Top Stories


Man Overboard!

Man Overboard!

Many of us have gone on a cruise vacation or know of a close friend or relative who has done so. Cruising is a popular vacation option enjoyed by families and individuals throughout the world.

Multi-dimensional Applications

According to a number of studies, hospital crime and violence have been growing at an alarming rate in recent years. The wide variety of security threats that healthcare facilities face include theft by employees or visitors, violence or threats from visitors or patients, and other crimes of opportunity.

Taking Stock of Security

Throughout the course of a calendar year, we take a look at numerous security solutions, events and, in our case, publications. In this issue, we have a specialty publication that focuses on government security. Security in the public sector is a big deal.



Providing a Network Link

Providing a Network Link

Outdoor wireless bridges are used to provide a network link from one location to another. You may want to network surveillance cameras back to your main office building, or share Internet and network access with another building on your campus.

Engaging a Rapid Response

There is more than one reason why emergency vehicles have lights and sirens. Several years ago, there was a campaign by the Ohio state fire marshal which was, “Move right for lights and sirens.” This makes a lot of sense, allowing emergency response to get where they need to be with minimum interference.

The Next Big Step

The Next Big Step

Individuals have found that their phones and other smart devices can be used in their own homes to operate locks, and—along with the push for more IoT-enabled devices at work in general—they have come to expect the same level of sophistication and convenience at work.

Grow Your Business

Grow Your Business

Doing business with the government—federal, state or even local—can be very difficult. The regulations, the paperwork, the unique needs and buying cycles are all tough requirements that have to be met. It can make for a complicated scene, but it’s also a vitally important business that can be financially rewarding despite the challenges.

All the Hype

All the Hype

Alongside the hype in the media about the border wall, this might be a good time for commercial and industrial companies to take a closer look at their own borders. Threat levels are increasing due to rising crime, civil activism and even cyber threats and it is more important than ever to push the line of defense all the way to the borders.

Anti-ram Fencing

Vehicle ramming attacks are on the rise in the United States and abroad. Already in 2017, there have been no less than seven major attacks worldwide resulting in 24 people dead and another 153 injured.

Time for an Upgrade

Time for an Upgrade

When a regional traffic management center in Washington state outgrew its building—as well as the size of its roadway monitoring system— the staff realized it was time not just for a physical upgrade, but a technological one, too

Cannabis Cash - How do you secure your place in the weed business?

Cannabis Cash

Where is all the money in the marijuana business going? Who is moving the cash or product as it seems to be in the news all the time? Here we share why it’s important to your business that you know how this is all happening.

Using the Cloud

Using the Cloud

Today, cloud applications are all the rage and for good reason. The cloud allows us to work and play in ways that are so much more productive and engaging.

Minimize Crime

Minimize Crime

The city of Hartford, Conn., first began expanding and upgrading its surveillance capabilities in 2013 with a new Public Safety Complex and police headquarters. The city enlisted Vulcan Security Technologies to implement a new IP video system that could expand to include hundreds of cameras.

A Better Defensive Line

A Better Defensive Line

In the United States, technology has become the essential force multiplier. With nearly 6,000 miles of border with the neighboring north and south, it would be impossible to hire enough border personnel to protect every mile.

Bridging the Gap

The mobile ID revolution is gathering pace, but not everyone has a smartphone today, and many citizens prefer to carry a physical card. How do government agencies manage this transition from physical to mobile, and ensure they can issue both cards and mobile ID at the same time?

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

As new technologies emerge, ever-vigilant fraudsters remain hard at work searching for and exploiting system weaknesses before they can be patched.

Whole Foods Investigating Credit Card Security Breach

Whole Foods Investigating Credit Card Security Breach

The grocery chain has "recieved information reguarding unauthorized access of payment card information."

Technology Reaching Into the Cloud

For the past 14 years, Security Today magazine, Open Options and Axis Communications have hosted the annual Security Industry Party. This year, at the House of Blues. Open Options has been a great partner, and along the way, we have added new partners to help sponsor an event that brings people together after two days of hard work on the ASIS show floor.

Featured

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events
  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.