Top Stories


Law Enforcement Data “Blue Leaker”: a Danger or a Public Service?

Law Enforcement Data “Blue Leaker”: a Danger or a Public Service?

The recent release of a massive cache of sensitive Law Enforcement data has been in the news recently. The trove of roughly 270 gigabytes of data posted to the Denial of Secrets website has been referred to as “BlueLeaks.”

TSA Using credential authentication technology to improve identification verification capabilities

TSA Using credential authentication technology to improve identification verification capabilities

The Transportation Security Administration (TSA) at Billings International Airport (BIL) is now using new technology in the security checkpoint that confirms the validity of a traveler’s identification and confirms their flight information in near real time.

DHS Announces ICE Enforcement Actions on Criminal Aliens Released Due To California Sanctuary Policies

The Department of Homeland Security (DHS) and Immigration and Customs Enforcement (ICE) announced the conclusion to a week-long targeted enforcement operation that resulted in the apprehension of more than 125 at-large aliens



ADI Expands; Second Location to Serve Greater Toronto Area

ADI Global Distribution has announced a second location in Scarborough, Ontario. This marks ADI's second location to serve the Greater Toronto Area and tenth location in Canada, and strengthens its commitment to providing the best and most convenient service to dealers.

An Investment in Remote Workforce is an Investment in the Future

An Investment in Remote Workforce is an Investment in the Future

It is no mystery that the COVID-19 pandemic has pushed remote working to the forefront of critical business issues for companies like never before.

ISONAS Pure IP Access Control Solution Deployed at Engel Electric

ISONAS Inc., a part of the Allegion family of brands, has announced that the ISONAS™ Pure IP™ access control solution has been installed at a new 8,000-square-foot facility in Rockford, IL.

High Quality Integration

Whether you are walking through U.S. customs at an airport or the lobby at a critical facility like a data center, a visitor checkpoint to verify your identity is standard.

Smarter Power Consumption

What if the next generation of IoT sensing solutions offered ubiquitous, unobtrusive, and more aesthetically pleasing sensing? And, what would that mean for security and compliance?

Medina County Implements Checkups Version 2 to Further Boost Criminal Justice System Remote Monitoring Efforts

County has worked with San Antonio-based tech company for nearly two years to check in with offenders using an innovative mobile app, now adds more customized features

Meet the Director of Happiness

It is true that a picture is worth a thousand words. A nice, feel-good story is an escape from the mundane world of work.

Driving New Opportunities

Driving New Opportunities

When network video cameras first came on the market, they were chiefly bare bones video streaming devices.

Today’s Essentials

Many of today’s video security systems feature 4K HD video to help human operators monitor and react better, but also to provide the best possible raw video data for the AI and machine learning programs that are used to continuously enhance operations.

No Touch, Low Touch

No Touch, Low Touch

The global COVID-19 pandemic has made eliminating the spread of germs a critically important life-safety imperative.

Bringing Rapid Identification

As biometric readers play an increasingly prominent role in law enforcement, one of the newest high-value use cases is the ability to identify persons of interest on the street using smaller mobile biometric readers that are easy and safe for officers to both carry and use.

Democratizing Access

Democratizing Access

The Dover International Speedway’s high-banked, one-mile concrete oval race track is known as “The Monster Mile”.

Shifting Strategies

The onslaught of COVID-19 has elevated security measures in every border control operation within the Department of Homeland Security.

Going the Distance

Networked devices have made all the difference in giving security and communication systems far more ubiquity, capabilities, and performance than anyone could have dreamed of when the IP was invented in 1974.

An Essential Business

The manufacturing sector is extraordinarily diverse, ranging from the manufacturing of advanced fighter jets to ventilators, and pharmaceutical products to cars, paper products, steel, clothing, high-tech components and beyond.

12 Months Remaining Until Full REAL ID Enforcement Deadline

12 Months Remaining Until Full REAL ID Enforcement Deadline

The Department of Homeland Security (DHS) is reminding Americans that only 12 months remain until the Oct. 1, 2021, REAL ID enforcement goes into effect.

Data Security Encryption Approaches Deliver Varying Levels of Multi-Cloud Data Security

Data Security Encryption Approaches Deliver Varying Levels of Multi-Cloud Data Security

The challenges of protecting data and using encryption across public/private cloud, SaaS, and on-premises environments increase complexity, cost and security risk

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3