Top Stories


Precise Biometrics Announces the Global Launch of Tactivo Mini for Android

Precise Biometrics Announces the Global Launch of Tactivo Mini for Android

A provider of innovative authentication solutions expands its technological footprint and product utility with the launch of its latest solution offering.

From Legacy to Future Proof with Hosted Video Storage Solutions

From Legacy to Future Proof with Hosted Video Storage Solutions

How to manage and evaluate cost-effective solutions through the storage model for hosted video surveillance solutions.

Jimmy Chiu remembers the Summerland tragedy

Online Exclusive: Remembering the Summerland Tragedy

The Summerland tragedy changed building regulations across the country because poor design and inappropriate building materials allowed a minor fire to become a major conflagration. The lessons learned had influence across many international jurisdictions.



CCTV Tipping Point Still Coming in 2014

CCTV Tipping Point Still Coming in 2014

Network video surveillance gear sales to surpass analog next year.

Milestone Integration Supports Student Learning at St Andrews University Medical School

Milestone Integration Supports Student Learning at St Andrews University Medical School

Video portfolios of exercises in clinical and communication skills are evaluated.

El liderazgo politico en los planes de seguridad

El liderazgo politico en los planes de seguridad

This article discusses the transforming of the city of Bogota and Medellin by utilizing the importance of political leadership in security. (English summary on bottom of page 5 of article.)

MicroPower Technologies Announces New Funding

MicroPower Technologies Announces New Funding

$5.7 Million will be used to finance growth and product development.

Texas Colleges and Universities Authorized to Perform Background Checks on Future Dorm Dwellers

Texas Colleges and Universities Authorized to Perform Background Checks on Future Dorm Dwellers

Students may have to submit to a background check before being permitted to live on campus.

Cultural Heritage Site Foils Thieves

Cultural Heritage Site Foils Thieves

Protecting pieces of history with a video surveillance solution based on machine-to-machine (M2M) communications.

Bogus iPhone Chargers Infect Your Device with Malware

Bogus iPhone Chargers Infect Your Device with Malware

It's time to recharge your iPhone battery, but before you plug in make sure it’s not a “Mactan!”

Providing Mercy

After dealing with proprietary systems that did not “play well” with each other, Mercy made the decision to replace them with non-proprietary, enterprise-level systems through Lenel.

A Strategic Edge

A Strategic Edge

Some equipment vendors can be hesitant when financing their customers. However, vendor financing is a significant way to gain a strategic advantage over the competition.

Situational Awareness

Situational Awareness

Remote situational awareness provides operators, security personnel and first responders with decision making data to appropriately and effectively respond to perceived threats.

An American Dream

An American Dream

Everyone loves a good story, especially if there is a bit of patriotism, some struggle and a sprinkle of romance. And, throw in a flight from communist dictatorship to America, it might mean tears to your eyes.

Pumping Up Fire Protection

Pumping Up Fire Protection

The Grundfos-Indianapolis manufacturing facility in Indiana, a plant that produces a broad selection of water pumping equipment, much of which results in small to large fire pump systems for commercial facilities, was in need of a fire alarm upgrade.

Raising Money

An electronic security and fire alarm company can be a great business for many reasons, including the ability to be successful at a range of company sizes or the fact that barriers to entry can be fairly low.

Using the Network for Security

Using the Network for Security

Joe from ABC Company has had the same security management system for 15 years in all of his buildings. He likes it; he knows it inside and out, and he can give training classes to his security guards on how to use it.

No Phone Calls Necessary

No Phone Calls Necessary

The success of ASAP didn’t happen overnight. In fact, there have been several efforts to help deal with alarm monitoring over the past 20 years.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.