Top Stories


AlertEnterprise Expands AI with Launch of New Guardian SOC Insights

AlertEnterprise recently revealed the launch of its new Guardian SOC Insights suite. The company will debut the new software globally at the ASIS Europe and ISC West trade events. Powered by the company’s latest developments in AI, including a powerful integration with the OpenAI ChatGPT platform, Guardian SOC Insights is designed to provide actionable data and playbooks to SOC teams, enabling them to detect, respond and mitigate risk swiftly and accurately. Guardian’s AI engine significantly reduces the time to deploy, with customers up and running in a matter of weeks, delivering measurable ROI in a few months without any human interaction.

Securitas Technology Launches Enhanced Program to Provide Specialized Support, Services to Global Clients

Securitas Technology, a provider of integrated security systems, has launched an enhanced Global Clients Program, following the coming together of STANLEY Security and Securitas' electronic security operations.

Let's Get to Work

You are standing at the conference center doors just waiting to get into the exhibit hall. I know you are because I’m standing next to you. This week at ISC West has been three years in the making. Last year was encouraging, and here we are waiting for the Big Show.



IDIS to Acquire Costar Technologies

IDIS Co., Ltd. and Costar Technologies Inc. recently announced the execution of a definitive agreement and plan of merger pursuant to which Costar will be acquired by IDIS in a merger transaction.

The Core Value Proposition

The Core Value Proposition

Machine and deep learning algorithms are everywhere in our lives. Masquerading as AI, they are only in their infancy. Have a conversation with a ChatGPT chatbot, and it becomes clear just how far we have come in a short time and how far we have to go.

Using Modern Technology

Using Modern Technology

Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry.

Progressing in Capabilities

Progressing in Capabilities

Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments.

Why This Matters

In today's complex and rapidly changing security landscape, situational intelligence has become crucial to managing risk and protecting assets. It refers to gathering, analyzing and using information about a particular situation to make informed and effective decisions.

A Comprehensive Nationwide Solution

A Comprehensive Nationwide Solution

Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed.

New Survey by HID Reveals Five Pressing Themes Reshaping the Security Industry

HID, a provider of trusted identity and physical security solutions, recently announced its inaugural State of the Security Industry Report, which gathered responses from 2,700 partners, end users, and security and IT personnel across a range of titles and organization sizes representing over 11 industries.

Resideo Completes 2 New Recent Acquisitions

Resideo Technologies Inc. has completed two new recent acquisitions; the first was the acquisition of Teknique, a leader in edge-based, artificial-intelligence-enabled video camera development and solutions, and the second, BTX Technologies, a leading distributor of professional audio, video, data communications and broadcast equipment.

Planning for Your Perimeter

Planning for Your Perimeter

The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable.

Securing Large Events

A highly integrated, data-driven approach to securing and managing major special events is driving cities to adopt innovative video technologies for safety and security.

The Key Issue

The Key Issue

It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door.

Evolon Announces Launch of Evolon Insites

Providing real-time threat detection, insightful forensic searches, and long-term video archiving, Evolon Insites is delivered by securely connecting customer-premise video systems to powerful cloud-based analytics and video storage.

Purpose-built AI for security cameras

In recent years, there has been a significant increase in companies introducing AI technologies for the security surveillance industry. All are promising the ability to deliver some new capability or a better “mousetrap.”

Paxton Announces Steve Taylor as New CTO

Amid global expansion, the security technology manufacturer Paxton has announced the appointment of Steve Taylor to their leadership team, as the company’s new CTO.

Taking Flight

Taking Flight

Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring.

Swatting is not Amusing

You have noticed and read the news, chaos and disruption, society veering away from the norm. At least the normal that was familiar to us. Without focusing on the grim reality of mass shootings, there is another crazy thing happening.

Achieving Clear Communications

Achieving Clear Communications

Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3