Top Stories


Windstorm Solutions for Hurricanes and Tornadoes

When it comes to windstorm solutions, it’s all code-driven as door, lock and hardware chosen for an opening are determined by hurricane or tornado codes. The challenge comes with knowing which codes apply.

Standardizing as a Breakthrough

Alcatel-Lucent, a leader in products and innovations in IP and cloud networking as well as ultra-broadband fixed and wireless access, is responsible for countless breakthroughs that have shaped the networking and communications industry.

The Proprietary Trap

The entire computing world at one time was strictly proprietary. In other words, the election to use one piece of software or hardware dictated the requirement to get additional expansion and support from the single provider for the lifetime of that purchase.

When Does Warranty Begin?

Most of us have been at the end of a project when the owner/ client asks the popular question: “When does the one-year warranty begin?” The answer becomes one of the most debated topics, only second to the end-of-project, door-locking hardware debacle.

Enough to Go Around

Some of the most satisfying applications of sophisticated security technologies have little to do with security. Today, biometric identity management plays a critical role in delivering necessary vaccines to children in the developing world.

The ABCs of PoE

With the introduction of IP cameras, system integrators have experienced big improvements in the quality and performance of video systems that can be offered to their customers.

Hot Time in Atlanta

There are a lot of important things about the month of September: School is underway; football has started; and it is time for ASIS.

Protect a Key

When Steven Shaker wants to know who last took a car on his lot out for a demo or wants to see the demo history of a specific vehicle, all he has to do is go to his computer and check the Morse Watchmans KeyPro software for the answer.



The New Landscape

Managing access privileges for visitors, contractors and vendors in hospitals is a significant challenge for healthcare institutions.

Data Breaches: Who’s Ultimately Responsible?

In 0.27 seconds, these were the top headlines that Google pulled from 67,500 results highlighting the latest data breaches around the globe.

The Backbone of Security

Rob Lydic spends a lot of time traveling around the upper Midwest and Northwest, heralding the needs of security, proper equipment and how dealers can make more money in their own businesses.

Picking Up the Pace

Idesco Corp. started in the security business in the early 1940s. They began with ID badging for the Department of the Army. Well, times have changed, a lot, in the past seven or eight decades but one constant is that Idesco is still involved in security.

Enhancing the Customer Experience

Consumers’ expectations about their shopping experience at brickand- mortar, retail stores are changing. Mobile devices allow consumers to find any information they need with just a few clicks of a button, and this sense of immediacy has spread to how they shop.

Google Maps Tracks Your Every Step – But You Can Stop It

Google Maps Tracks Your Every Step – But You Can Stop It

A little-known data collecting process by Google can be switched off.

Honeywell Adds High Definition IP Video Kits to Performance Series Line

Provides security dealers with a hassle-free upgrade to IP video.

Low Frequency Application Guide Now Available from System Sensor

Guide covers waking effectiveness, low frequency requirements, occupancy and building code impact, system applications and more.

ASAP Ready to Expand Beyond Charter Members

Expansion of program supported by demand from New PSAPs on the system.

U.S. Security Associates Welcomes ASIS 2014 to Atlanta

As a Bronze-level sponsor of ASIS 2014 and a long-time exhibitor and supporter of ASIS International, Alton Harvey invites all to visit Booth #1105.

HID Global and Chapman University Collaborate to Develop A Technology Incubation Environment

HID Global participates in program that sets challenge for student entrepreneurs to expand “Internet of Things” opportunities for HID Trusted Tag Services.

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Partnership enables RTTG to bring their Real-Time Verification (RTV) technology platform to state and federal customers.

Fluidmesh Announces the Release of the FM3200

Available in two versions, this radio can be used to create highly customized point-to-point, point-to-multipoint, mesh and mobile networks.

Largest Scottish University Centralizes Security

Milestone-Axis IP video solution from Boston Networks provides control of multiple campus locations.

North Bend Schools Automate Lockdown with Genetec Security Center

Public school district in Nebraska upgrades to IP video surveillance and access control to better protect students.

Action Steps for Parents to Do Today to Protect Student Data

Action Steps for Parents to Do Today to Protect Student Data

These actions will help put you back in control of your child's data.

Local Police Searching Security Cameras for Evidence in Arson of Football Player’s Vehicle

Arkansas quarterback Brandon Allen’s car was burned on Aug. 25

How Schools Use Private Student Data

How Schools Use Private Student Data

Non-educators want access to student data to apply principles of big data analysis to it.

Advantech's 7" Handheld Pocket Pad Brings Full-size Computing to Mobile Healthcare Applications

Designed especially for use in clinical applications such as EMR, BCMA/CLMA, CPOE, PACS and radiology, is an extension of hospital information system (HIS) and is an ideal PDA.

HID Global Brings Intelligence to the Door

EDGE EVO Solo Solution uses a standard web browser, does not require software to be installed on PCs and is ideal for small- and medium-sized businesses managing a single door for ten to hundreds of cardholders.

Quantum Secure Receives Factory Certification under AMAG Technology's Symmetry Program

Designation certifies that SAFE Software Suite Version 4.8 integrates with Symmetry V7.0.1 access control software.

STANLEY Security Launches ELITE Partnership Program for Select Group of Expert Locksmiths

Recognition, rewards and extensive benefits offered to recognize the loyalty and expertise of exceptional locksmiths, installers and technicians.

Featured

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

  • TSA Begins REAL ID Full Enforcement Today

    Today, the Transportation Security Administration (TSA) announced the imminent implementation of its REAL ID enforcement measures at TSA checkpoints nationwide. Read Now

  • Body-Worn Cameras on the Rise

    On the evening of Oct. 29, 2024, the owner of 300 Guard based in Houston, was shot while on duty at a convenience store. He returned fire. He was wearing a plated vest and thankfully recovered in the hospital. Read Now

  • Brazil Port Enhances Surveillance and Supports Wildlife Conservation with Sustainable Technology

    Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritizing sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Read Now

  • Fast-Forward from 1,000 B.C.E. to Today

    The lock and key have been around since time immemorial. In fact, the locksmith profession is one of the oldest in the world when you consider the earliest wooden tumbler lock debuted three-plus millennia ago. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.