Top Stories


FFT Integrates with Sony’s 5th Generation IP Cameras

Future Fibre Technologies has released the latest camera integration to its world leading fiber optic perimeter intrusion detection systems.

Tri-Ed/Northern Video Distribution Acquires SGI

Tri-Ed / Northern Video Distribution is pleased to announce its acquisition of Security General International (SGI), a leading wholesale distributor of Security and Low Voltage products in the Southwest U.S.

March Networks Integrates Bosch IP Cameras with its Command Video Management Software

March Networks’ VMS software is now fully integrated with Bosch cameras, allowing organizations to maximize existing technology investments.



Arecont Vision Megapixel Cameras Secure Gistex Textile Plants in Indonesia

SurroundVideo Panoramic and MegaView IR Bullet-style cameras secure the facility and production operations in Indonesia textile plants.

SightLogix SightTracker Automatically Steers Videotec PTZ Cameras

The integration of SightLogix and Videotec provides automated security awareness for critical assets

Liberty Public School District Selects RedCloud for Access Control

Kansas City area school district deploys RedCloud Enterprise network appliance to provide scalable, web-based access control across 22 buildings.

HID Global Names Axiad IDS First North American Partner in Its Identity Assurance Implementation Partner Program

Axiad IDS, a technical consultancy and service provider is now certified to implement all HID Global Identity Assurance Solution, including Authentication Services and Smart Card solutions.

Special Security System Fills Customs' Needs

The U.S. Customs and Border Protection (CBP) has some stiff security requirements at its field office in Miami. The agency needed an access control system that accepted the Inscription: HSPD12.FIPS 201 government card system.

If You Thought Megapixel Cameras Were More Expensive, Think Again

There is a misconception in the security industry that megapixel cameras are more expensive than conventional cameras. Don’t believe it.

Closing Out 2012; Hello New Year

As we close out 2012 and stare into the reality of 2013, I am reminded of all that has happened in our publishing world this year. It has been a wonderful time.

GovSec West Exhibitors Greet Large Crowds

The more than 40 exhibitors were one of the highlights of the conference that wrapped up in October in Dallas.

Securing The Coming M2M Communications Boom

It is beyond dispute that Machine to Machine (M2M) technology and communications will influence our daily personal and business lives in the coming years.

Current and Future Trends Abound

While technology developments such as near-field communications (NFC) and personal identification verification (PIV) credentials are becoming more widespread, emerging product developments that offer interesting challenges to the traditional concepts of access control, like ecosystems and access control as a service (ACaaS), are presenting more of an opportunity for suppliers of access control equipment.

Bordering on Chaos

Wireless for Utilities

Utilities and governments around the world are investing billions of dollars into upgrading the existing analog electric, gas and water grids into two-way communication networks capable of optimizing distribution and reducing costs for consumers.

Distributed Storage Done Right

Scalable system architectures have been the source of many debates within the security industry.

Tackling Theft

In a challenging, ever-changing retail environment, it’s more important than ever for retailers to find innovative solutions to tackle enormous margin-eaters, like theft, in order to create operational efficiencies and protect their bottom line.

Using Similar Strategies as Public Health Could Improve Cyber Security

In a new paper by a team of economists and public health researchers, maintaining good “cyber hygiene” and improving overall cyber security can be achieved by mimicking public health strategies.

Brivo and SALTO Systems Launch Business Partnership

The combined solution of Brivo and SALTO offers an unprecedented level of power, flexibility and affordability.

Vietnam is the Fastest Growing Video Surveillance Market in Southeast Asia

In its first edition report on the South East Asia video surveillance market, IMS Research forecasts that the Vietnam is fastest growing market between 2010 and 2015, at a CAGR (Compound Annual Growth Rate) of 22.3 percent.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3