Top Stories


How Your Organization Can Avoid Getting Hacked

How Your Organization Can Avoid Getting Hacked

It seems we can’t go a single day without a new data breach making headlines.

Multiply and Conquer

Technology is increasingly being used as a force multiplier to help law enforcement agencies protect and serve. One way agencies are turning technology into a crime-fighting tool is by creating what’s called a “virtual fence” around a perimeter, such as city limits or a parking lot, by installing a network of license plate reader (LPR) cameras to monitor an area.

Man Overboard!

Man Overboard!

Many of us have gone on a cruise vacation or know of a close friend or relative who has done so. Cruising is a popular vacation option enjoyed by families and individuals throughout the world.



Multi-dimensional Applications

According to a number of studies, hospital crime and violence have been growing at an alarming rate in recent years. The wide variety of security threats that healthcare facilities face include theft by employees or visitors, violence or threats from visitors or patients, and other crimes of opportunity.

Taking Stock of Security

Throughout the course of a calendar year, we take a look at numerous security solutions, events and, in our case, publications. In this issue, we have a specialty publication that focuses on government security. Security in the public sector is a big deal.

Providing a Network Link

Providing a Network Link

Outdoor wireless bridges are used to provide a network link from one location to another. You may want to network surveillance cameras back to your main office building, or share Internet and network access with another building on your campus.

Engaging a Rapid Response

There is more than one reason why emergency vehicles have lights and sirens. Several years ago, there was a campaign by the Ohio state fire marshal which was, “Move right for lights and sirens.” This makes a lot of sense, allowing emergency response to get where they need to be with minimum interference.

The Next Big Step

The Next Big Step

Individuals have found that their phones and other smart devices can be used in their own homes to operate locks, and—along with the push for more IoT-enabled devices at work in general—they have come to expect the same level of sophistication and convenience at work.

Grow Your Business

Grow Your Business

Doing business with the government—federal, state or even local—can be very difficult. The regulations, the paperwork, the unique needs and buying cycles are all tough requirements that have to be met. It can make for a complicated scene, but it’s also a vitally important business that can be financially rewarding despite the challenges.

All the Hype

All the Hype

Alongside the hype in the media about the border wall, this might be a good time for commercial and industrial companies to take a closer look at their own borders. Threat levels are increasing due to rising crime, civil activism and even cyber threats and it is more important than ever to push the line of defense all the way to the borders.

Anti-ram Fencing

Vehicle ramming attacks are on the rise in the United States and abroad. Already in 2017, there have been no less than seven major attacks worldwide resulting in 24 people dead and another 153 injured.

Time for an Upgrade

Time for an Upgrade

When a regional traffic management center in Washington state outgrew its building—as well as the size of its roadway monitoring system— the staff realized it was time not just for a physical upgrade, but a technological one, too

Cannabis Cash - How do you secure your place in the weed business?

Cannabis Cash

Where is all the money in the marijuana business going? Who is moving the cash or product as it seems to be in the news all the time? Here we share why it’s important to your business that you know how this is all happening.

Using the Cloud

Using the Cloud

Today, cloud applications are all the rage and for good reason. The cloud allows us to work and play in ways that are so much more productive and engaging.

Minimize Crime

Minimize Crime

The city of Hartford, Conn., first began expanding and upgrading its surveillance capabilities in 2013 with a new Public Safety Complex and police headquarters. The city enlisted Vulcan Security Technologies to implement a new IP video system that could expand to include hundreds of cameras.

A Better Defensive Line

A Better Defensive Line

In the United States, technology has become the essential force multiplier. With nearly 6,000 miles of border with the neighboring north and south, it would be impossible to hire enough border personnel to protect every mile.

Bridging the Gap

The mobile ID revolution is gathering pace, but not everyone has a smartphone today, and many citizens prefer to carry a physical card. How do government agencies manage this transition from physical to mobile, and ensure they can issue both cards and mobile ID at the same time?

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

As new technologies emerge, ever-vigilant fraudsters remain hard at work searching for and exploiting system weaknesses before they can be patched.

Featured

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

  • Interface Systems Enhances Safety and Communication at Texas Church and School

    Interface Systems, a managed service provider delivering business security, actionable insights, and purpose-built networks for multi-location businesses, today announced the successful completion of a major security upgrade for Bethesda Community Church and Bethesda Christian School in Fort Worth, Texas. Read Now

  • ASIS International Introduces ANSI-Approved School Security Standard

    ASIS International, a leading authority in security standards, is excited to announce the release of its American National Standards Institute (ANSI)-approved standard designed to provide a framework for developing, implementing, maintaining, and improving school security. The first comprehensive standard of its kind provides a critical benchmark for assessing and improving a school’s security posture regardless of size and funding. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.