Top Stories


Next Revolution of IP in Security

Next Revolution of IP in Security

It is no exaggeration to say that network video technology has revolutionized the video surveillance market, and the access control industry is on the verge of a similar revolution.

Wrightstyle

Hospital Fire Safety in the USA

They are places of safety for newborns or elderly, and everyone in between. It’s why fire safety in healthcare facilities is so stringent and rigorously enforced.

SFO Airport Expands Airport Identity Management Solution with New Applications from Quantum Secure

Quantum Secure announces that the San Francisco International Airport (SFO) has selected the company's SAFE for Aviation solution, further expanding Quantum Secure's footprint in upgrading, managing and automating key critical security areas within the Airport.



The Growth of IT Security

The Virtual Desktop Infrastructure (VDI) market is growing fast so much that industry analysts predict it will be worth over $5 billion within the next three years. Why did this take so long to arrive? After all, virtual desktops have been around since the 1990s.

Milestone Systems Elevates Bosch Security Systems To Elite Partner Status

Milestone Systems, the open platform company in IP video management software (VMS), has elevated Bosch Security Systems to the status of Elite Partner in the Milestone Alliance Partner program (MAP).

Axis Communications Announces U.S. Expansion Plan

Axis Communications, the world leader in network video, announces its U.S. Expansion Plan designed to bring Axis even closer to its partner network and end-customers while intensifying local resources to meet demand in the fast growing physical security market.

Cyber Security Insurance

People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.

Advanced Persistent Threats

Advanced Persistent Threats

An Advanced Persistent Threat (APT) is a piece of malware that is distinguished by the sophistication of its code, the vectors cybercriminals are choosing for attack and the perseverance with which they’re going after their targets.

Your Vendors: Cold Beer or Malicious Attack Vector?

Your Vendors: Cold Beer or Malicious Attack Vector?

The five golden rules of developing a strong network security strategy for managing vendor access.

Point of View Video Technology for the Security Industry

Point of View Video Technology for the Security Industry

Putting security into the eye of the beholder creates a stronger layered security plan.

Protect Against Attack

Protect Against Attack

The one thing consistent about malware attacks is that they continue to change quite a bit as time goes by. Initially, many attacks were unstructured and untargeted, indiscriminately honing in on large numbers of hosts in an attempt to find their vulnerabilities. The outcome of these initial attacks was often simple defacement or destruction of data with very few of the overall volume of these attacks covered in the news.

Technology From Fluidmesh, Mobile Pro Systems Help Protect Super Bowl XLVIII

When the final seconds of the Super Bowl play clock had ticked away, the Seattle Seahawks emerged victorious, walking away with a 43 - 8 win and the coveted Vince Lombardi Trophy. Their Super Bowl dreams had come true and they could finally breathe a collective sigh of relief. Amidst a sea of sports fans swarming MetLife Stadium in East Rutherford, New Jersey, the Seahawks were not the only ones exhaling. For the scads of security personnel charged with ensuring the safety of NFL players, fans and the many other people behind the scenes at the first outdoor, cold-weather Super Bowl, the real win was in pulling off the mega sporting event without incident.

Mission 500 to Stage 5th Annual Security 5K/2K at ISC West 2014

As part of its mission to support even more children in need, Mission 500 – having already met its original goal of sponsoring 500 children around the world – is continuing its efforts to assist children in crisis.

A Light of Freedom

A Light of Freedom

Security at the Statue of Liberty has never been taken for granted; it just hasn’t been a top priority of the government. That is not the case with the U.S. Park Police. They have used, to the best of their ability, security equipment that was appropriated but lacked the highest technology.

Keeping assets well protected

Keeping Assets Well Protected

There are tens of thousands of bank branches and financial services locations throughout the world. The business environment itself is complex, as it combines elements of high-end commercial services with a frontline, retail component.

Not All is Lost in War

Not All is Lost in War

The cold, brisk wind of December in Dallas attacked my body that was wrapped in a winter’s coat as I stepped out of my vehicle, ready to seize the not-so-ordinary work day ahead of me. A mist filled the air, kissing my cheek with coldness as harsh as death. You see, death was the reason I was here in the first place; yet, this was a place of happiness.

Increasing Security with Smart Credentials

Increasing Security with Smart Credentials

For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.

Making the Choice - Fixed costs, customized solutions and user convenience - determining factors in buying physical identity and access management

Making the Choice

The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.

Featured

  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX
  • Nothing Artificial About this Intelligence

    I have been looking forward to this year’s GSX show in New Orleans, the Cresent City, or if you prefer The Big Easy. It seems like quite a while since we’ve been here. Twenty years ago, ASIS, as it was known then was literally washed out of the city by someone known as Katrina. It is a good thing to come back to NOLA. Read Now

  • From Monitors to Mission Control

    Security Operations Centers (SOC) were once defined by rows of static monitors, each displaying a single feed with operators quietly watching for issues. That model has become obsolete. Incidents evolve too quickly, data comes from multiple locations, and decisions must be made in seconds—not minutes. Read Now

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.