Top Stories


Going All Out

Going All Out

When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.

Security on a High Note

Security on a High Note

The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.

Eliminating Fraud

The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.



The New Age

The New Age

Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.

The Next Evolution

The Next Evolution

It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.

The Changing Landscape

The security landscape is constantly evolving with new products and technologies. With the introduction of these new and improved technologies, it is inevitable that products which have existed within the industry for years may no longer be the go-to choice when it comes to selecting system equipment.

Archiving Security

Archiving Security

The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.

The Best Bet

The Best Bet

The casino and hospitality industry includes hotels, restaurants, entertainment venues as well as gaming elements to entertain visitors and guests.

Booking an Upgrade

Booking an Upgrade

Farmington community library needed access control to restricted areas and employee entrances, video surveillance at the building perimeter, parking lots, restricted and common areas, and intrusion detection on all controlled doors.

Get Out of Our Space

Get Out of Our Space

Most people, when confronting a drone (Unmanned Air Vehicle/Unmanned Air System) operating in or around their area of responsibility in an unsafe manner, would like to bring it down immediately.

Lost in the Lumens

Most of us can recall our elders offering the sage counsel of “moderation in all things.” It seems that dated phrase has become quite apropos once again especially as it applies to the discussion of the lumens needed in flashlights for law enforcement and security staff.

Updating Legacy Power Systems

It is exciting times for physical security today. Technology has advanced at breakneck speeds, quite significant for an industry that seemed to stand still for decades.

Playing by the Rules, or Metrics

Recurring Monthly Revenue, almost always referred as RMR, is probably the most important metric of any subscription business.

Our Digital Identities

Our Digital Identities

Blockchain, the backbone technology behind Bitcoin, has grown exponentially since its inception in 2008. Since 2013, Google searches of “blockchain” have risen by 1,900 percent.

A Frontier Town, Polar Bears, and the Open-Platform Video Surveillance Community

A Frontier Town, Polar Bears, and the Open-Platform Video Surveillance Community

Milestone teams up with NMS Security, SpotterRF and Polar Bears International to deploy a unique camera/radar solution to help the city of Churchill, Manitoba keep citizens and polar bears at a safe distance from each other.

FLIR Named Official Video Security Provider of Gold Coast 2018 Commonwealth Games

FLIR Provides Over 300 Cameras and Video Management Software to Increase Security Surveillance at Athlete Village and City Perimeter Protection

US Border Patrol Unable to Validate E-Passport Data

US Border Patrol Unable to Validate E-Passport Data

E-passports store a cryptographic signature to prevent forgeries and tampering, but CBP has not deployed the software needed to verify the information, causing a security lapse.

Top DDoS Attack Types Exposed

Top DDoS Attack Types Exposed

Due to the success of DDoS attacks, attackers are constantly evolving their techniques, so that they can target more organizations at once.

Featured

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

  • Why the Future of Video Security Is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reasons. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. Read Now

  • UL Solutions Launches Artificial Intelligence Safety Certification Services

    UL Solutions Inc., a global leader in safety science, today announced the launch of artificial intelligence (AI) safety certification services, enabling comprehensive assessments for evaluating the safety of AI-powered products. Read Now

  • ESA Announces Initiative to Introduce the SECURE Act in State Legislatures

    The Electronic Security Association (ESA), the national voice for the electronic security and life safety industry, has announced plans to introduce the SECURE Act in state legislatures across the country beginning in 2025. The proposal, known as Safeguarding Election Candidates Using Reasonable Expenditures, provides a clear framework that allows candidates and elected officials to use campaign funds for professional security services. Read Now

    • Guard Services

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.