Top Stories


Coordinating Emergency Communications

Coordinating Emergency Communications

One of the many lessons learned from the Smart Cities movement is that you can achieve significant improvement in community safety and resilience when you use network technologies to facilitate communications and data sharing.

Why Lone Workers are Vulnerable

The economic slowdown created by the pandemic has forced many retail chains, restaurants, hotels, banks and financial institutions with a retail presence to cut back on staff and change their business models.

The New Heart of Security

The physical security industry has before it an incredible opportunity: to lead business digital transformation (DX) through security convergence.



The Threat from Within

The Threat from Within

Just as banks use every tool at their disposal to maximize revenue opportunities and manage their ledger, they must take the same approach when it comes to security.

Controlling the Cogeneration Plant for Hudson Yards

Towering over the Hudson River on Manhattan’s New West Side is Hudson Yards – a cultural epicenter with more than 100 diverse shops, residences and culinary experiences. By area, it’s the largest private real estate development in the United States – covering more than 18 million square feet over seven city blocks.

Turning to technology as safe and trustworthy passwords

More Secure Banking

To be successful in financial services, banks, investment firms and other institutions need to prove to their customer base that they are safe and trustworthy. Yet many still rely on passwords, PINs and other knowledge- based authentication factors—which are not only unreliable, but also insecure.

A Hands-free Environment

No one will argue that the COVID-19 pandemic has dramatically changed the way we interact in public spaces.

Using AI Power

Using AI Power

Video surveillance is commonplace today, but many organizations don’t even realize that they aren’t fully leveraging the video data that their cameras capture. Traditionally, law enforcement and physical security teams use video cameras to monitor areas in real-time and to review footage to glean evidence for post-incident investigation.

The Evolution of Risk

Risk prevention has always been a fundamental part of business planning and operations. And while the various forms of protection available have evolved over the years, so also has risk. About 20 years ago, professional security was mostly limited to night watchmen, armored trucks and closed circuit video cameras wired to VCRs.

Encrypt Your Flash Drive

Encrypt Your Flash Drive

USB drives are convenient devices. They are used daily by hundreds of millions of people around the world to store or transport data, much of which would be considered confidential. Chances are there are plenty of USB drives floating around your company or organization right now.

How Security and COVID-19 Became Partners

COVID-19 has changed a lot of things about life and business Some opportunities have been challenging, other plans have been nimble exercises of security technology stepping up to the place, swinging for a home run.

Speco Continues To Expand the National Accounts Team with West Coast New Hire

Speco is pleased to announce the hiring of security Industry veteran Steven Currens as the latest addition to the National Accounts Team.

Eagle Eye Networks and Delaget launch new video and operational data integration for restaurant loss prevention

Eagle Eye Networks has announced a collaboration with Delaget, a software-as-a-service provider specializing in business intelligence for restaurants, to integrate the Eagle Eye Video API Platform into Delaget's loss prevention and analytical tools.

ISC East 2020 Has Been Canceled.

ISC East 2020 Has Been Canceled.

ISC East 2020, scheduled for Nov. 18-19, 2020, in New York City, has been canceled due to the ongoing impact of COVID-19 as further discussed below, and continued restrictions on large events.

PureTech Systems Awarded Contract to Protect Additional Power Generation Sites with PureActiv®

PureActiv software to provide wide-area intrusion detection with multi-sensor technology

Alcatraz Partners With SAGE Integration to Expand Modern Access Control Solutions Along the East Coast, Midwest

Alcatraz has partnered with SAGE Integration to deliver facial authentication solutions to enterprise businesses to help modernize access control.

Paxton COVID secure Tutorials and Resources Launched on Demand

Paxton is pleased to announce that their free COVID-secure live webinars are now available on demand - they can be watched anywhere, anytime at your convenience.

Interface Security Systems Makes Virtual Security Guard Monitoring Affordable to Businesses of all Sizes

Interface Security Systems has announced it is expanding its Interactive Remote Video Monitoring services with a new highly-affordable Virtual Security Guard Monitoring package designed specifically for small and mid-sized businesses (SMBs) and enterprises with moderate security challenges.

Eagle Eye Networks, Delaget Launch New Video and Operational Data Integration for Restaurant Loss Prevention

Eagle Eye Networks has announced a collaboration with Delaget, a software-as-a-service provider specializing in business intelligence for restaurants, to integrate the Eagle Eye Video API Platform into Delaget’s loss prevention and analytical tools.

AF Looks to Facial Recognition to Secure Facilities

AF Looks to Facial Recognition to Secure Facilities

The Air Force’s AFWERX innovation arm is investing in real-time facial recognition to secure base perimeters and enhance situational awareness for Air Force security staff.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3