Top News


The IoT and Security: 3 Strategies Every Pro Must Know

The IoT and Security: 3 Strategies Every Pro Must Know

Law enforcement and security professionals can benefit from the IoT — and not just to watch people more closely. Follow these three steps to prepare for the IoT reality, protect your own vulnerabilities, and find creative solutions to your investigative problems.

In the Clouds

In the Clouds

Cloud solutions are changing the way businesses operate at almost every level. Their ease of implementation, access from anywhere and cost-effective pricing are making them the preferred solution for everything from marketing platforms to payroll administration to project management.

Blue Book for Success

Anixter has a Blue Book that serves as a corporate bible; Pat Comunale, president of Anixter’s global security solutions, believes in the book from the first page on, and it would seem the Blue Book is, as he notes, second to none.

Landing the Proper Security

Landing the Proper Security

Events in recent history concerning attacks on transportation hubs have increased the importance of safeguarding airports around the world and further highlighted the need for accurate, reliable and smart security systems to protect aviation assets.

Cash in Hand

Cash in Hand

If your bank, credit union or non-bank organization operates ATMs in remote locations, such as convenience stores or shopping malls, a bank heist that occurred in Japan last year probably caught your attention.

Why Your VMS Matters

As a security professional, how many times have you had to explain why a PTZ camera should always be paired with at least one fixed camera to provide constant “back-up” coverage of everywhere the PTZ is not looking?

Hacked Off

Hacked Off

While our industry is fairly good at anticipating and reacting to new physical security threats, we’ve been very slow to react to the clear and present danger from cybersecurity attacks.

Growing an Idea

I have a great job. I’ve met many wonderful people in the past 20 or so years, and when we started Dealer Strategies, it gave me the opportunity to go one on one with company CEOs and some of their staff.



Turn to New Profits

As a security integrator, you’re used to having a predictable revenue model selling security hardware and software to end users.

A Demand in Turnstiles

Why the recent increase in turnstile demand? Some of the reasons are the aging post-9/11 turnstile systems (15+ years), concerns over violence and terrorism, and tenants’ expectation of secure entrances in property management buildings.

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.