Top Stories


CertiPath Debuts ProofCards at ISC West

CertiPath introduced its ProofCards and the add-on FaultBridge offerings at ISC West.

FutureSentry Enhances First Responder Sensor With New Components From Linear

FutureSentry, a developer of automated detection solutions designed to enhance perimeter security, has entered into a strategic partnership with Linear LLC, a leading supplier of electronics for the residential and commercial markets. The agreement enables FutureSentry to leverage Linear’s transmitter and receiver to enhance the 315MHz supervised sensor of its award-winning First Responder product line to provide stronger detection capabilities.

ISC West Attendees Some of Heroes on JetBlue Flight 191

ISC West 2012 is a wrap! The conference was more than a success this year. Despite all the new security innovations front and center at the conference along with educational discussions about industry issues; the news about a few heroic attendees aboard JetBlue Flight 191 from New York received much attention not only at ISC West and within the security industry but across major media outlets.



GovSec on the Top Shelf

These are exciting times for the staff of Security Products and its related offerings. Today, we opened GovSec 2012 in Washington, D.C. Our keynotes were given by the director’s of cyber security and counterterrorism from the FBI: Ralph Boelter and John Snow.

Security Products Announces Platinum and Gold Winners of 2012 Govies Government Security Awards at GovSec

Security Products magazine, the only integrated product magazine reaching the entire security market, announced Platinum and Gold winners in its 2012 Govies Government Security award competition today. The awards honor outstanding government products in a variety of categories.

Mobile Security Survey: Lack of Awareness Chaos Pervades BYOD

SANS will be hosting a complimentary webcast on April 12, releasing the results to the First Annual Survey on Mobility Security.

Mobile Device Vulnerability Management Top Concern for Security Professionals in 2012

New findings from a Tenable Network Security study have revealed that mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months

Researchers Develop Explosives Detector that Rivals Bomb-Sniffing Dogs

Scientists recently described development of a new explosives detector that can sense small amounts of TNT and other common explosives in liquids instantly with a sensitivity that rivals bomb-sniffing dogs, the current gold standard in protecting the public from terrorist bombs.

Former Director General of the International Atomic Energy Agency To Keynote ASIS 2012

ASIS International (ASIS) is pleased to announce that Mohamed ElBaradei, former director general, International Atomic Energy Agency (IAEA), will address attendees of the ASIS International 58th Annual Seminar and Exhibits on Tuesday, September 11 at 8 a.m. at the Pennsylvania Convention Center in Philadelphia.

USFA Guide Highlights Community-Wide Fire Safety

The concept behind fire-adapted communities is that with proper community-wide preparation, populations and infrastructure can withstand the devastating effects of wildland fire.

In A Flash

Surveillance data is critical in applications ranging from retail to government, and gaming to transportation. Today, video usage is moving beyond security and safety to other key business functions such as training, staffing, marketing and traffic flow. The strategic value of video data is made possible because of advancements in IP-based megapixel cameras and the intelligence of incoming video streams, which are increasingly tagged with information to improve search capabilities. But the influx in high-resolution video data combined with the greater amount of VMS features creates a significant performance challenge for video surveillance storage systems, which are the core of any surveillance deployment. Flash memory is a compelling new high-performance storage technology, but the price premium over disk drives is so large that it takes some creative thinking to make flash costeffective for mainstream surveillance environments.

In The Field - Automated system detects and prevents potential criminal activity

In The Field

Cell towers and accompanying cell sites attract more attention in the area of security than ever before.

Riding Shotgun - Mobile computer systems are proving themselves vital to the future of public safety

Riding Shotgun

Its deputies in the field were being asked to make do with an old, end-of-life mobile data terminal (MDT) system that it had been using for more than two decades.

Medical Integration - Dallas hospital includes emergency phone system on campus

Medical Integration

Integration of multifaceted security systems can be a serious challenge. Using cameras, call boxes, mass notification systems and access control readers together is a difficult but increasingly common goal.

On the fence line - Good security means a layered approach

On The Fence Line

Susceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life.

From Physical To Cyber - Locking down network video surveillance

From Physical To Cyber

Both physical security and IT professionals place great importance on cyber security.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.