Top Stories


Providing Security

IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.

Increased Card Security

Protecting the physical integrity of personal and corporate information is an important task for Banco do Nordeste do Brazil (BNB), which goes above and beyond the security rules established by the Central Bank of Brazil to adopt additional security measures.

Safer More Secure Campuses

To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.



Study: Conciliatory Tactics More Effective Than Punishment in Reducing Terrorism

Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review.

Boosting Identity

Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.

Cell Phone Financial Identity Theft

USA Today reported in March 2012 that Americans lost $30 billion worth of mobile phones last year.

Cost-Effective Compliance

The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.

Curbside Security

Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.

From the IT Perspective

Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.

Historic Theater Add System Sensor Fire Detector

In 2010, the historic Egyptian Theatre in DeKalb, Ill., decided to upgrade to a more modern and effective life safety system to protect the structure and its patrons.

Todays Threat Landscape

Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.

Video Provision

After recommending strategies for on-the-border video cameras and other security technologies, Rep. Candice Miller (R-MI) and her colleagues in the U.S. House of Representatives have passed H.R. 1299, known as the Secure Border Act.

HID Global's Access Control Solution Safeguards China Hospital

First Affiliated Hospital of Jinan University in Guangzhou, China has selected HID Global's networked access control solutions and contactless readers to provide multi-layered security with advanced access control level settings and centralized monitoring to improve the hospital’s overall security in key access zones.

ITT Exelis to Provide Cyber Solutions Development for U.S. Air Force

ITT Exelis (NYSE: XLS) has been awarded the Agile Cyber Technologies (ACT) indefinite delivery, indefinite quantity contract by the U.S. Air Force Research Laboratory (AFRL).

Diebold Extends Monitoring Expertise to Regions Financials

Birmingham, Ala.-based Regions Financial Corporation, a full-service provider of banking, wealth management, mortgage and insurance solutions in the United States, has turned staffing of its in-house central monitoring station over to Diebold.

Lenel and Mercury Security Sign Contract for Access Control Hardware

Mercury Security Corporation has signed a long-term contract with Lenel Systems to provide access control hardware for use with the Lenel OnGuard® Total Security Platform.

CACI Awarded $261 Million in Intelligence Contracts

CACI International Inc. has been awarded more than $261 million in previously unannounced contracts with federal government clients in the Intelligence Community.

VIVOTEK Cameras Guard City of Halle, Belgium

In order to meet numerous complex technical specs and requirements for the Healle, Belgium surveillance project, many different types of cameras were sought after. Some of the challenges facing the VIVOTEK teams and system integrator included varying lighting conditions at the station, from dimly lit parking lots, to outdoor entrances, interior corridors and a jail.

Featured

  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.