Top News


Powering Access Control

Powering Access Control

The new IEEE802.3bt PoE standard, also often referred to as PPoE or 4-Pair PoE, is a game-changing solution for powering 12VDC and 24VDC access control and related devices.

Where to Begin in 2020

One thing for certain this new year will be the advancement of technology. This is an ongoing phenomenon that brings new developments and solutions, and introduces completely new additions to the security industry.

Going My Way

Going My Way

Artificial Intelligence (AI) continues to be a hot topic in the security industry. While true AI (a computer’s ability to think and act like a human) is still decades away, subsets of AI such as deep learning and machine learning have enabled computers to make significant strides.

The Role of Video Security

The Role of Video Security

The security industry is being pressed to do more with less while dealing with the compounded issue of managing new internal and external threats on a daily basis.

Security at 20,000 Feet

Security at 20,000 Feet

For the sake of argument, let’s say you have a massive facility in a remote location that needs security.

A Professional’s Guide

A Professional’s Guide

The interconnectivity and integrations created by the Internet of Things (IoT) deliver many benefits, but because all devices and systems can be vulnerable to breaches, this hypoconnectivity can also have a major downside.

A Measured Approach

A Measured Approach

The threat landscape continues to evolve for every business. But banks and financial services companies face especially urgent demands.

Under Lock and Key

Under Lock and Key

The interactive self-service kiosk has become a valuable, steadily growing commercial and informational tool since the launch of the first banking ATM in the 1980s. It is an essential part of our modern-day digital landscape.



verint

Moving From Legacy to Innovation

As every security professional knows well, the sector is changing rapidly thanks to emerging developments in artificial intelligence and the migration from traditional systems to integrated cyber and physical security operations.

Leveraging Technology

Leveraging Technology

Access control advancements over the years have been notable: transitioning from keys and locksets, to cards and card readers, to the sophisticated access control management systems of today.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.