Top News


On a Clear Path

Today, there are countless manufacturers that claim to have a clear migration path toward an open architecture platform; however, there is simply no clear path that applies to all applications.

Pros and Cons of Barriers

When specifying the vehicle access control system needed to stop a truck-bomber, errant driver or vehicle that is not authorized to enter your facility, you have to decide among bollards, barriers or barricades.

What Makes a Leader?

Many companies meet expectations; some even exceed them, while companies that lead the way redefines them. This is a way of measuring leadership that can be overlooked by market reports that rank companies by revenue.

How Trained is Your Front Line

How much does your wire/cable puller know about what he/she is doing? In most cases, the answer is “not much”. Their job is to literally pull wires through ceilings or conduit under a supervisor’s immediate control.

Opening the Door to a Secure Future

When Clay Platte Family Medicine Clinic looked to upgrade their lock-and-key door controls, they turned to an IP-based access control system from Axis Communications to address these competing demands.

Making the Case

When budgets are tight, everyone in the organization gets more strategic in order to make the case for their share of the company’s resources.

Creating a One-Stop Security Shop

Paul Accardo, the manager of marketing communications at LiftMaster, discusses the company’s newest app technologies, as well as the future of home connectivity and app integration.

The Largest Mass Transit Deployment

Helping the Chicago Transit Authority (CTA) reduce violent crime and robberies by up to 35 percent was a mission Sentry 360 relished. Providing their Ultra HD surveillance cameras and systems, the Plainfield, Ill., camera manufacturer was involved in the largest 360-degree install in mass transit history.



Security in All Forms

We have learned via the news recently that security comes in many forms and fashions; included are risk management and contingency planning.

Leverage Home Automation

The connected home is emerging as an exploding market sector for security dealers and integrators. In simple terms, a connected home connects smart devices, lights, thermostats and appliances, links them together, and controls them with centralized interfaces.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.