Top Stories


An Elephant in the Living Room

Security managers are more aware than ever that information security requires a layered approach with components addressing every point of intrusion on the corporate network.

The Value of a Smart Home

The Value of a Smart Home

In Utah, locals refer to the Orem/Provo area as Happy Valley. It is a quiet, conservative college town, but all this doesn’t stand in the way of building a booming business.

New Focus on the Classroom

New Focus on the Classroom

It’s been two weeks and it’s time for me to introduce the latest video surveillance technology to the daycare center. They need to install IP cameras, so I can clearly see what that baby girl is doing, and make sure she is treated like I expect my granddaughter to be treated.



The New Alphabet

Mastering the alphabet used to be as simple as learning your ABCs. Not anymore. A whole new alphabet has been created for the world of analog video. Don’t try to sing this one to the “Alphabet song” we all grew up with. It doesn’t work. Trust me. I just spent 15 minutes trying.

Too Good to be True

There has been a noticeable increase in mass-produced, lowcost cameras available in the security industry. Low prices can be hard to resist, especially considering the tight budgets faced by government agencies at all levels.

Trendy Beverly Hills

Trendy Beverly Hills

Beverly Hills, Calif., has been glamorized in countless film and television depictions as the home of the wealthy and the famous.

Changes are Coming

Changes are Coming

During the past 10 years there have been some magnificent technological innovations in the security industry, but the pace of change has never been higher.

Appropriate Response

Appropriate Response

Everybody knows the old saying that the only things certain in life are death and taxes. But, alarm dealers understand that there’s a third certainty: false alarms.

Capturing Teachable Moments

Capturing Teachable Moments

When you’re conducting a therapy session, it’s virtually impossible to be fully engaged with the client and be an objective observer of your own interactions at the same time.

The Zoo at Night

The Zoo at Night

The fierce competition in the hospitality market has created a need to think creatively in order to increase the number of visitors. Therefore, Copenhagen Zoo constantly looks for new ways to give their customers an interesting and out-of-the-box experience.

Building a Foundation

Building a Foundation

Now more than ever, major network vulnerabilities are making national and international news headlines.

More Comfortable Operations

Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.

Technologies Drive Interagency Collaboration

Technologies Drive Interagency Collaboration

Cities are a challenge to secure and manage—they encompass a wide geographic footprint and include a multitude of key stakeholders comprising local, state and federal agencies along with a variety of private business entities and public organizations.

Collaboration is Key in the Video Vortex

Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.

A Strategic Approach

A Strategic Approach

The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.

How Cyber Secure Are Your Physical Security Devices

How Cyber Secure Are Your Physical Security Devices?

Are your physical security devices attached to the same network as your sensitive business data?

Connecting Disparate Systems

NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets.

How Secure are Your Devices?

Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.