Top News


Pentagon to Conduct All Federal Security Checks

Pentagon to Conduct All Federal Security Checks

Pentagon officials said that over the next three years it will be responsible for background investigations for military and civilian employees and contractors.

A Third of Companies Would Consider Paying Hackers

A Third of Companies Would Consider Paying Hackers

Several companies are opting for short-term reactive cybersecurity despite high profile ransomeware attacks.

House of Representatives Passes Bill Banning Government use of Chinese Surveillance Gear

House of Representatives Passes Bill Banning Government Use of Chinese Surveillance Gear

The $717 billion defense-policy bill is the latest move against Chinese technology on the basis of national security concerns.

Don’t Be Caught Unsecured

Don’t Be Caught Unsecured

Over the last decade, the cloud has revolutionized the way businesses operate. Today, modern enterprises are turning to a hybrid IT environment, leveraging the best of both worlds—the scalability of cloud infrastructure and the control of on-premises systems.

The Head Count

The Head Count

While students focus on learning, Putnam City Schools Police Department works hard to keep everyone safe. Officers monitor schools 24/7 and also spend a lot of time conducting investigations and compiling digital evidence for cases. Often, this involves working closely with local agencies to help keep their communities safe.

Video Grand Slam

Video Grand Slam

The Great American Ball Park in Cincinnati is the hallmark of America’s greatest pastime and home to baseball’s oldest franchise, the Cincinnati Reds. In addition to new food and entertainment options, providing high-end visual technology was a large priority—delivering a bevy of video walls, projectors, interactive screens, and flat screens that would entertain fans in and out of their seats for the ultimate game day.

Out of Harm’s Way

With more than 21,000 individual artworks on display at any given time, the Butler Institute of American Art sought out a security system to assist the guards in monitoring the vast amount of rooms and corridors filled with priceless works.

Stopping Tragedy in its Tracks

Event organizers have responded to past attacks by improving their security methods and adding more metal detectors, police and other security personnel. Despite these efforts, a would-be terrorist can still manage their way to the venue’s entrance and pose a mass casualty threat.



The Focus on Public Space

The Focus on Public Space

Over the past several years we’ve seen an increase in attacks focused on public spaces. There is no safe-haven in today’s societal landscape that would allow any public service or business to conclude that they are not a target. Hospitals are no exception.

More Than Meets the Eye - Cloud Video Surveillance

More Than Meets the Eye - Cloud Video Surveillance

With a multitude of cloud providers vying for market share to store your data and provide cloud computing, creating your own data center deployments with associated hardware, networking and storage systems, doesn’t generally top the list of additional headaches one might pursue in today’s world, unless you are Dean Drako.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities