Top Stories


Protecting the Priceless

Protecting The Priceless

The National Museum of Funeral History in Houston houses the country’s largest collection of funeral service artifacts and highlights renowned exhibits on one of man’s oldest cultural customs.

An Eye on Paradise

An Eye on Paradise

Recently, the county implemented an initiative to migrate toward one centralized system for all security, including access control, biometrics and surveillance on its three populated islands, excluding Kahoolawe, which does not have any residents or county buildings.

Cameras Covering the Theatre

Cameras Covering the Theatre

Located in the heart of Hollywood, Calif., The Ricardo Montalbán Foundation Theatre, named after the late actor and performing arts patron, is a venue for diverse cultural events.



What’s in Your BYOD World?

What’s in Your BYOD World?

As network security professionals are acutely aware, they must be continuously vigilant to meet the ever-evolving threats driven by the bring your own device (BYOD) trend that is extending the network outside the office.

Identity, the New Security Perimeter

Identity, the New Security Perimeter

Whether traveling, working from home, in flex offices or a conference room at a home office, we expect information access to be immediate and communication via voice, chat, text or email to be always available.

Put that Knife Back in Your Pocket

A few years ago, someone sent me a little knife that, when you push a lever, the blade flies from inside the stock. It is a wicked little weapon that I had put away and forgot about. I found it during my annual office spring cleaning.

Biometrics on the Move

Biometrics on the Move

Multiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card.

The New Mobility

When I was growing up, one of my favorite comic book characters was Dick Tracy—not the Warren Beatty variety— but the heroic police detective of Sunday newspaper comic strips.

Boosting Legacy Infrastructure

Boosting Legacy Infrastructure

The transition of existing physical security systems, such as fire and burglar alarm or video surveillance systems, to the next generation of technology has never been easier or more affordable than it is today.

The Edge of Intelligence

The Edge of Intelligence

When the first network camera was introduced in 1996, its functionality was pretty bare bones: digitize images and send them across the network to a centralized video management system.

Video Surveillance Products Leader IC Realtime Joins Verizon Partner Program

Video Surveillance Products Leader IC Realtime Joins Verizon Partner Program

Joint national program opens doors for integrators to tap vertical markets by deploying custom-tailored HD video surveillance systems transmitted via Verizon Wireless.

iPhone fingerprint scanner

Rumor has it iPhone is Going Biometric

Less than a year ago, Apple, Inc. whipped out and handed over $356 million to purchase AuthenTec, Inc., a fingerprint sensor technology developer with the technology to embed a fingerprint scanner into the glass of the iPhone (and, iPad for that matter), making it one of the very few public companies acquired by Apple.

Lobby Security for Energy Company Headquarters Provided by Smarter Security

Lobby Security for Energy Company Headquarters Provided by Smarter Security

Fastlane Glassgate 200 Optical Turnstiles selected after successful Fastlane operation for years in previous headquarters.

NICE Situator to be Integrated at Denver International Airport to Enhance Security and Safety

NICE Situator to be Integrated at Denver International Airport to Enhance Security and Safety

The Situator implementation will help DIA better manage its critical security systems and enhance responses to emergencies and other events.

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global’s focus areas of use for new applications include authentication of items, secure data management and trusted authorizations.

VMP Features ER 148 Equipment Rack with New ER 148 4PKIT Expansion Kit at 2013 InfoComm

VMP Features ER 148 Equipment Rack with New ER 148 4PKIT Expansion Kit at 2013 InfoComm

The ER-148 is an EIA compliant, 19-inch, steel-constructed, equipment rack with a rail height of 48 inches and 27 available rack spaces; the ER-148-4PKIT expands the 2-post rack to a 4-post rack.

School Safety and Security from Sea to Shining Sea

School Safety and Security from Sea to Shining Sea

Gone are the days when you can simply allow your child to walk to school, play outside in the yard alone or even now, leave them in the “safety” of their own home.

Milestone Announces Vertical Specialist Partner Program

Milestone Announces Vertical Specialist Partner Program

Global initiative aims to increase focus in specific business sectors.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.