Utilities


The ABCs of Key Control

In developing a comprehensive physical security strategy, it’s important to include a key control plan as part of the overall security package. Key management systems can reinforce access control policies that are already in place and can also help to reduce the costs that are associated with lost keys or unmanaged access. It’s also important to know that it is never too late -- or too early -- to implement a key control and management plan as part of an overall physical security strategy. And if you’re not sure about how to proceed, the following three questions may provide the answers for you.

Department of Homeland Security to Test U.S. Bridges for Vulnerability

The Department of Homeland Security’s Science and Technology Directorate (S&T) has joined forces with the Federal Highway Administration and the U.S. Army Corps of Engineers Engineer Research and Development Center to conduct series of experiments that assess potential vulnerability of critical structural components of aging steel bridges.

Analysis of 15 Failed Terrorist Plots Against Surface Transportation Provides Insight into Tactics, Weapons

The Mineta Transportation Institute has released its newest research report, Carnage Interrupted: An Analysis of Fifteen Terrorist Plots Against Public Surface Transportation, which examines several factors in 13 plots that authorities uncovered and foiled before attacks could be carried out.

Denver Transportation District Expanding Video Security

NICE recently announced that the Denver Regional Transportation District (RTD), the public transit system for greater metro Denver, is expanding its implementation of NICE video security solutions to the West Rail Line, Union Station and the Denver Civic Center.

SIA, AAPA Urge DHS to Reconsider Port Allocations

Today, the Security Industry Association (SIA), along with the American Association of Port Authorities (AAPA), sent a letter to Department of Homeland Security (DHS) Secretary Janet Napolitano. In the letter, the organizations urge the secretary to reconsider grant allocations assigned to the Fiscal Year 2012 Port Security Grant Program, or to offer waivers on cost share agreements of previously awarded grants.

Eyes Wide Open

The Port of Portland services more than 800 vessel calls each year, accounting for more than 14 million tons of ocean-going cargo.

First Receivers Staying on Top of Their Game

There are first responders, of course, those who arrive first on the scene of an incident and who play a critical role in emergencies involving injuries and casualties, but, there are also first receivers who primarily operate in hospitals. These professionals are increasingly expected to be well versed in other public safety domains in preparation for disastrous events.

Security in the Fastlane

Security in the Fast Lane

Globally, the growing dependence on transportation networks has made transportation infrastructure among the most important assets to protect.



Chopper Control

Chopper Control

Helicopter emergency safety decisions are separate from medical decisions. Helicopter personnel need to be armed with the latest navigation tools to ensure safety for all onboard, especially when a matter of minutes can mean the difference between life and death.

AS&E Receives $34.9 Million Order for Z Portal Screening Systems

Z Portal vehicle screening systems will be deployed on multiple border crossings.

Smiths Detection Joins New Coalition of Security Manufacturing Companies

The coalition will serve as a unified voice on issues relating to security technology.

Amtrak Security Beefed Up for 9/11 Anniversary

More screenings of passengers and baggage, increased use of K-9 explosives detection teams, and expanded police patrols are being used across the country.

TWIC Affects Ports

The Maritime Transportation Security Act of 2002 required the Department of Homeland Security to secure America’s ports by implementing regulations that prevents most individuals from having unescorted access to secure facilities and vessels. The law mandates that all individuals who qualify for unescorted access receive a biometric credential to show proof of identification. Born from this directive was the Transportation Workers Identity Credential (TWIC), issued to individuals who meet the eligibility requirements.

Survey: Only Half Americans Feel Safer Today, 10 Years After 9/11

Federal Signal Corp., a designer and manufacturer of public safety communications equipment and systems, recently announced the results of its 2011 survey regarding Americans’ public safety concerns ten years after 9/11.

Smart EV Charging Will Require Utilities to Invest in Cybersecurity Systems

A report forecasts that the EV cybersecurity market will increase from just $26 million in 2011 to $144 million by 2015, with a cumulative investment of $432 million during that period.

Security Products 2011 New Product of the Year Award Winners Announced

The Security Products New Product of the Year Award honors the outstanding product development achievements of security equipment manufacturers whose products are considered to be particularly noteworthy in their ability to improve security.

Canadian Air Transport Security Authority Selects G4S to Provide Airport Screening Services

G4S Secure Solutions will provide services at 20 airports, including Vancouver International Airport.

New York MTA Selects VeriFone TransitPAY for Bus Tracking Solution

The Metropolitan Transportation Authority (MTA) awarded a four-year, $6.9 million contract to VeriFone Systems, Inc., for delivery, installation, and warranty and maintenance services for 1,000 TransitPAY systems to provide real-time bus information to customers on Staten Island buses.

SightLogix Names Fiber Networks as Manufacturer's Representative

The rep firm will expand market for outdoor video analytic systems in the New York area.

Giving DHS a Crystal Ball

Researchers at Wake Forest University are studying certain types of crystals, called scintillators, that can detect and differentiate between different types of radiation. They hope to use their findings to better screen cargo and people entering the country, as well as nuclear plants.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”