Top Stories


Hanwha Techwin Unveils Its New Innovation and Technology Experience Center

Hanwha Techwin America officially opened its new Hanwha Innovation and Technology Experience (HITE) on March 29.

At Least 11 Injured in Brooklyn Subway Shooting

A masked gunman injured at least 11 in a shooting at a Brooklyn subway.

Research: Supply Chain Cyber Attacks Continue to Increase

Organizations have an opportunity to reduce their third-party risk by clarifying whether they or their suppliers are responsible for supply chain risk management, according to new global research of 1400 cybersecurity decision makers by NCC Group.



Study: Home Technology Industry Now Exceeds $20 Billion

CEDIA, the global trade association for the home technology industry, recently released the Integrated Home Market Analysis in partnership with leading market research firm, Ancrage Consulting LLC. The results highlight the strength and stability of the estimated $20.1B integrated home market.

Allied Universal® Becomes a Global Leader in Electronic Monitoring Through Attenti Acquisition

Allied Universal® continues its strategic growth with the acquisition of Attenti Group. Allied Universal will integrate Attenti Group with G4S Monitoring Technologies, to create Allied Universal Electronic Monitoring Services.

A Line in the Sand

There is a line in the sand where security is evident, and if crossed security begins to wane. In our security pursuits each day as journalists, we’re fortunate to be able to talk with many of you and learn about new technology, adaptable solutions and secure outcomes.

Mitigating Violence

Mitigating Violence

Hospitals and health systems are tasked with controlling costs and cutting budgets while maintaining the highest levels of patient care, safety and privacy which heighten our awareness of the vital role played by security services in the nation’s ever-evolving healthcare landscape.

Systems Integration or Unification?

Systems Integration or Unification?

In the physical security industry, the terms integration and unification are often used interchangeably. It is common to hear people mention ‘unified security’ when talking about integrating systems. The truth is— there is a difference between these approaches.

The Emergence of Analytics

The Emergence of Analytics

Television and movies have always had interesting ideas regarding the capabilities of surveillance cameras. Crime shows like CSI would have viewers believe a still frame can be “enhanced” to near-infinite clarity with just a few keystrokes.

Bringing Out the Best

Bringing Out the Best

Recent physical security trends are all about mitigating today’s risks using highly integrated, open-source technology. Now, more than ever, security practitioners require comprehensive, multi-faceted solutions that can quickly pivot to meet new challenges.

ISC West Wraps Up With Nearly 20,000 Total Professionals in Attendance

ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), came to a close last Friday with record-breaking attendance growth for 2022.

Going High Tech

When it comes to physical security, the world around us has changed. First, society has changed, with more social unrest and violence occurring in the COVID-19 era, including a rise in fan misbehavior at sporting events.

The Benefits of On-site Security

The Benefits of On-site Security

Global video surveillance has exploded in the past few years. In fact, the market is expected to reach a value of more than $90 billion by 2026.

Building Trust through Transparency

Building Trust through Transparency

With social media rapidly evolving, the call for transparency and accountability inside a law enforcement agency is now necessary to show the world what police do with every interaction.

Defining a Role

The sudden long lines at gas stations in the United States, last May were for many, a surprising sight. Indeed, the situation emerged without warning: A ransomware attack disabled computer systems for a major regional provider, Colonial Pipeline, creating shortages and panic-buying.

Transitioning to the Cloud

Transitioning to the Cloud

Is access control in the cloud truly secure? Most organizations have asked this question when considering a transition from on-premise access control software to a cloud-based system.

Optimizing Store Layouts

Video analytics and AI are hot topics for 2022 as the security industry seeks new ways to take a bite out of crime, even as staffing is light organized retail crime is on the rise.

A Firm Foundation

As more devices move onto network-based infrastructure, the boundaries between technology categories are starting to blur.

Mobile Ticketing to the Rescue

Mobile Ticketing to the Rescue

When Public Transport Operators (PTOs) were hit by the pandemic, it reduced their sales volumes dramatically. One challenge was the difficulty of distributing and selling physical tickets.

Similarities at Data Centers and Airports

Similarities at Data Centers and Airports

Few sectors face higher regulation and compliance standards in the United States than the aviation industry.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3