Online Exclusives


Light in the Retail Sector

Light in the Retail Sector

Wrightstyle, based in the UK, supplies specialist steel and aluminium glazing systems worldwide, and has supplied shopping centres internationally. Jane Embury, the company’s marketing director, looks at retail trickery and the power of light to seduce shoppers.

How to Implement an Optimized Video Surveillance Plan for Protecting Business Assets

Demand is growing for high definition and megapixel resolution security cameras because they allow for wider coverage and image detail.

Intelligent Key and Asset Management for Planes, Trains and Automobiles

Intelligent Key and Asset Management for Planes, Trains and Automobiles

Protecting on-site assets and facilities by limiting access to buildings, vehicles and pooled assets.

Christmas Fire Safety in Emerging Markets

Christmas Fire Safety in Emerging Markets

As Christmas approaches, and textile factories across Asia step up production, let’s hope that fire regulations will be better served by stricter monitoring – and that, inch by inch, the lessons of fire safety become embedded in more jurisdictions worldwide.

Key Management Systems Enhance Key and Lock Applications

Key Management Systems Enhance Key and Lock Applications

Keys and locks reliably offer prevention, protection, ease of install and maintenance, and minimal cost investment.

Using Bluetooth-enabled Devices as the Key to Remote Monitoring

As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security.

Jane Embury explains how skybridges, along with modern glazing systems, play a significant role in evacuations.

The Bridge of Sighs and Evacuation Models

Skybridges, along with modern glazing systems, play a significant role in evacuations.

The Rise of the Machines: M2M’s Role in Transforming Business and Security

The Rise of the Machines: M2M’s Role in Transforming Business and Security

Faced with tighter security requirements, enhanced regulatory pressure and heightened environmental concerns, businesses seek technologies that will improve overall business processes.

What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.

fire safety

The Importance of Fire Compartmentation

Whatever the building, compartmentation is fundamental to its safety, creating a series of protected fire zones to ensure that the fire is contained.

Highlighting the Hotsheet: 2nd Quarter Cargo Theft Update

Highlighting the Hotsheet: 2nd Quarter Cargo Theft Update

DHS identified transportation systems as one of 16 critical infrastructures to nation's supply chain and cargo theft as a constant threat to stability.

Back-to-School Basics

Back-to-School Basics

Three key components to ensure a safe and secure campus by dissecting the core fundamental DETER.

Q and A with Chief Information Security Officer at Duke University about Yubico

Q and A with Chief Information Security Officer at Duke University about Yubico

Richard Biever talks strong authentication, two-factor authentication, YubiKey, user feedback and working with Yubico.

There

There's more to School Safety than Active Shooter Training

Enhanced Non-Lethal (ENL) devices can play a vital role in managing more common types of violence on campus.

Securing Your Bank

Securing Your Bank's Email with 4-Layer Protection

Sending a wrong email can lead to massive privacy breaches which could inflict penalties or fines, or even loss of revenue.

Ensuring Fleet Operations Don

Ensuring Fleet Operations Don't Become a Runaway Vehicle

Acquire data to recognize where the issues are and then create a system to train employees to avoid risk.

Application Single Sign-on – Benefits and Considerations

Application Single Sign-on – Benefits and Considerations

Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.

Two Nations, One Big Opportunity

Two Nations, One Big Opportunity

A look at public space surveillance on either side of the Atlantic highlights how it came of age.

Protect Critical Infrastructure With Advanced Identity Management Solutions

Protect Critical Infrastructure With Advanced Identity Management Solutions

Huge component in protecting critical infrastructure from being high-risk terrorist targets is by properly managing the identities of those getting into and out of secured zones.

Should You Expect Your Security Software to Predict The Future?

Should You Expect Your Security Software to Predict The Future?

6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities