Top News


Redefining the New Normal

Frank DeAngelis has given his all to the students and community of Columbine High School. Now, 14 years after the tragic shooting, DeAngelis is retiring as school principal.

Legend in the Making

Because of the advantages in the transmission of both audio and video data, as well as control signals, IP-based surveillance has caught on in recent years. The data provided can be synthesized into new, custom build-outs that allow the support of HD images, analytics for operational purposes, local or remote video storage, remote control and monitoring.

All About the Customer

Businesses set goals, and employees are involved in meeting those benchmarks, year in and year out. The same is true in the security monitoring business, which translates to complete security for homeowners.

Remote Monitoring of Critical Infrastructure

Remote monitoring of critical infrastructure used to be very difficult, but thanks to available technologies, this task can be achieved with a fraction of the resources required in the past.

Cooling High Crime Hotspots with Mobile Surveillance Technology

Like many small town police departments seeking to maintain neighborhood safety, the Village of Glenwood, Ill., needed to squeeze every ounce of value from its law enforcement tools.

A Unified Hub

Tyco’s Global Accounts Program meets the needs of some of the largest, highprofile, enterprise customers in the world. At the heart of the global account program, Tyco’s Global Center of Excellence (GCoE) provides global program management and programming services for unified security throughout an enterprise.

Making Video Verified Response a Priority

When the owner of a 7,000 sq. ft. RadioShack warehouse in Fort Worth, Texas worried about his space’s security, he decided to install a video-verified alarm system.

Changing Business

Five or six years ago, when PDAs began taking on the characteristics of today’s Blackberries, iPhones and Androids, video surveillance manufacturers rushed to develop mobile capabilities.



Wireless Devices are Everywhere

Wireless devices are everywhere. They are in our homes and offices in the form of mobile smart phones, tablets and personal computers, among other things.

Smart Cards Boost Security

In a bold move to improve security, specifically in student housing, Miami University (MU) in Oxford, Ohio replaced mechanical locks on more than 4,000 residence rooms and installed electronic locks and smart card credentials on others during a 90-day summer break.

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.