Top Stories


Security on Board

Security on Board

Until recently, the Utah Transit Authority’s (UTA) video security system was limited by the capacities of its servers.

Profiling an Integrator

Based in the Twin Cities of Minneapolis and St. Paul, VTI Security has been a trusted provider of security designs, installation and support for more than 35 years.

Where Do I Find Leads?

Throughout my 25 years in this industry, which have included 12 as an integrator and 13 as a consultant, the number one question of all time has been: where do I find leads?



Dedicated Service

Mid State Fire & Systems, a fire and life safety system installer and service provider in Ocala, Fla., is dedicated to providing quality service to customers at a competitive price.

Projecting a Strong Image

At first glance, you’d think that sales representatives carry the heaviest burden for security dealers.

Researching Security

Researching Security

Western Michigan University, located in Kalamazoo, Mich., is a national research university serving students from across the United States and 100 additional countries.

To Verify or Not to Verify

On Mar. 1, Akron, Ohio’s police department became only the 30th across the United States to employ what is known as a verified response policy, which means that before police respond to an alarm, it must be verified that there is, indeed, a crime being committed.

School Teacher Expelled

You have to wonder what is happening on school campuses these days. Why some students act the way they do; why some turn to violence.

Securing the Open Campus

Securing the Open Campus

Located in the heart of Albany, N.Y.’s capital city, The College of Saint Rose offers 4,500 students a rigorous educational experience that extends their learning beyond the campus to the vibrant urban environment in which they live.

Smarter Storage - Benefits drive expansion of IP video systems in Bergen County, N.J.

Smarter Storage

The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed.

From Cockpit to Classroom

From Cockpit to Classroom

It is only natural that we respond to horrific situations with a renewed emphasis on security.

The Layered Approach

The Layered Approach

With one recent study projecting the mass notification market to be worth more than $6.4 billion by 2018, it is obvious that more and more institutions are turning toward a layered approach to deliver emergency alerts.

Connecting the District

Sycamore School District in Illinois is comprised of seven schools ranging from elementary to secondary schools.

Back to School

Back to School

When some children drop out of school, that is all of the formal education they may ever receive.

A Creole Cut Above

For a couple of years now, I’ve traveled to several locations to interview and write the cover story for our Dealer Strategies. It is always an honor to be able to sit with the CEO or designated spokesperson, and learn about that company’s business model.

The Heat of the Moment

The Heat of the Moment

In the security world, it’s often what you don’t see that can hurt you the most.

Introduce Yourself to Open Architecture

Introduce Yourself to Open Architecture

The concept of Open Architecture Access Control is taking on a lot of traction.

Building an Empire

Building an Empire

Thirty years ago, Lucy Rivero entered the security industry. She worked as an administrative assistant at a security company, and then worked her way into sales.

Federal Authorities Issue Fourth of July Terror Warning

Federal Authorities Issue Fourth of July Terror Warning

Tips to help you, your family and friends stay safe and alert while enjoying firework displays.

Google Security Researcher Leaves to Take on New Project

Google Security Researcher Leaves to Take on New Project

The researcher known as Mudge plans to start a non-profit devoted to software security.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3