Ford, and many other women, are now filling the rank and file of a booming industry.

The New First Responder

The New First Responder

People are constantly on the move—particularly in busy transit hubs—and passengers need to know where they should be and by when.

Biometric Ideas

Biometric Ideas

To best leverage the advantages of biometrics, integrators should follow the tips outlined below to take advantage of the primary benefits of biometrics, which are enhanced security and convenience.

Getting A Hold On The Bandwith

More than a decade ago, it was all about analog cameras. My, how times have changed. By 2010, IP-based cameras were taking over the security duties, and doing a good job, but there were challenges.

Putting the Customer First

Boxerbaum was driven by good work and making the world a more secure place, but he also was a techie interested in futuristic gadgets.

Its Not Just A Turnstile

Its Not Just A Turnstile

Many professionals in the security industry today tend to use the word “turnstile” to refer to all security entrances, when, in fact, there are actually multiple types of entrances for different applications, industries and levels of security.

Retail Under Fire

A recent data security report, published by Thales, revealed that 62 percent of all retailers worldwide have experienced a data breach within the past year.

Criminal Intent

Criminal Intent

As more of our lives move online, crime has unfortunately migrated to the internet at matching pace taking form in what’s now considered cybercrime.

3 Access Control Trends to Watch

hile video surveillance may get all the attention—what with the stunning sharpness of 4K, the immersive experience of panoramic sensors and see-through-the-night capabilities— for most security projects, the door access control solutions are among the most important.

Held Hostage

Ransomware attacks are becoming infamous. As I write now, the Petya attack is unfolding.

MONI Smart Security Hosts 5K Run with Mission 500 for Children in Need

Charity Run Raises More Than $36,000 and Provides 600 Local Elementary Students with Book Bags

Micron Accelerates Edge Storage for Video Surveillance

New industrial microSD cards designed for commercial and enterprise surveillance deliver cost savings, ease system design and speed deployments

Data Breaches That Will Haunt You

Data Breaches That Will Haunt You

This year has been filled with some of the biggest data breaches in history, which is a truly horrific thought.

3 Common Misconceptions About Business Security Systems

3 Common Misconceptions About Business Security Systems

When you can secure the building at night, you can open your business for a lucrative tomorrow.

Three Technologies That Will Change Your Business

3 Security Technologies to Invest Time in Researching

How researching and investing in these three technologies will change your business

5 Halloween Home Security Tricks

5 Halloween Home Security Tricks

Just because Halloween is here doesn't mean you have to throw security out the window.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3