Top Stories


AvaLAN Wireless Solves PCI 3.0 Compliance for World’s Largest Retailers

Combination of technologies deliver unique solutions for IoT networking.

Allegion to Acquire Simonsvoss

Electronic lock company has comprehensive suite of solutions for access control.

Apollo Affiliated Funds Enter Security Monitoring

Simultaneous acquisitions of Protection 1 and ASG Security.



China Adopts New National Security Law

China Adopts New National Security Law

Critics have said the law might be used to eliminate dissent.

Business Units Built from Basics

Business Units Built from Basics

New Orleans is a terrific destination city. It is filled with history, music and adventure.

Always Thinking of the Integrator

Sit down for a conversation with Brian Wiser, the president of sales in North America at Bosch Security Systems, and concern for the integrator will surface pretty quickly.

Mapping the Way Forward

Mapping the Way Forward

Any security investment starts with a realization that you have people and things to protect.

Security on Board

Security on Board

Until recently, the Utah Transit Authority’s (UTA) video security system was limited by the capacities of its servers.

Profiling an Integrator

Based in the Twin Cities of Minneapolis and St. Paul, VTI Security has been a trusted provider of security designs, installation and support for more than 35 years.

Where Do I Find Leads?

Throughout my 25 years in this industry, which have included 12 as an integrator and 13 as a consultant, the number one question of all time has been: where do I find leads?

Dedicated Service

Mid State Fire & Systems, a fire and life safety system installer and service provider in Ocala, Fla., is dedicated to providing quality service to customers at a competitive price.

Projecting a Strong Image

At first glance, you’d think that sales representatives carry the heaviest burden for security dealers.

Researching Security

Researching Security

Western Michigan University, located in Kalamazoo, Mich., is a national research university serving students from across the United States and 100 additional countries.

To Verify or Not to Verify

On Mar. 1, Akron, Ohio’s police department became only the 30th across the United States to employ what is known as a verified response policy, which means that before police respond to an alarm, it must be verified that there is, indeed, a crime being committed.

School Teacher Expelled

You have to wonder what is happening on school campuses these days. Why some students act the way they do; why some turn to violence.

Securing the Open Campus

Securing the Open Campus

Located in the heart of Albany, N.Y.’s capital city, The College of Saint Rose offers 4,500 students a rigorous educational experience that extends their learning beyond the campus to the vibrant urban environment in which they live.

Smarter Storage - Benefits drive expansion of IP video systems in Bergen County, N.J.

Smarter Storage

The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed.

From Cockpit to Classroom

From Cockpit to Classroom

It is only natural that we respond to horrific situations with a renewed emphasis on security.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.