Top Stories


Futuristic Replacements for Passwords

Futuristic Replacements for Passwords

Since introduction of computer passwords, not much has changed...until now.

Mexican Drug Lord Escapes Prison for the Second Time

The drug kingpin known as El Chapo has escaped from a maximum security prison.

The threat of terror, real or imagined, has focused the minds of building owners, architects, engineers, technologists and planners to better design buildings that can withstand a whole new array of risks.

Online Exclusive: A Perspective on Glass and the Terrorist Threat

The threat of terror, real or imagined, has focused the minds of building owners, architects, engineers, technologists and planners to better design buildings that can withstand a whole new array of risks.



Pet Parents Enjoy Reliable, Live Doggie Cam

Dog resort installs LILIN 9-channel NVR Touch network video recorder with four iMEGAPRO 2MP IP dome cameras.

Farpointe's fleaPower Option Reduces Energy Costs in Card-based Access Control Systems

In emergencies, back-up batteries last much longer.

Speco Technologies Launches Premium Commercial In-ceiling Speaker Line

Combination of home theater speaker quality and performance with commercial durability and longevity.

Focal4 SSA System Adds Responsive Search

Integration bolsters situational awareness with real-time, location-based information emanating from social media posts and communications.

SIA Calls for Nominations for 2015 George R. Lippert Memorial Award

To honor a distinguished individual from member company for long-term, selfless service to the security industry.

New Infrared LED from Osram

First to market for unlocking smartphones by iris scanning.

New LVPRO Series

Three preloaded models include new color scheme, adjustable backlit display and capability to attach test modules.

21 Million Social Security Numbers Stolen in Second OPM Data Breach

21 Million Social Security Numbers Stolen in Second OPM Data Breach

Credit monitoring and identity-theft protection offered to those affected.

India and Pakistan Join Expanding Security Organization

India and Pakistan Join Expanding Security Organization

The organization is led by Russia and China.

FBI Prevented Islamic State Attacks on July 4th

FBI Prevented Islamic State Attacks on July 4th

10 people arrested over the past 4 weeks.

Trusted Resources Promote Safe, Secure Environments

Online Exclusive: Trusted Resources Promote Safe, Secure Environments

Mitigate insider threat and improve perimeter security and personnel assurance to ensure only trusted resources have access.

How Colleges and Universities Defend Against Cyber Threats

How Colleges and Universities Defend Against Cyber Threats

Take into consideration the hackers' motivation, then develop a plan of action.

Security Startup Octopus Raises $2.5M

Security Startup Octopus Raises $2.5M

The cloud-based physical security tool raised the money from a group called Singulariteam.

IC Real Tech Creates Virtual Reality Viewing App for the 2015 MISS USA Pageant

The Miss USA 720 Experience App lets iPhone, iPad and Android users watch pageant contestants live behind-the-scenes in a 360 x 360-degree immersive video format.

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.

Featured

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities