Top Stories


Safe and Secure

Safe and Secure

Jumping into the security industry was a calculated and well-planned venture for Quantum Secure. In fact, company president and CEO, Ajay Jain, walked a few tradeshows and talked to potential customers before making the leap.

Who is Servicing Your Clients?

A phrase I continually use is the “lifecycle management of security systems.” Every system, whether integrated or not, will need maintenance at some point throughout its life.

Keeping Sales at Full Strength - Successful companies look for full-time, year round staff

Keeping Sales at Full Strength

There’s no question about the importance of skilled salespeople to any successful security dealer. Without a rep that can get in the door or establish a rapport with a potential customer over the phone, there are no sales.



Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.

Border Checkpoints Go High Tech - Science fiction is quickly becoming science fact

Border Checkpoints Go High Tech

Imagine this: You’re looking around the room and people are getting retinal scans. Others are presenting RFID cards. Some are undergoing fingerprint imaging. Did you accidentally walk onto the set of some futuristic blockbuster movie? Guess again.

Perimeter Benefits - The world of physical security has changed in response to the pervasive threat of terrorism around the globe.

Perimeter Benefits

Most everyone is aware that crash-rated, anti-terrorist vehicle access control barriers, barricades, bollards and gates are standard security tools at government facilities, from embassies to courthouses and capitols to a host of other locales.

A City Wide Approach to Security - San Francisco Metropolitan Transit Agency unifies security in new command center

A City Wide Approach to Security

San Francisco Municipal Transportation Agency (SFMTA) was in need of a solution to maximize the use of their CCTV cameras deployed in the transit system, including the buses, trains and subways.

Pelco by Schneider Electric Introduces Mini, Entry-level, 360-degree Camera

New Evolution Mini 360° Indoor camera extends popular Evolution panoramic camera range with affordable, discreet, and powerful performance — and introduces new 3-year warranty.

Milestone Systems Adds Support for New Breed of Wide-angle Cameras

Latest device pack for new hybrid-type of 360-degree cameras to use with XProtect video management software.

ALARMAX to Distribute the IRONCLAD Fence Intrusion Detection Kits

Ideal addition to distribution channel to provide customers with a fence alarm system.

Attorney General Says US Malls Should Increase Security

Attorney General Says U.S. Malls Should Increase Security

Holder suggests increasing staff, cameras and other techniques

SIA to Offer Unique Certification Exam at ISC West

Act now and receive a special ISC West offer of $50 off the Certified Security Project Manager (CSPM) exam fee using discount code: 50ISCW2015.

TRI-ED Opens New Branch in Baltimore

Looking forward to serving customers and exceeding their expectations.

RGB Spectrum Introduces MediaWall V

UHD video wall processor offering up to 4K resolution I/O, single wire connectivity and fully scalable windows.

U.S. Secret Service to Conduct Drone Exercises

U.S. Secret Service to Conduct Drone Exercises

Announced in a statement of two paragraphs totaling less than 100 words.

Signal-Tech and cramZ marketing services, Inc. Enter Into Strategic Marketing Alliance

Provides parking industry with a total parking guidance solution including vehicle counting, space available digital LED sign displays and parking management software.

Investigation Finds Hundreds of Airport Security Badges Missing

Investigation Finds Hundreds of Airport Security Badges Missing

TSA blocked access to missing badge records post-investigation.

Kimberlite Aids Police in Most Apprehensions in 2014

Fresno-based monitoring station maximizes community resources, combats false alarms at more than double efficiency of national average.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.