Top News


Here We Go Again

It doesn't seem possible that it's time for the annual ASIS' GSX tradeshow. So, here we come Las Vegas. Seems like I was just there.

School Security the Focus of ASIS International 2018 Security Cares Program

ASIS International, the world's largest association of security management professionals, recently announced the educational line-up for this year's free Security Cares community security education program, which will be held during Global Security Exchange (GSX), Sept. 23-27 at the Las Vegas Convention Center.

Cyber Security Summit Coming to Global Security Exchange

ASIS International, the world's largest association of security management professionals, recently announced that Cyber Security Summit will co-locate with Global Security Exchange (GSX), expanding the depth of cyber education in the blockbuster GSX conference program

Bradley D. Spacy and K.T. McFarland Announced for Global Security Exchange Keynote Lineup

ASIS International, the world's largest association for security management professionals, recently reported Air Force Major General Bradley D. Spacy and former Trump Administration Deputy National Security Advisor K.T. McFarland will join the keynote lineup for Global Security Exchange (GSX), the security industry's flagship event.

Remembering 9/11

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.



Transitioning from Video to Vision

In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.

Growing Adoption

One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages

Featured

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.