Top Stories


Motorola Solutions Acquires Ava Security Limited

Motorola Solutions today announced it has acquired Ava Security Limited, a global provider of cloud-native video security and analytics, based in London.

Keynote Series Speaker Lineup Announced for ISC West 2022

ISC West, in collaboration with premier sponsor the Security Industry Association (SIA), announces this year’s Keynote Series speaker lineup ahead of the March 22-25 event in Las Vegas

Resideo Acquires Arrow Wire & Cable

Resideo has acquired privately held Arrow Wire & Cable, based in Chino, Calif. Arrow was founded in 1989 and is a leading regional distributor of data communications, connectivity and security products.



Going Beyond Security

Going Beyond Security

Houston, the most ethnically diverse metropolitan area in the country, is the fourth most populous city in the nation with an estimated population of approximately 2.3 million residents as of April 2020. Houston is home to 24 headquarters of Fortune 500 companies in the larger metropolitan area and continues to expand.

Overcoming the Problems

Overcoming the Problems

What you are about to read is like an old-fashion action-thriller book or movie. There is a very mean-spirited evil villain, and, happily, a protagonist to save the day.

Manage video and alarms with VSaaS

Manage video and alarms with VSaaS

Each year demand for video surveillance continues to grow, as organizations seek to increase the security and safety of people and property. Searching for a solution that scales with their operations while minimizing upfront investments is challenging for companies with many locations.

Continuing Camera Advancement

Video surveillance technology has come a long way over the past few decades, evolving into the intelligent network system endpoints they are today.

Unified Solutions and Emerging Technologies

Unified Solutions and Emerging Technologies

Large scale infrastructure environments, like airports and critical infrastructure sites, present a physical security challenge.

Protecting a Budding Industry

The legalized cannabis industry is one of the fastest-growing industries in North America, and when it comes to the security of the facilities that grow it, the stakes are high.

Curbing Security Threats

Curbing Security Threats

Outside of physical attacks, when natural gases are extracted, transported, and refined, invisible gas leaks pose a quieter and consistently costly threat. In fact, the United States oil and natural gas industry loses approximately 1.4 to 2.3 percent of its natural gas from operations due to leaks, each year, according to the EPA.

The Rush to Digitalization

Over the last year, there has been unwavering focus on digital transformation driven by the need for greater connectivity.

Reducing Nuisance Alarms

Critical infrastructure sites need reliable, cost-effective physical security solutions.

A Medical Enhancement

New mandates require hospitals to implement various regulations and seismic safety precautions by 2030. This ultimately led to the construction of a state-of-the-art hospital for the North Bay region, and in the fall of 2020, MarinHealth announced the official opening of Oak Pavilion

If Things Can Go Wrong, They Will

Reading is a great pastime, and I do a lot of it. It’s part of my job. For fun, I read, but not the usual news; I like to focus on obituaries (just checking to make sure I’m not there) and lists. I like the Top Ten lists of just about anything.

Beyond Buzz

Beyond Buzz

Artificial Intelligence (AI), Machine Learning, Deep Learning, and Computer Vision are the latest buzzwords spreading throughout the security industry.

Winners at We-Ko-Pa

Winners at We-Ko-Pa

The number of cameras available from Hanwha Techwin was a key differentiator for the We-Ko-Pa Resort as it enabled them to choose the right camera for every situation.

Evaluating Access Control

The pandemic continues to challenge businesses in terms of security, safety and changing working conditions.

Securitas Launches Technology Life Cycle Management Tool SecureStat

Security Electronic Security, Inc. (SES) is pleased to announce SecureStat® 360 is now fully available for SES clients. Introduced last fall at the Global Security Exchange (GSX) show, SecureStat 360 provides a complete view of a company’s security technology life cycle from product installation to replacement.

Featured

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.