Top News


Cyber Hygiene: What it Looks Like for IoT Devices

Cyber Hygiene: What it Looks Like for IoT Devices

For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices.

Accelerating Security Modernization

Accelerating Security Modernization

In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes.

Securitas Technology Launches as Powerhouse Security Companies Unite Under New Name

Securitas Technology has officially launched, bringing together two of the leaders in electronic security: Securitas Electronic Security and STANLEY Security.

Rep Firm LRG, inc Announces Ownership Change

Electronic Security Factory Rep Firm LRG, inc has announced that effective March 13 that company veterans John Swinford and Kenny Hilton have purchased the organization from Chris Lanier.

Survey: Energy Security is Most Exciting Area of IoT Technology Development

Energy security tops the list of the ‘most exciting’ areas of smart utility development, ahead of climate-related and disaster management technologies.

Optiv Doubles Federal Presence with ClearShark Acquisition

Optiv, the cyber advisory and solutions leader, today announced it has acquired Maryland-based ClearShark LLC and ClearShark Services Inc. (collectively ClearShark), a premier advisor and top value-added reseller of cybersecurity and modernization technology to the federal government.

Allied Universal Acquires Landmark Event Staffing Services

Allied Universal® has announced the acquisition of Landmark Event Staffing Services, a comprehensive event security and guest services company supporting a wide range of venue and event clients nationally.

A Comprehensive Nationwide Solution

A Comprehensive Nationwide Solution

Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed.



Stop that Vehicle

Stop that Vehicle

A wayward driver. A medical emergency. Maybe someone who wants to inflict harm. These are all examples of a vehicle jumping on a sidewalk and causing injuries to pedestrians and workers. It is impossible to foresee every potential scenario where this might happen but the one solution that can stop the vehicle from doing damage are crash-rated bollards, with an emphasis on “crash rated.”

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

The world has seen a significant increase in cyber-attacks aimed at critical infrastructure and security products in the last few years, with Industrial Internet of Things (IIoT) devices such as security cameras, becoming prime targets for hackers.

Featured

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3