Top News


Hanwha Techwin Unveils Its New Innovation and Technology Experience Center

Hanwha Techwin America officially opened its new Hanwha Innovation and Technology Experience (HITE) on March 29.

Research: Supply Chain Cyber Attacks Continue to Increase

Organizations have an opportunity to reduce their third-party risk by clarifying whether they or their suppliers are responsible for supply chain risk management, according to new global research of 1400 cybersecurity decision makers by NCC Group.

Study: Home Technology Industry Now Exceeds $20 Billion

CEDIA, the global trade association for the home technology industry, recently released the Integrated Home Market Analysis in partnership with leading market research firm, Ancrage Consulting LLC. The results highlight the strength and stability of the estimated $20.1B integrated home market.

Allied Universal® Becomes a Global Leader in Electronic Monitoring Through Attenti Acquisition

Allied Universal® continues its strategic growth with the acquisition of Attenti Group. Allied Universal will integrate Attenti Group with G4S Monitoring Technologies, to create Allied Universal Electronic Monitoring Services.

A Line in the Sand

There is a line in the sand where security is evident, and if crossed security begins to wane. In our security pursuits each day as journalists, we’re fortunate to be able to talk with many of you and learn about new technology, adaptable solutions and secure outcomes.

Mitigating Violence

Mitigating Violence

Hospitals and health systems are tasked with controlling costs and cutting budgets while maintaining the highest levels of patient care, safety and privacy which heighten our awareness of the vital role played by security services in the nation’s ever-evolving healthcare landscape.

Systems Integration or Unification?

Systems Integration or Unification?

In the physical security industry, the terms integration and unification are often used interchangeably. It is common to hear people mention ‘unified security’ when talking about integrating systems. The truth is— there is a difference between these approaches.

The Emergence of Analytics

The Emergence of Analytics

Television and movies have always had interesting ideas regarding the capabilities of surveillance cameras. Crime shows like CSI would have viewers believe a still frame can be “enhanced” to near-infinite clarity with just a few keystrokes.



Bringing Out the Best

Bringing Out the Best

Recent physical security trends are all about mitigating today’s risks using highly integrated, open-source technology. Now, more than ever, security practitioners require comprehensive, multi-faceted solutions that can quickly pivot to meet new challenges.

ISC West Wraps Up With Nearly 20,000 Total Professionals in Attendance

ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), came to a close last Friday with record-breaking attendance growth for 2022.

Featured

  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.