Top News


Solving Problems

Solving Problems

The industry is changing so rapidly that the following statement might seem bold but it’s true. No one wants to buy a camera.

Creating Cloud Platforms

Creating Cloud Platforms

Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.

Going High Tech

With the added video capabilities, Manteno authorities can alert agencies north or south of town to be on the lookout for specific vehicles with good description details.

A Smart Security Program

A Smart Security Program

Northwestern Mutual operated several disparate security systems for access control, alarm management, intercom, video and visitor management. The new building project provided an opportunity to upgrade the security system and overall security program.

Protecting Hard to Protect Areas

Protecting Hard to Protect Areas

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks.

The Command Center of the Future

The Command Center of the Future

At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).

Stick ‘Em Up, Partner

The TSA is implementing some pretty amazing technology in order to improve explosives detection. In late August, the agency unveiled a state-of-theart advanced technology computed tomography (CT) checkpoint scanner for screening passengers and their baggage.

Simplicity and Flexibility

Simplicity and Flexibility

Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.



Focus on Protection

Good business is about partnerships. Our cover story in this issue comes from Jeff Huggins who has written about different examples of not only keeping people secure, but also offering protection.

Chegg Data Breach Affects 40 Million Customers

Chegg Data Breach Affects 40 Million Customers

The hack dates back to April 2018, and compromised information includes email addresses and passwords.

Featured

  • Michigan City Fights Retail Crime With AI-Powered Video Surveillance, 911 Camera Sharing

    To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Read Now

  • TSA Intercepts 6,678 Firearms at Airport Security Checkpoints in 2024

    During 2024, the Transportation Security Administration (TSA) intercepted a total of 6,678 firearms at airport security checkpoints, preventing them from getting into the secure areas of the airport and onboard aircraft. Approximately 94% of these firearms were loaded. This total is a minor decrease from the 6,737 firearms stopped in 2023. Throughout 2024, TSA managed its “Prepare, Pack, Declare” public awareness campaign to explain the steps for safely traveling with a firearm. Read Now

  • 2024 Gun Violence Report: Fewer Overall Incidents, but School Deaths and Injuries Are on the Rise

    Omnilert, provider of gun detection technology, today released its compilation of Gun Violence Statistics for 2024 summarizing gun violence tragedies and their adverse effects on Americans and the economy. While research showed a decrease in overall deaths and injuries, the rising number of school shootings and fatalities and high number of mass shootings underscored the need to keep more people safe in schools as well as places of worship, healthcare, government, retail and commerce, finance and banking, hospitality and other public places. Read Now

  • Survey: Only 7 Percent of Business Leaders Using AI in Physical Security

    A new survey from Pro-Vigil looks at video surveillance trends, how AI is impacting physical security, and more. Read Now

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3