Top Stories


Red Hawk Fire & Security Grows with New Florida-based Acquisition

ISOF President Walter Wiseman believes aligning with one of the top independent integrators in the industry will add significant value to customers.

Paris Guard Fires on Man with Machete at Louvre

Paris Guard Fires on Man with Machete at Louvre

Police in Paris have arrested a man after he attacked a soldier near the Louvre.

Westinghouse Security Integrates its Z-Wave Enabled RTS Electronic Lock with Alarm.com Platform

Westinghouse Security announces the integration of its RTS lock, including Z-Wave technology, with Alarm.com’s leading platform for the intelligently connected home and business



Prison Inmates in Delaware Take Guards Hostage, 1 Dead

Prison Inmates in Delaware Take Guards Hostage, 1 Dead

One prison guard was pronounced dead at the prison.

Security Tight for Super Bowl Sunday

Security Tight for Super Bowl Sunday

Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.

Jody Ross Promoted to Vice President of Global Sales and Business Development

AMAG Technology is pleased to announce that Jody Ross has been promoted to Vice President of Global Sales and Business Development for AMAG Technology.

City of Houston Deploys Axis Cameras to ensure public safety during Super Bowl LIVE

Site of 10-day fan festival in downtown Houston to feature Axis video and audio products.

The Cloud Keeps Evolving in 2017

The Cloud Keeps Evolving in 2017

Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.

Bandwidth Throttling

VMS Bandwidth Saving Technologies

Beyond the core functionalities of recording and displaying video, one of the most important capabilities of modern Video Management Software platforms is the ability to reduce bandwidth required for transmitting live video.

Making IP Video Cyber Secure

Financial institutions have been historically slow to adopt IP video surveillance citing concerns about possibly compromising network security.

Controlling The Keys

Controlling The Keys

After a year of in–depth research and testing of many systems, the RJUSD found CyberLock’s access control system to be the solution that best fit the district’s needs, including installation and maintenance.

See What You’re Missing

Fraud prevention, it’s time to get better acquainted with your security team. You may see them in the hallways, have a coffee with them in the breakroom, and possibly join them on the dance floor at your annual holiday party.

Alarming Trend with Police

I’ve been writing, professionally, for 40 years. The first story that I ever worked on was a triple homicide, and a contract murder that was related. Back then, I didn’t think reporting could get any worse.

Stop Lingering

Security threats are on the rise and as IT security teams increase their scrutiny of all network-connected devices, it’s time for some new thinking about the design and maintenance of building security systems.

Security by the Book

Security by the Book

Pick any county in the United States, money is scarce to non-existent, and in the pecking order of who gets the available money, the county library is way down the line.

The Connected World

The Connected World

The abundance of networked solutions and devices—both security and nonsecurity— has exploded in recent years, providing unparalleled convenience and efficiency.

Emergency Security

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

Triggers for Transition

It can be difficult to decide whether and when to make the transition to new access control technology. Transitions are often delayed over budget concerns or because of worries that the process will adversely impact productivity and workflow.

Dissecting the Advantages

Physical identity access management (PIAM) solutions have changed the way leading organizations approach security.

Terminal Upgrade

Terminal Upgrade

Terminal One at JFK International Airport had relied on a limited analog surveillance system and a separate, older IP system that were independent of each other.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3