The remote solar field was pitch black, yet the thermal cameras detected movement by the fence and sent out an alarm. The officer on duty at Campus Safety took one look at the thermal images streaming onto the video monitor and realized the magnitude of the alert.
- By Fredrik Nilsson
- Dec 30, 2013
When Pat Comunale, the president and CEO of independent security distributor Tri-Ed, began forming a relationship with India-based distributor Aditya Infotech, Ltd., it occurred to him that the relationship should be more than just a casual one. The two companies had great conversations regarding current market trends and the future of the industry.
- By Jamie Friedlander
- Dec 30, 2013
IC Realtime is Sailor’s vision that started in 2005, in large part because he didn’t feel the company he was then working for was doing things right. He saw a void in the security industry and felt certain he could fill it.
- By Ralph C. Jensen
- Dec 30, 2013
A comprehensive overview of this year's GovSec West 2013 Conference and Expo provided by the staff at Security Products magazine.
- By Security Products Staff
- Dec 26, 2013
Code Blue Corp. was tabbed by the city of South Haven to install a pair of blue light pedestals, equipped with emergency speakerphones operated by a high-tech software system.
- By Michael Zuidema
- Dec 25, 2013
The good people of Newtown, Conn. have pleaded with the media to stay away during the first year anniversary of the now infamous shooting at the elementary school. Has anything changed so significantly that the national media feels it must descend upon the village and try to cover new ground?
- By Ralph C. Jensen
- Dec 24, 2013
In the American casino industry, the name Boyd Gaming stands out as a model of business efficiency and success.
- By Del V. Salvi
- Dec 23, 2013
Mobile devices and mobile apps have become a fixture in the lives of people around the globe.
Security professionals step up to help make and keep schools and colleges safer.
What to do if you own one of the credit cards that have been accessed without your consent.
- By Ginger Hill
- Dec 19, 2013