Top Stories


Coming of Age

Law enforcement, homeland security, surveillance, emergency response and military operations may span a range of operations, but they all share a crucial need for a detailed, real-time picture of rapidly changing events from various field locations.

Protecting Client Assets

Protecting Client Assets

TelX helps companies build more agile businesses faster with reduced infrastructure complexity and broader reach to new markets.

360-Degrees of Security

360-Degrees of Security

As a camera views and records in 360 degrees, a circular, distorted image is produced, making it essential to process the image so that the human eye can comprehend the image easily.

Organizing a Team

Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.

Covering All Bases

As any security dealer or integrator knows, there are two revenue results of making an access control sale: the proceeds from the original sale itself and the potential recurring revenue that can be wrought from the sale down the road.

Simplify the Complexity

Customers looking to invest in a network- based physical security system have many more options than the traditional analog world used to provide.

Next Big Challenge

Next Big Challenge

Yes, the world has changed a lot over the last five years and now we’re facing the next big challenge: the Internet of Things (IoT), and how to get it right.

Data Tells All

Data Tells All

The public has spoken. It is clear as day. Mobile is winning. People are increasingly using on-the-go applications in their everyday lives.



Always Room for a Consultant

Always Room for a Consultant

In the security industry, a completed camera installation, active access control platform, and all its moving parts are nothing short of a work of art.

Growing To New Heights

Growing To New Heights

Business is booming in higher education, and campuses all around the country are stepping up to the challenge to enhance security.

Lockdown!

Lockdown!

Wireless locks are increasingly becoming the solution of choice in commercial facilities worldwide.

Unique Challenges

Unique Challenges

With almost 33,000 students and just under 5,000 academic and administrative staff, BYU takes its responsibility to provide a secure environment for students, staff and visitors very seriously.

Holding an Open Door

A top tier university serving more than 40,000 students needed a cost effective way to improve the level of security at its non-card access controlled doors.

Smarter Surveillance

Smarter Surveillance

School surveillance continues to be one of the most important markets for video surveillance, And with good reason.

Protecting the Goods

You already know you’re going to put some of that expensive security equipment outside in the elements. You also know how brutal the elements can be on sophisticated electronic solutions.

Napco StarLink™ Communications Solutions Expanded

Providing Even More Dealers, More Features & Cost-Savings

Hikvision Supports STEM Education with Donation to Citizen Schools

Hikvision Supports STEM Education with Donation to Citizen Schools

Citizen Schools mobilizes teams of educators and volunteers to lead real-world learning projects and provide academic support, helping students discover and achieve their dreams.

FBI Drops Apple Case, Helps Unlock Other iPhones

FBI Drops Apple Case, Helps Unlock Other iPhones

After the FBI was successfully able to use a third party source to extract the data from the San Bernardino attack’s phone, they are now offering to help in other cases.

Konica Minolta Acquires MOBOTIX

Konica Minolta Acquires MOBOTIX

Konica Minolta has entered into a share transfer agreement with MOBOTIX.

Secret Service Bans Guns at Republican Convention

Secret Service Bans Guns at Republican Convention

Guns will not be allowed into the Republican convention in July despite the ideals of those attending.

Vanderbilt Bolsters Executive Team with Strategic Hires

Vanderbilt has made a number of hires for its global executive leadership team

The Slow Adoption of the EMV Chip

The Slow Adoption of the EMV Chip

While banks have been in compliance with the new standardized EMV chip in debit and credit cards, retailers and consumers just don’t care.

EgyptAir Plane Hijacking: All Passengers Freed Without Injury

EgyptAir Plane Hijacking: All Passengers Freed Without Injury

A hijacker attempted to take control of an EgyptAir plane on its way to Cairo.

Bosch Highlights Integration and Intelligence at ISC West

Delivers new offerings to help dealers achieve growth.

PSA-TEC @ ISC Tackles Video Analytics, IT Skills, and other Hot Topics

While ISC West doesn't step into high gear until next Wednesday, April 6 with the opening of the exhibit hall, the actual conference starts the day before with a number of interesting and unique educational sessions.

Shooting at the Capitol: Suspect in Custody

Shooting at the Capitol: Suspect in Custody

A shooting occurred in the Capitol Visitor Center March 28.

Top 10 Companies to View at ISC West

ISC West is almost here; check out the most talked about booths on the show floor.

Words from the Wise

I’ll be heading to my first ISC West, so I thought I’d clue you in on all the things I’ve been told to prepare for at ISC West 2016.

ISC Events Expands Security Portfolio with Launch of Connected Security Expo

Bridges IT Security and Physical Security in support of IoT

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.