Top Stories


WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks released thousands of documents that it said described hacking methods of the CIA.

Senate Calls for Increased Security as Threats on Jewish Centers Rise

Jewish Community Centers around the U.S. faced another wave of bomb threats on Tuesday.

Security Services Prevented 13 UK Terrorist Attacks since 2013

Security Services Prevented 13 UK Terrorist Attacks since 2013

UK’s Senior Counter-terrorism police officer said UK security services have stopped 13 terror attacks since 2013.



Pivot3 Names Mark Maisano as Vice President of Channel Sales

Maisano brings over 15 years of channel expertise, delivering record-setting sales and revenue growth in competitive markets for companies like Acronis, Ingram Micro and Seagate Technology.

Westinghouse Security Adds Starlight Color Camera Series to Lineup

Westinghouse Security Adds Starlight Color Camera Series to Lineup

ISONAS Kicks Off New Year with the Release of Pure Access 2.0 Software Platform

Leading Colorado-based access control manufacturer brings new features to its Pure Access Software to better serve customers

Bosch Security Systems drives forward its video security business together with Sony

Bosch takes further steps in cooperation with Sony towards setting new standards in the field of video security solutions

Trump Accuses Obama of “Wire Tapping” Trump Tower Phones

Trump Accuses Obama of “Wire Tapping” Trump Tower Phones

Over the weekend, President Trump publicly accused former-president Obama of wiretapping the phones in Trump Tower before the election.

Milestone Systems names Bosch its 2016 Camera Partner of the Year

Milestone Systems names Bosch its 2016 Camera Partner of the Year

Milestone Sets Out to Make the World See

Milestone Sets Out to Make the World See

Milestone Systems is the number one VMS worldwide, but they are searching for more.

Top 5 Countries where Cyber Attacks Originate

Top 5 Countries Where Cyber Attacks Originate

Most countries have fallen victims to traditional style of cyber attacks originating from other countries.

Security Professionals Run for Children at Mission 500's 8th Annual Security 5K/2K at ISC West

Security Professionals Run for Children at Mission 500’s 8th Annual Security 5K/2K at ISC West

The “New” Travel Ban

The "New" Travel Ban

President Trump was expected to sign a reworked executive order on immigration, but the rollout has been delayed.

Driving a Good Bargain

In the business world it seems like the big money is going after the bigger players. You know, you sell a security installation at one fast food joint, and pretty soon the entire country is yours for the taking.

Going To Market

Back in the day when the security industry was still maturing, the typical sales channel for the manufacturer consisted of a rep organization with assigned territories and dealers in the region, national account partners, distribution organizations and occasionally a buying club.

A New Season

A New Season

Spring evokes images of freshness—spring cleaning, after all, is meant to encourage people to re-organize, refresh and start anew.

Just Around the Corner

Just Around the Corner

You’ve seen them all over town: those little blue trucks moving from one security job to the next. Their installations and technicians are well known for using and understanding the latest technology and equipment.

Making Your Demands

In today’s highly competitive environment, it is extremely important that providers have both the experience to deliver the right solution and the ability to deliver strong customer service.

Featured

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events
  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.