Online Exclusives


Tag, You're It

Prevailing international aviation rules mandate 100 percent screening for outbound carry-on baggage. Modern screening techniques involve X-ray or other imaging systems combined with chemical sniffers for scent or trace detection, physical search and permissible item restrictions. During the process of going through security, it is easy to associate a problem bag with its owner to resolve any violations.

Jailhouse Rocks

Technology in the Bergen County Jail in New Jersey is state-of-the-art, featuring computer control of all inmate housing areas, an integrated perimeter security system, a site-wide duress/panic alarm system and a computerized control center. However, the Bergen County courthouse and jail had some particular challenges that the coaxial (analog) cameras simply could not meet.

Secure Investments

The retail banking sector has received negative publicity recently due to investments in risky commodities. Security directors in retail banking also can face scrutiny as they face their own potential for risk when it comes to investing in next-generation video recording technologies for branch bank locations.

Integration On Guard

The National Union of Mineworkers is the largest recognized collective bargaining agent representing workers in the mining, construction and electrical energy industries in South Africa, and the largest affiliate of the Congress of the South African Trade Unions, where non-racialism was a founding principle.

Orlando’s IP-Based Video Surveillance System Enhanced With OnSSI Video Management Solution

In talking with officials from the Orlando Police Department about IRIS (Innovative Response to Improve Safety), the city’s new IP-based video surveillance system, enthusiasm for the project is clearly evident.

Systemic Security Protection through Pharmaceutical Traceability

Drug counterfeiting continues to increase and its global threat to patient safety continues to rise. The FDA estimates that 1 million deaths worldwide are the result of counterfeit drugs. While the United States drug supply is one of the safest in the world, it is not immune to these concerns. It is important for pharmaceutical manufacturers to understand not just the different types of threats they face but also the tools and technologies available today to prevent counterfeit drugs from entering the supply chain.

Life Safety Upgrade Brings Order to Courthouse

Courthouses must provide a presence that conveys stability, integrity, and suggests the vital duties of the court while maintaining an open and inviting atmosphere.

Wireless Technology In Remote Security

As an integral component of numerous organizations’ safety and security priorities, video surveillance has demonstrated its value and benefits numerous times by providing real-time monitoring of assets, property, environment and people. As security risks increase, the need to visually monitor and record events in the most remote areas becomes even greater.

Into the Night

Ensuring the safety and security of air travelers and airport resources is becoming increasingly important, and both federal and state homeland security offices are making upgrading and enhancing security measures at airports a top priority. Organizing appropriate surveillance for such a large area is a daunting task for officials and requires an abundance of manpower and cutting-edge technology to ensure thorough protection.

A Work of Art

Located on the campus of Duke University, the Nasher Museum of Art displays a growing collection of modern and contemporary art. With an exhibition space of more 65,000 square feet it is one of the most important university are museums in the country.

Verify the Signature

Banks, financial institutions, municipal, state and federal governments are demanding more reliable, less expensive authentication and authorization systems for everyday activities, from performing financial transactions to boarding an aircraft, entering a secure physical location or crossing international borders.

Leaving Your Mark

Today’s mobile professionals carry more sensitive information than ever before. A single laptop can contain information that can be valued in the millions, if not billions, of dollars.

Crossing the Chasm: Deterrence to Defeat

In this age of widespread easy access to personal information, identity theft has become the fastest growing and most lucrative crime in America.

Mobile Monitoring

Internet-enabled products and services are now gaining wider acceptance and delivering better results than before. Remote monitoring services are no exception.

Case Study: MITOC

Regardless of the scope and scale, when disaster strikes, first responders need a rapid and effective way to collect and communicate information in the early moments.

Tools Designed for Securing Tools

There are two "S"s critical to the construction industry: safety and security. Protecting workers from harm is obviously of primary concern, but protecting assets on the jobsite against theft is also on the top of one's mind.

Critically Speaking

Critical infrastructure organizations are essential to the functioning of societies and economies. The role of these facilities in international commerce makes their security a top priority. But given the complex and often geographically dispersed nature of these facilities and assets, critical infrastructure security often presents a daunting challenge.

On the Fast Track

An organization suspects that an employee is not following his or her route. In the past, a security manager would personally follow the employee or instruct someone to do so. This tactic is time consuming, especially if, on that particular day, the employee actually goes where he’s supposed to go.

Safe and Risk-Managed

While every individual and organization that provides security products or services will have their spin on what security is and how to achieve the desired level, the truth is, security is essentially an unachievable outcome. A common definition of security is, “freedom from danger, fear and anxiety.” Security defined as such is, therefore, unattainable.

Disaster Preparation for the 21st Century Business

Business is all about managing risk, and risk management comes down to making solid business decisions to avoid and mitigate potential threats, including natural disasters.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3