Top Stories


Texas Colleges and Universities Authorized to Perform Background Checks on Future Dorm Dwellers

Texas Colleges and Universities Authorized to Perform Background Checks on Future Dorm Dwellers

Students may have to submit to a background check before being permitted to live on campus.

Cultural Heritage Site Foils Thieves

Cultural Heritage Site Foils Thieves

Protecting pieces of history with a video surveillance solution based on machine-to-machine (M2M) communications.

Bogus iPhone Chargers Infect Your Device with Malware

Bogus iPhone Chargers Infect Your Device with Malware

It's time to recharge your iPhone battery, but before you plug in make sure it’s not a “Mactan!”



Providing Mercy

After dealing with proprietary systems that did not “play well” with each other, Mercy made the decision to replace them with non-proprietary, enterprise-level systems through Lenel.

A Strategic Edge

A Strategic Edge

Some equipment vendors can be hesitant when financing their customers. However, vendor financing is a significant way to gain a strategic advantage over the competition.

Situational Awareness

Situational Awareness

Remote situational awareness provides operators, security personnel and first responders with decision making data to appropriately and effectively respond to perceived threats.

An American Dream

An American Dream

Everyone loves a good story, especially if there is a bit of patriotism, some struggle and a sprinkle of romance. And, throw in a flight from communist dictatorship to America, it might mean tears to your eyes.

Pumping Up Fire Protection

Pumping Up Fire Protection

The Grundfos-Indianapolis manufacturing facility in Indiana, a plant that produces a broad selection of water pumping equipment, much of which results in small to large fire pump systems for commercial facilities, was in need of a fire alarm upgrade.

Raising Money

An electronic security and fire alarm company can be a great business for many reasons, including the ability to be successful at a range of company sizes or the fact that barriers to entry can be fairly low.

Using the Network for Security

Using the Network for Security

Joe from ABC Company has had the same security management system for 15 years in all of his buildings. He likes it; he knows it inside and out, and he can give training classes to his security guards on how to use it.

No Phone Calls Necessary

No Phone Calls Necessary

The success of ASAP didn’t happen overnight. In fact, there have been several efforts to help deal with alarm monitoring over the past 20 years.

WDR is Everywhere Lately

WDR is Everywhere Lately

The term wide dynamic range (WDR) is used to describe the function of a camera designed to produce clearer, more actionable images and/or video in circumstances where back light and intense illumination can vary excessively, especially when both very bright and very dark areas are simultaneously present in the camera’s field-of-view.

An Insight to Technology

As more systems are going online, the more these systems rely on a wireless backbone to deliver security in a world filled with technology, smartphones and tablets.

Looking forward for business

Looking Forward for Business

In the world of product distribution, Tri-Ed Distribution means business. In fact, President and CEO Pat Comunale is so excited about the security industry’s future, he plans to bring five, recently-acquired, data solutions centers into the security vertical.

Infrastructure as a Service

Infrastructure as a Service

In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.

Distance - The Other Variable

Distance – The Other Variable

Zoom cameras allow targets from hundreds of feet away to be viewed up close, while megapixel cameras can cover larger areas with fewer cameras. But is it really that simple?

The Truth about VLANs

The Truth about VLANs

A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.

Smart Technology

Traditionally, homebuyers have been most interested in modern kitchens or high-tech home features. And for most homebuyers, a lock was just that… a lock.

Featured

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.