Utilities


A Modern Threat

A Modern Threat

Whether it is water, electricity, gas, oil or even telecommunications and transportation hubs, critical infrastructure facilities present unique challenges for security professionals.

Protecting Utilities

Federal, state and local agencies prioritize robust physical security plans for the nation’s electric power utilities. And they should. Any disruption in service from a primary provider could impact millions of people and businesses over a wide swath of the country.

5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

Considerations for Infrastructure

Considerations for Infrastructure

Security is top of mind for consumers around the world and businesses across industries.

power towers

Senate Passes Bill To Explore ‘Analog’ Solutions to Securing America’s Energy Grid

If the Securing Energy Infrastructure Act is signed into law, it will create a working group tasked with isolating the energy grid from attacks using “manual procedures.”

Transforming Security

Transforming Security

Empresa Eléctrica de Guatemala (EEGSA Group) required a video surveillance system that could digitize the security footage on its substations to help avoid damage to its own infrastructure as well as electrocution hazards for people trying to access these places without warning or authorization.

Protecting Our Water Supply

Protecting Our Water Supply

Maintaining the security of our nation’s water supplies is serious business. Attacks from a lone vandal to a team of foreign terrorists could, within hours, result in widespread illness or economic disruption.

The Continuing Evolution of Power and Transmission Solutions

The Continuing Evolution of Power and Transmission Solutions

Thanks to a number of new technology advancements, power supplies and transmission solutions with network management features are a natural progression for ensuring the reliability of today’s IP-based physical security systems.



Turn On The Lights

Turn On The Lights

Most security professionals have acquired important video only to see that the resulting footage is over or under exposed because the camera is unable to adapt to the challenging light environment.

Tornado Tracking

Tornado Tracking

April 28, 2014, stands out in the memory of the residents of northern Mississippi as a violent F4 Tornado left a wake of major damage killing 10 people and injuring more than 80.

Nothing To Mess With

PVSC has a stated mission of enhancing the viability and environmental health and security of 1.4 million residents in 48 municipalities, an important task that requires maximum security and the ability to surveil operations at all times.

Cleveland Prepares for Riots at Republican Convention

Cleveland Prepares for Riots at Republican Convention

Cleveland is spending $20 million in federal money on riot and security gear for the Republican Convention.

One Key Figure Dead in the Arrest of Oregon Protesters

One Key Figure Dead in the Arrest of Oregon Protesters

Protesters who’ve occupied a federal building in Oregon have been arrested.

Partnership Delivers Unique Video Recording and Storage Solution

New Samsung WiseNet Camera App records directly to disk.

This Year’s Hottest Gift Banned from Airlines

This Year's Hottest Gift Banned from Airlines

Nearly every major U.S. carrier won’t let you board with a hoverboard in tow.

Perfect Foresight - Making hazardous chemical safety procedures a priority

Perfect Foresight

In the weeks following the massive explosion at a warehouse owned by Ruihai International Logistics in the Chinese port of Tianjin, investigators are getting a better idea of what led to the disaster that killed 173 people—104 of whom were firefighters—and injured hundreds more.

Managing Risks - Security efforts are now defined to protect critical infrastructure

Managing Risks

Traditionally, electrical substation security was aimed only at preventing access to stop vandalism and improve safety. Today, however, security efforts have been redefined to address new threats in order to protect critical infrastructure.

STANLEY Security and I-View Announce Partnership

STANLEY Security and I-View announce their partnership for live, actionable verified alarm response system.

Sound the Alarm

Sound the Alarm

To support safety and notify personnel in the case of an emergency, Peru LNG’s needed a general alarm and mass notification system (MNS).

Trusted Resources Promote Safe, Secure Environments

Online Exclusive: Trusted Resources Promote Safe, Secure Environments

Mitigate insider threat and improve perimeter security and personnel assurance to ensure only trusted resources have access.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3