Top Stories


Firetide Announces Australia and South Pacific Distribution Agreement

Firetide Announces Australia and South Pacific Distribution Agreement

Firetide, Inc. has formed a strategic alliance with BGW Technologies, enabling Firetide to deliver wireless, mesh products to their Australian and South Pacific customer base.

Bosch Trains Nearly 8500 Customers in 2012

Bosch Trains Nearly 8500 Customers in 2012

Bosch Security Systems, Inc. offers online training courses, broken down into modules that can be taken on-demand, for added convenience.

2013 ISC West Show in Las Vegas April 10 through 12

2013 ISC West Show in Las Vegas April 10 through 12

Observint will be exhibiting at the 2013 ISC West Show in Las Vegas.



Milestone Systems Rolls Out Next Generation Channel Partner Program

Milestone Systems Rolls Out Next Generation Channel Partner Program

The next-generation Channel Partner Program include the following benefits: new business tools, enhanced partner differentiators and higher discount opportunities.

Keeping Control of Who

Keeping Control of Who's on Campus

Visitor management is a problem that faces virtually every school, but is particularly troublesome when more trusting children are present.

Disaster Recovery

Disaster Recovery

Hurricane Sandy disrupted power, Internet, phone and various other technical services for millions of people and businesses along the East Coast in 2012. In the aftermath of the storm, organizations are reviewing the effectiveness—or lack thereof—of disaster recovery plans across all of their systems.

Single Focus on Education

Single Focus on Schools

Education security should not be a political issue, but it is. Evaluating legislators’ thought process is not only interesting, but also reveals that proactive measures need to be taken in school settings.

countering domestic ieds

Countering Domestic IEDs

Improvised explosive devices (IEDs) are no longer an overseas or war zone threat; they are an increasing threat on U.S. soil from both global and domestic terrorists.

Cellular Challenges

Cellular Challenges

Connection of industrial network devices with a cellular modem can be challenging. In most cases, industrial network devices are operating backwards from how typical consumers utilize an Internet connection over a cellular modem.

the future is here, you just have to find it

The Future is Here, You Just Have to Find It

I wanted to share some of our technology visions and the IP video trends we see shaping up in the near future. What might some of the most forward looking real-world security installations look like five years from now?

Mobile Discussion

Mobile Discussion

As they use mobile applications in other aspects of their lives, students entering the workforce will fuel demand for increased use of their smartphones.

adding ip video to manage shrink

Adding IP Video to Manage Shrink

Milestone provides Creaseys Guernsey management team and supervisors with an effective tool for protecting the outlet from cash handling and high-value item theft.

Lights, Camera, Action

Lights, Camera, Action

Just as cutting edge movie-making technology has changed the face of the entertainment industry, cutting-edge IP video surveillance technology has changed the face of physical security.

Lighting a New Design

Lighting a New Design

A large, multinational banking institution with several thousand branches across the United States was faced with inconsistent exterior lighting around entrances, ATMs and night depositories, which presented potential security and safety issues for customers and employees.

Security Industry Association Voices Support for School Security Initiatives

The SIA announced the formation of a committee to assist lawmakers with the issue of school security.

MOBOTIX Welcomes TOTUS Solutions as Technology Partner

MOBOTIX delivers IP surveillance to outdoor, lighting-based security platforms.

The American Symbol Comes Under Video Surveillance

The American Symbol Comes Under Video Surveillance

Berry College has welcomed a couple of new "students" to their campus - a pair of bald eagles, representative of America.

American Fibertek Positioned to Take Advantage of Changing Landscape

With American Fibertek's innovative, infrastructure technology and value, this company is fulfilling idustry demand.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.