Top News


Cyber Hygiene: What it Looks Like for IoT Devices

Cyber Hygiene: What it Looks Like for IoT Devices

For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices.

Accelerating Security Modernization

Accelerating Security Modernization

In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes.

Securitas Technology Launches as Powerhouse Security Companies Unite Under New Name

Securitas Technology has officially launched, bringing together two of the leaders in electronic security: Securitas Electronic Security and STANLEY Security.

Rep Firm LRG, inc Announces Ownership Change

Electronic Security Factory Rep Firm LRG, inc has announced that effective March 13 that company veterans John Swinford and Kenny Hilton have purchased the organization from Chris Lanier.

Survey: Energy Security is Most Exciting Area of IoT Technology Development

Energy security tops the list of the ‘most exciting’ areas of smart utility development, ahead of climate-related and disaster management technologies.

Optiv Doubles Federal Presence with ClearShark Acquisition

Optiv, the cyber advisory and solutions leader, today announced it has acquired Maryland-based ClearShark LLC and ClearShark Services Inc. (collectively ClearShark), a premier advisor and top value-added reseller of cybersecurity and modernization technology to the federal government.

Allied Universal Acquires Landmark Event Staffing Services

Allied Universal® has announced the acquisition of Landmark Event Staffing Services, a comprehensive event security and guest services company supporting a wide range of venue and event clients nationally.

A Comprehensive Nationwide Solution

A Comprehensive Nationwide Solution

Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed.



Stop that Vehicle

Stop that Vehicle

A wayward driver. A medical emergency. Maybe someone who wants to inflict harm. These are all examples of a vehicle jumping on a sidewalk and causing injuries to pedestrians and workers. It is impossible to foresee every potential scenario where this might happen but the one solution that can stop the vehicle from doing damage are crash-rated bollards, with an emphasis on “crash rated.”

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

The world has seen a significant increase in cyber-attacks aimed at critical infrastructure and security products in the last few years, with Industrial Internet of Things (IIoT) devices such as security cameras, becoming prime targets for hackers.

Featured

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3