Top Stories


WDR is Everywhere Lately

WDR is Everywhere Lately

The term wide dynamic range (WDR) is used to describe the function of a camera designed to produce clearer, more actionable images and/or video in circumstances where back light and intense illumination can vary excessively, especially when both very bright and very dark areas are simultaneously present in the camera’s field-of-view.

An Insight to Technology

As more systems are going online, the more these systems rely on a wireless backbone to deliver security in a world filled with technology, smartphones and tablets.

Looking forward for business

Looking Forward for Business

In the world of product distribution, Tri-Ed Distribution means business. In fact, President and CEO Pat Comunale is so excited about the security industry’s future, he plans to bring five, recently-acquired, data solutions centers into the security vertical.



Infrastructure as a Service

Infrastructure as a Service

In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.

Distance - The Other Variable

Distance – The Other Variable

Zoom cameras allow targets from hundreds of feet away to be viewed up close, while megapixel cameras can cover larger areas with fewer cameras. But is it really that simple?

The Truth about VLANs

The Truth about VLANs

A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.

Smart Technology

Traditionally, homebuyers have been most interested in modern kitchens or high-tech home features. And for most homebuyers, a lock was just that… a lock.

George Zimmerman Caught Speeding in Forney Texas

THE George Zimmerman zooms through Texas...or at least tries to.

Legendary Roadside Diner Deploys Avigilon High Definition Surveillance System

Legendary Roadside Diner Deploys Avigilon High Definition Surveillance System

Redamak’s faces challenges ranging from theft to fraud to employee safety.

Can Demand Match Supply For Wireless In Mobile Video Surveillance

Can Demand Match Supply For Wireless In Mobile Video Surveillance

IHS tracked the current adoption rates of wireless download technology across each vertical market.

Starbucks Stores To Allow Customers to Carry Guns

Coffee chain refuses to ban loaded guns from its shops in gun-friendly states.

Secura Key Launches 2 Door Access Control Panel with Ethernet

Secura Key Launches 2 Door Access Control Panel with Ethernet

Redesign was driven by ACP’s 16-bit Hitachi main processor unit becoming obsolete.

SightLogix Smart Thermal Cameras Deliver Real Time Security for Correctional Facilities

SightLogix Smart Thermal Cameras Deliver Real Time Security for Correctional Facilities

SightLogix SightSensor on display Aug 9-14 at the American Correctional Association’s Congress of Corrections.

SMARTCORE Leverages Lumidigm Biometrics for South Korean Immigration Project

SMARTCORE Leverages Lumidigm Biometrics for South Korean Immigration Project

Multi-factor authentication stations employ multispectral imaging for simultaneous capture of two index fingers.

Voltage Security Comments on Largest US Data Breach

Voltage Security Comments on Largest US Data Breach

The risk is still here and demands a data-centric approach to security.

Circuit of the Americas Hosts Formula One with Community

Circuit of the Americas Hosts Formula One with Community

Race control systems, and basic audio and video systems, were chosen to upgrade and/or supplement the A/V systems in many areas.

Tyco Security Products Completes Acquisition of Exacq Technologies

Tyco Security Products Completes Acquisition of Exacq Technologies

Easy to use and install network video management solution complements and expands Tyco’s network video solutions offering.

Lincoln Memorial Vandalized with Green Paint

Lincoln Memorial Vandalized with Green Paint

American history is tampered with as statue of 16th American President is paint spattered.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.