Mobile Security


Guardly Enterprise E911 Solution Improves Active Shooter Response

New indoor positioning systems enhance ability for security teams to detect shooters earlier and locate people inside buildings.

mPERS Mobile App Trio Introduced by SmartTek Systems Provides Dealers with a Competitive Edge

Central station-based Smartphone apps that provide anywhere, anytime life protection services and new revenue stream for partners.

Do Not Post Pictures of Your Completed Ballot on Social Media

Do Not Post Pictures of Your Completed Ballot on Social Media

Steep fines are being issued and some are having their votes invalidated.

Using Bluetooth-enabled Devices as the Key to Remote Monitoring

As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security.

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

The ruling doesn’t allow police to unlock phones using passcodes, however.

Twist Mobile Access Adoption Growing

Twist Mobile Access Adoption Growing

Smartphones expected to replace mechanical keys and physical access cards making user experience, value and new gestures a must.

BadUSB is Haunting Cyber Space

The ABC’s of Cyber Security

It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.

BadUSB is Haunting Cyber Space

BadUSB is Haunting Cyber Space

Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!



Honeywell Total Connect Remote Services Enhanced

Helps security dealers boost RMR and reach new markets while expanding connected home and business offerings with GPS vehicle and asset tracking.

HTC Announces $199 RE Camera

HTC Announces $199 RE Camera

The camera includes a 16MP sensor but lacks a viewfinder

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program

Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

Apple Adds Additional Layer of Security to iCloud

Apple Adds Additional Layer of Security to iCloud

Three things you can do to better protect the data on your cloud.

Are DIY Home Security Cameras the Wave of the Future?

Are DIY Home Security Cameras the Wave of the Future?

A group of cheap cameras turns your home into a do-it-yourself security system

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

Allows users to view and capture live video and still images as well as download existing files directly.

IC Realtime Launches Open Platform 720-degree Surveillance Camera Software

Presently available as a free App at iTunes.com, this special hardware-agnostic software enhances the user-experience of any 180- and 360-degree analog, IP or Megapixel surveillance camera by completely immersing the viewer into the center of the action.

Symantec Combines Nine Norton Products to Create One Service

Symantec Combines Nine Norton Products to Create One Service

The product can be used on Windows, OS X, Android, and iOS

ADT to Offer New Remote and Mobile Products

ADT to Offer New Remote and Mobile Products

The home security company begins its movement into home-control products.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3