Top Stories


The New Heart of Security

The physical security industry has before it an incredible opportunity: to lead business digital transformation (DX) through security convergence.

The Threat from Within

The Threat from Within

Just as banks use every tool at their disposal to maximize revenue opportunities and manage their ledger, they must take the same approach when it comes to security.

Controlling the Cogeneration Plant for Hudson Yards

Towering over the Hudson River on Manhattan’s New West Side is Hudson Yards – a cultural epicenter with more than 100 diverse shops, residences and culinary experiences. By area, it’s the largest private real estate development in the United States – covering more than 18 million square feet over seven city blocks.



Turning to technology as safe and trustworthy passwords

More Secure Banking

To be successful in financial services, banks, investment firms and other institutions need to prove to their customer base that they are safe and trustworthy. Yet many still rely on passwords, PINs and other knowledge- based authentication factors—which are not only unreliable, but also insecure.

A Hands-free Environment

No one will argue that the COVID-19 pandemic has dramatically changed the way we interact in public spaces.

Using AI Power

Using AI Power

Video surveillance is commonplace today, but many organizations don’t even realize that they aren’t fully leveraging the video data that their cameras capture. Traditionally, law enforcement and physical security teams use video cameras to monitor areas in real-time and to review footage to glean evidence for post-incident investigation.

The Evolution of Risk

Risk prevention has always been a fundamental part of business planning and operations. And while the various forms of protection available have evolved over the years, so also has risk. About 20 years ago, professional security was mostly limited to night watchmen, armored trucks and closed circuit video cameras wired to VCRs.

Encrypt Your Flash Drive

Encrypt Your Flash Drive

USB drives are convenient devices. They are used daily by hundreds of millions of people around the world to store or transport data, much of which would be considered confidential. Chances are there are plenty of USB drives floating around your company or organization right now.

How Security and COVID-19 Became Partners

COVID-19 has changed a lot of things about life and business Some opportunities have been challenging, other plans have been nimble exercises of security technology stepping up to the place, swinging for a home run.

Speco Continues To Expand the National Accounts Team with West Coast New Hire

Speco is pleased to announce the hiring of security Industry veteran Steven Currens as the latest addition to the National Accounts Team.

Eagle Eye Networks and Delaget launch new video and operational data integration for restaurant loss prevention

Eagle Eye Networks has announced a collaboration with Delaget, a software-as-a-service provider specializing in business intelligence for restaurants, to integrate the Eagle Eye Video API Platform into Delaget's loss prevention and analytical tools.

ISC East 2020 Has Been Canceled.

ISC East 2020 Has Been Canceled.

ISC East 2020, scheduled for Nov. 18-19, 2020, in New York City, has been canceled due to the ongoing impact of COVID-19 as further discussed below, and continued restrictions on large events.

PureTech Systems Awarded Contract to Protect Additional Power Generation Sites with PureActiv®

PureActiv software to provide wide-area intrusion detection with multi-sensor technology

Alcatraz Partners With SAGE Integration to Expand Modern Access Control Solutions Along the East Coast, Midwest

Alcatraz has partnered with SAGE Integration to deliver facial authentication solutions to enterprise businesses to help modernize access control.

Paxton COVID secure Tutorials and Resources Launched on Demand

Paxton is pleased to announce that their free COVID-secure live webinars are now available on demand - they can be watched anywhere, anytime at your convenience.

Interface Security Systems Makes Virtual Security Guard Monitoring Affordable to Businesses of all Sizes

Interface Security Systems has announced it is expanding its Interactive Remote Video Monitoring services with a new highly-affordable Virtual Security Guard Monitoring package designed specifically for small and mid-sized businesses (SMBs) and enterprises with moderate security challenges.

Eagle Eye Networks, Delaget Launch New Video and Operational Data Integration for Restaurant Loss Prevention

Eagle Eye Networks has announced a collaboration with Delaget, a software-as-a-service provider specializing in business intelligence for restaurants, to integrate the Eagle Eye Video API Platform into Delaget’s loss prevention and analytical tools.

AF Looks to Facial Recognition to Secure Facilities

AF Looks to Facial Recognition to Secure Facilities

The Air Force’s AFWERX innovation arm is investing in real-time facial recognition to secure base perimeters and enhance situational awareness for Air Force security staff.

Arcules Honored with Benchmark Innovation Award for Hybrid VMS Solution with Technology Partner Milestone Systems

Arcules has announced today that the Arcules-XProtect Hybrid VMS Solution has been selected as the winner in the Service-based Solutions category of the 2020 Benchmark Innovation awards.

Dunbar Security Solutions Acquires Manned Security Assets from Trust Security Services Inc.

Dunbar Security Solutions has finalized a deal to acquire assets from Trust Security Services, Inc. to provide manned security services in Washington, D.C.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3