Top Stories


Boon Edam Inc. Expands Presence at ISC West

To accommodate record sales growth in the past several years, Boon Edam Inc. is proud to announce an increased presence of a larger exhibit space this year at the ISC West International Security Conference and Exhibition in Las Vegas, NV, on April 2nd - 4th.

Meetup.com Deals with First Extortion Attempt Ever

Meetup.com Deals with First Extortion Attempt Ever

Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.

Understanding the Capacity of the Product

Understanding the Capacity of the Product

When Barbara Morgan settles into her classroom, she has a room full of teaching aides and equipment that keeps installers, end users and dealers focused on the topic of the day. Her message to her students is quite simple.



Momentum has shifted technology to the network

The OSI Model and Physical Security

When the IP camera was introduced to the physical security industry in the mid-1990s, the move from analog to digital was set in motion. Adoption of this technology began slowly but has steadily gained momentum.

Train Well, and Often

Train Well, and Often

Training is an essential priority for any security dealer or integrator seeking to enter the fire alarm market, while continuing education is important for dealers who already install fire alarms systems.

Taking Training Very Seriously

Taking Training Very Seriously

Training is the life blood of any successful organization. Training employees on how to do their jobs better is one thing, but training dealers and integrators on how to use and incorporate security products is another.

Drawing a Fine Line

Drawing a Fine Line

Dealers just need to remember one thing: Security— the promise to help protect customers’ lives and property—must remain at the core of their business.

The Integrator/Manufacturer Relationship

When a security integrator begins deciding which manufacturer to use for an installation, a myriad of key elements come into play. Does the manufacturer have easy-to-use online training?

Digital Watchdog Acquires Award-Winning Innovative Security Designs

“Digital Watchdog is the perfect complement for ISD.” said Ian Johnston, CEO of Innovative Security Designs, Inc.

New Power Supply and Data Transmission Products Deliver New Solutions to Longstanding Problems

New Power Supply and Data Transmission Products Deliver New Solutions to Longstanding Problems

Greater efficiency provided by accommodating multiple cameras over a single coax or Ethernet cable.

Lighting Up Lansing

Lighting Up Lansing

Each year in Lansing, Mich., the holiday season unofficially begins with the Silver Bells Parade. On Nov. 22, 2013, approximately 80,000 people crowded this city’s streets to see the parade that ends in front of the Michigan State Capitol building with a traditional tree lighting ceremony.

Fit for Security

Fit for Security

To say I’m sold on biometrics for athletic clubs after using the Hand- Key since 1995 is an understatement. Back then, we were remodeling our check-in area. While doing so, we decided to re-evaluate our check-in software.

Not in My School

Back in the day, students were taught how to protect themselves from fire and the unimaginable nuclear attack.

Precious resource in Arizona gets makeover

Upgraded Fire Protection

Water is one of Arizona’s most precious resources, and the Colorado River satisfies much of this demand via the 336-mile-long Central Arizona Project (CAP) aqueduct that annually delivers approximately 1.6 million acre-feet of Colorado River water to cities, Indian Tribes and farms in central and southern Arizona.

The New Normal

The New Normal

We live in a very different world today—one of risks and fast changes—and looking ahead, such changes and risks will only continue. I call it “the new normal,” since this is expected to be the basis going forward.

Reaching out with a higher level of video storage and management

A New World of Information

We live in a world full of information as data is being collected each day because the demand is higher than ever before. Consumers want faster access to online data to make quicker, more informed decisions regarding everything from nearby restaurants to the highest-rated tablets.

Preventing Abductions

Preventing Abductions

On March 10, 2007, three-day-old Mychael Darthard-Dawodu disappeared from her mother’s hospital room in the maternity ward of Covenant Medical Center in Lubbock, Texas. Even though the infant had been fitted with a state-of-the-art security bracelet around her ankle, the woman who abducted her simply snipped through the device and carried the five-pound bundle-of-joy out of the facility in her purse.

Why Audio? Why Not?

Why Audio? Why Not?

It’s 2014 and time for a new way of thinking when it comes to security. It’s kind of like our five senses; we have each one for a reason, and they are all equally valuable.

Reimagining Strategies

Reimagining Strategies

Security is no longer chained to a desktop, and breaking these chains has changed the face of remote monitoring. It used to be that remote monitoring meant keeping an eye on things from a central station, like a corporate security command center or even a thirdparty monitoring service.

In Clear View

In Clear View

High definition and megapixel cameras play an important role in video surveillance applications. They can provide images that are more useful, with a higher quality of detail and have wider coverage than standard-resolution cameras.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3