Top News


ASIS 2014: Parting is Such Sweet Sorrow

With sore muscles in my shoulders, legs and feet, ASIS 2014 is complete. I'm back home in Texas now, with many innovative thoughts about the security industry and good memories to boot.

Mixed Reviews

ASIS 2014 is all said and done. It seems to me many of the exhibitors had some great new technology to share with attendees. I saw a number of products that will make a different in the industry for some time to come.

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

The man was a security contractor with three prior convictions for assault and battery.

Security Within Reach

Since the aftermath of 9/11, the United States has intensified transportation security efforts across the board. For most of us, stronger security measures have been focused at the nation’s airports, where travelers are subject to more stringent screening protocols.

The Quicker Things Change, the More They Stay the Same

One of the perks of my job is the opportunity to travel around the country and visit various product manufacturers. Not long ago, I took a swing through Southern California with an itinerary of visiting seven or eight companies.

The Truth about Biometric Exit

How can the United States ensure that the millions of visitors who travel to this country with a temporary visa uphold their agreement to leave before it expires, while also enhancing convenience for travelers? Biometrics technology holds the answer. In fact, this technology dramatically lowered cost estimates for U.S. airport exit control systems from $6 to $3 billion in 2008 to $1 billion today.

Leveraging IT for Access Control

Trying to navigate through the numerous security regulations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals.

Cutting-edge Surveillance

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur.



Providing Efficient Technologies

By now, most security professionals are familiar with the two types of wireless that have been used in access control implementations for the last decade or so.

A Great End to a Busy Day at ASIS 2014

For those of you who know me, I'm a foodie at heart! I love experiencing new flavors and flavor combinations, but the magical component of sharing a meal with someone is how food brings people together, whether they naturally mesh or not. Sharing food with people has a way of breaking down barriers and allowing people to just be themselves in conversation and human togetherness.

Featured

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

  • Why the Future of Video Security Is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reasons. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities