Top News


How Government Agencies Are Utilizing ID Cards To Take Control of Security

It’s a known fact that government agencies across the U.S. require a higher level of security due to the amount of sensitive information they keep on file. They must maintain control over their public facilities and require more stringent security practices than the normal building. With constant risks of attempted forgery and tampering, government agencies must ensure that only authorized personnel have access to public records and their facilities. A great way to take control and bring security to the next level is investing in a fully comprehensive ID card solution. Most agencies today are implementing an ID card policy to help ensure confidential information stays private.

Announcing the Winners of the 2024 Security Technician of the Year Awards

The Foundation for Advancing Security Technology (FAST) is thrilled to announce the winners of the 2024 Security Technician of the Year Awards, now in its second year. This prestigious initiative highlights the critical role that security technicians play within the industry, celebrating their excellence in the meticulous design, installation and maintenance of security systems that safeguard our communities.

The Monitoring Association’s Surveillance and Video Verification Committee Welcomes New Co-Chair

The Monitoring Association (TMA) is pleased to announce that David Charney, chief customer officer (COO), Stealth Monitoring, has accepted the position of co-chair of the TMA Surveillance and Video Verification (SVV) Committee. Charney joins seated Committee Co-Chair Wes Usie, Guardian Alarm Systems.

Elite Interactive Solutions Unveils New Website

Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the launching of its new website, eliteisi.com. Several months in the making, the site has been designed with the security end-user customer across a diverse range of vertical markets in mind, highlighting myriad benefits of Elite’s solution and company differentiation in an appealing and user-friendly format.

Protecting Data is Critical

To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet.

Mobile Access Adoption

Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect.

Changing Mindsets

We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving.

Elevating Security

Willis Tower, an iconic symbol in Chicago for more than 50 years, has undergone significant transformations to become a modern workplace and community hub that delivers the best experiences for its tenants, area residents and visitors. Originally known as Sears Tower, it was renamed Willis Tower after a change in ownership in 2009.



Security Industry Association Announces First-Ever Security Industry Community Service Day

The Security Industry Association (SIA) has announced the first-ever Security Industry Community Service Day, an initiative created by the SIA Environmental, Social and Governance (ESG) Advisory Board to rally the entire security industry to give back and make the world a better place. The 2024 Security Industry Community Service Day and supported by event sponsors ASSA ABLOY and HID – will take place on Friday, June 7, and the event will be held on the first Friday of June each year.

Digital Access in the Workplace

It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world?

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.