Top Stories


Let's Get to Work

You are standing at the conference center doors just waiting to get into the exhibit hall. I know you are because I’m standing next to you. This week at ISC West has been three years in the making. Last year was encouraging, and here we are waiting for the Big Show.

IDIS to Acquire Costar Technologies

IDIS Co., Ltd. and Costar Technologies Inc. recently announced the execution of a definitive agreement and plan of merger pursuant to which Costar will be acquired by IDIS in a merger transaction.

The Core Value Proposition

The Core Value Proposition

Machine and deep learning algorithms are everywhere in our lives. Masquerading as AI, they are only in their infancy. Have a conversation with a ChatGPT chatbot, and it becomes clear just how far we have come in a short time and how far we have to go.



Using Modern Technology

Using Modern Technology

Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry.

Progressing in Capabilities

Progressing in Capabilities

Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments.

Why This Matters

In today's complex and rapidly changing security landscape, situational intelligence has become crucial to managing risk and protecting assets. It refers to gathering, analyzing and using information about a particular situation to make informed and effective decisions.

A Comprehensive Nationwide Solution

A Comprehensive Nationwide Solution

Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed.

New Survey by HID Reveals Five Pressing Themes Reshaping the Security Industry

HID, a provider of trusted identity and physical security solutions, recently announced its inaugural State of the Security Industry Report, which gathered responses from 2,700 partners, end users, and security and IT personnel across a range of titles and organization sizes representing over 11 industries.

Resideo Completes 2 New Recent Acquisitions

Resideo Technologies Inc. has completed two new recent acquisitions; the first was the acquisition of Teknique, a leader in edge-based, artificial-intelligence-enabled video camera development and solutions, and the second, BTX Technologies, a leading distributor of professional audio, video, data communications and broadcast equipment.

Planning for Your Perimeter

Planning for Your Perimeter

The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable.

Securing Large Events

A highly integrated, data-driven approach to securing and managing major special events is driving cities to adopt innovative video technologies for safety and security.

The Key Issue

The Key Issue

It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door.

Evolon Announces Launch of Evolon Insites

Providing real-time threat detection, insightful forensic searches, and long-term video archiving, Evolon Insites is delivered by securely connecting customer-premise video systems to powerful cloud-based analytics and video storage.

Purpose-built AI for security cameras

In recent years, there has been a significant increase in companies introducing AI technologies for the security surveillance industry. All are promising the ability to deliver some new capability or a better “mousetrap.”

Paxton Announces Steve Taylor as New CTO

Amid global expansion, the security technology manufacturer Paxton has announced the appointment of Steve Taylor to their leadership team, as the company’s new CTO.

Taking Flight

Taking Flight

Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring.

Swatting is not Amusing

You have noticed and read the news, chaos and disruption, society veering away from the norm. At least the normal that was familiar to us. Without focusing on the grim reality of mass shootings, there is another crazy thing happening.

Achieving Clear Communications

Achieving Clear Communications

Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more.

Allied Universal Establishes Global Program Management Office, Appoints Marc Hauck Vice President

Allied Universal® has announced that it has formed a Global Program Management Office to manage Allied Universal Technology Services customer engagements worldwide. Mark Hauck has been promoted to the position of vice president of Global Programs to lead the initiative.

Live From ISC West 2023 Preview

Live From ISC West 2023 Preview

ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3