Top Stories


University of Central Florida Modernizes IT Infrastructure

Campus Achieves Comprehensive Data Protection and Centralized Management for Entire Security and Surveillance Ecosystem with Pivot3 and Milestone Systems

Do You Know Where Your Data Is?

Do You Know Where Your Data Is?

Educational institutions are a data treasure trove.



Drones Using AI to Spot Violent Behavior in Crowds

Drones Using AI to Spot Violent Behavior in Crowds

Researchers are pairing artificial intelligence and drones in the latest experiment to prevent crimes before they happen.

Your cameras were hacked? It’s YOUR fault!

Your cameras were hacked? It’s YOUR fault!

IP security cameras are connected to the internet. That's what allows users to access them remotely, to check in on their business, and what lets manufacturers update device software without having to physically visit their business.

How to Ensure You Have a Safe and Efficient Farm

How to Ensure You Have a Safe and Efficient Farm

Installing alarms, safety training and fencing could be the difference in a secure farm.

Marshall County to Upgrade School Security before Next School Year

Marshall County to Upgrade School Security before Next School Year

Four months after two students died in a shooting on campus, the district is layering security measures to keep students safe.

Apple to Focus on Privacy and Security in iOS 12

Apple to Focus on Privacy and Security in iOS 12

Apple has announced new settings to strengthen security on your mobile, laptop and tablet devices.

Facial Recognition to Aid in Border Security this Summer

Facial Recognition to Aid in Border Security this Summer

The Vehicle Face System is planned for testing in August at the Anzalduaz Port of Entry in Texas.

Pentagon to Conduct All Federal Security Checks

Pentagon to Conduct All Federal Security Checks

Pentagon officials said that over the next three years it will be responsible for background investigations for military and civilian employees and contractors.

A Third of Companies Would Consider Paying Hackers

A Third of Companies Would Consider Paying Hackers

Several companies are opting for short-term reactive cybersecurity despite high profile ransomeware attacks.

House of Representatives Passes Bill Banning Government use of Chinese Surveillance Gear

House of Representatives Passes Bill Banning Government Use of Chinese Surveillance Gear

The $717 billion defense-policy bill is the latest move against Chinese technology on the basis of national security concerns.

Don’t Be Caught Unsecured

Don’t Be Caught Unsecured

Over the last decade, the cloud has revolutionized the way businesses operate. Today, modern enterprises are turning to a hybrid IT environment, leveraging the best of both worlds—the scalability of cloud infrastructure and the control of on-premises systems.

The Head Count

The Head Count

While students focus on learning, Putnam City Schools Police Department works hard to keep everyone safe. Officers monitor schools 24/7 and also spend a lot of time conducting investigations and compiling digital evidence for cases. Often, this involves working closely with local agencies to help keep their communities safe.

Video Grand Slam

Video Grand Slam

The Great American Ball Park in Cincinnati is the hallmark of America’s greatest pastime and home to baseball’s oldest franchise, the Cincinnati Reds. In addition to new food and entertainment options, providing high-end visual technology was a large priority—delivering a bevy of video walls, projectors, interactive screens, and flat screens that would entertain fans in and out of their seats for the ultimate game day.

Catching the Cybersecurity Wave

A few months ago I attended a security event in Atlanta that was primarily focused on cybersecurity and learned a number of things to share.

Out of Harm’s Way

With more than 21,000 individual artworks on display at any given time, the Butler Institute of American Art sought out a security system to assist the guards in monitoring the vast amount of rooms and corridors filled with priceless works.

Stopping Tragedy in its Tracks

Event organizers have responded to past attacks by improving their security methods and adding more metal detectors, police and other security personnel. Despite these efforts, a would-be terrorist can still manage their way to the venue’s entrance and pose a mass casualty threat.

Featured

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.