Top Stories


Social Engineering Threats Soaring

Watch out for cybercriminals looking to make some extra cash during scam season - its a social engineering bonanza with threats on multiple fronts.

Confidence in Security Industry Continues End of year Climb

SIA Security Market Index surveys select group of nearly 100 executives at SIA member companies to gauge the state of the industry.

Montessori School Advances Education with Axis and Milestone Video

Stone Security in Utah finds unique way to increase parent participation in children’s schooling.



Sony Pictures Recovering from Computer Attack

Sony Pictures Recovering from Computer Attack

Business operations are coming back online after crippling attack.

Body-mounted Camera Funding for Police Announced by Obama

Police shootings of youth and protests drive demand for video documentation of police activities.

Secura Key Offers Lockdown and Door Status Features

Lock or disable groups of doors with a single command to react to internal or external threats.

Fluidmesh Introduces New Low-cost Kit for Point-to-point Applications

Complete with two radios, two mounting brackets and two PoE injectors, kit designed to quickly and cost-effectively create simple wireless links.

Milestone Systems Announces Extended availability of NVRs

Latin America gets the sleek and functional Milestone Husky Series.

Genetec Announces Integration of Pay-by-license Parking

Improves customer experience and parking enforcement efficiency for cities, education and retail customers.

Samsotech International Certifies with AMAG Technology

Integration cooperatively tested and certified.

Black Friday was the Second-Biggest Day Ever for Background Checks

Black Friday was the Second-Biggest Day Ever for Background Checks

The FBI dealt with more background checks than ever since the week following the Sandy Hook school shooting

U.S. Military Warned about ISIS Threat within America’s Borders

U.S. Military Warned about ISIS Threat within America’s Borders

FBI gains fresh intelligence and issues a security bulletin last night.

“Me Too” Products - Being wise about the products you present to end users

“Me Too” Products

For manufacturers to play within the commodity space, they need to provide the most features, ease-of-use and the best reliability, camera versus camera.

Never Again

“Station 71, you’re responding to a multi-car, motor vehicle accident.” He silenced his pager and slipped out the back door of the engineering firm where he worked.

Planning for the Future

Planning for the Future

Business planning for 2015 likely started a long time ago. I know it has for the publishing industry, as we keep our editorial calendar upto- date each quarter. It won’t be long before the first quarter of 2016 is updated on our website.

The Truth about Fisheye

The Truth about Fisheye

As most in the video surveillance industry know, traditional video surveillance cameras have an inherent flaw: blind spots.

Substation Security Challenges

Substation Security Challenges

While the threat of terrorist activity to disrupt the nation’s power grid remains ever-present, other hazards such as theft and vandalism are more common and represent an immediate challenge.

6 Trends Impacting Access Control and the Overall Security Market

6 Trends Impacting Access Control and the Overall Security Market

From 4K Ultra HD resolution surveillance cameras to near field communication (NFC) or Bluetooth-enabled access control readers and applications, technology innovation in the security industry runs the gamut.

Featured

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.