Top Stories


PPM to Offer Major Integration Promotion at ISC West

Substantial savings available for end-to-end incident management.

Stopping Theft in Its Tracks

Stopping Theft in Its Tracks

The evolution of line security for handheld electronics in retail stores has been nothing short of amazing. When Scorpion Security Products launched its Scorpion security device, telecommunication and consumer electronics companies around the globe wanted the most unobtrusive, minimal security possible.



Saving One School at a Time

I’ve been on a kick lately thinking that schools need more security attention. I believe I feel so deeply about schools because they are filled with children who are learning to become the leaders, technicians and thought-leaders of tomorrow.

Improved Surveillance

Improved Surveillance

Port Fourchon plays a strategic role in supplying the United States with nearly 18 percent of its oil supply, servicing over 90 percent of the Gulf of Mexico’s deep-water exploration and production.

Who’s on Deck?

Who’s on Deck?

When nurses head home after a grueling 12-hour shift, the last thing Carolinas HealthCare System (CHS) wants them to worry about is getting to their cars safely.

Regulations that Affect Critical Infrastructure

As the CEO of ISI Security, one of the most difficult and time-consuming aspects of my job is keeping up with the laws and regulations affecting my company.

Educating Without Surveillance

Educating Without Surveillance

According to Saddleback College Chief of Police, Christopher Wilkinson, the childcare center in particular was a top priority due to concerns related to the Sandy Hook Elementary tragedy and other similar violent incidents.

Government Procurement Challenges

Government Procurement Challenges

More than likely, you have witnessed an RFP that includes dated product specifications and, in some cases, multiple product specifications that are more “wish-list” than reality.

Rush to Security

Rush to Security

When Rush University Medical Center incorporated wireless electronic locks throughout its new 375-bed-tower hospital building, it made installation easier and more cost-effective while providing greater flexibility to meet future security needs.

Dedication Not to Be Taken Lightly at ISC West 2014

Dedication…I have been pondering this word since non-morning person, me, booked my flight to ISC West 2014 at 5:30am on March 12, 2014! Oh yes, Starbucks will definitely be my friend as I wake up at 2:15am on Wednesday morning to fly from Dallas to Houston and then from Houston to Las Vegas to make my first appointment of the day at 10:00am.

High-Tech Solutions

High-Tech Solutions

Nearly everyone is familiar with the standard manned guard booth in which a person sits and allows drivers in and out of a facility; however, border stations, government buildings, military bases and other locales where there can be a “very unwanted guest” all use much highertech security booths.

Raising Concerns

Raising Concerns

Wireless transmission is usually a topic that raises many concerns in the security world. It seems common knowledge nowadays that a wireless network can be easily hacked, and private information can end up on the Internet or someone’s identity can be stolen.

College Upgrades

College Upgrades

Reflecting the uniqueness and diversity of the local Queens’ community, for more than 50 years, Queensborough Community College has served students from Queens and the entire New York City region as a starting place to pursue their academic and career goals.

Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

One might think that a military base is among the most secure places in the country. Unfortunately, though, the sprawling nature of military bases makes them difficult to secure effectively, which leaves these sites vulnerable to a wide range of threats.

Barix Simple Paging Solution Debuts at ISC West

Out-of-the-box solution integrates fixed and mobile paging over the IP network.

aptiQ Alliance Program Members Highlighting Open Systems at ISC West

Showcasing how to extend aptiQ smart cards and NFC-enabled smart phone credentials to diversity of applications.

Help Children in Need by Participating in Mission 500 Events at ISC West 2014

Industry supports Mission 500 with great line-up of events and programs.

TSA Plans Mandatory Active Shooter Training for Airport Employees

TSA Plans Mandatory Active Shooter Training for Airport Employees

The agency released a 26-page report after an internal review that followed the fatal shooting of an employee in November 2013 at LAX.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3