Top Stories


Galaxy Control Systems Demonstrates Advanced Capabilities of System Galaxy Software at ISC West

Galaxy Control Systems, a leading provider of integrated access control and security solutions, is highlighting the many advanced features of its popular System Galaxy Software here at ISC West

Starting the Stroll

Today begins my stroll from booth to booth at ISC West. Truly, it is a gallop so I won't miss products that I have committed to view. Funny part about these tradeshows, there are some who call a week before the show wanting some booth time. Good idea, but not going to happen.

SRI Identity Introduces IOM Access Control Tablet to Converge Enterprise Security and Operations

SRI Identity, a line of business of SRI International, today introduced its IOM Access Control Tablet for mainstream access control applications.

WavestoreUSA Announces Technology Partnership with Blackbox USA covering Enhanced Evidence Protection

WavestoreUSA announces a technology partnership with Blackbox USA, which will be showcased during the 2016 ISC West Conference and Expo, April 6-8, at the Sands Expo Center in Las Vegas, NV.

Monitronics Offers ISC West Attendees Valuable Signing Package

Monitronics today announced a one-time signing package offered to dealers at ISC West that is valued at more than $10,000. This unique opportunity will give dealers the flexibility to focus their efforts on attaining new customers while utilizing Monitronics' established sales and marketing programs.

Quantum Secure Places Focus on Visitor Experience at ISC West 2016

Quantum Secure, part of HID Global, a worldwide leader in secure identity solutions, is addressing prevalent identity and visitor management trends here at ISC West. Centered around the industry-leading SAFE Security Software, the exhibit features innovative solutions for visitor management along with mobile/IoT applications, analytics and enhancing the user experience.

The Biggest Data Leak in History

The Biggest Data Leak in History

The Panama Papers, recently leaked by an anonymous source, is the biggest data breach in history.

Schedule In these ISC West Events

We all know that ISC West is busy, busy so make sure you keep some time open in your schedule to hit these top events.



IoT At ISC

IoT At ISC

There going to be a ton of new products at this year’s ISC West show, especially internet driven devices.

Locked Down: Municipal Public Safety Departments See Benefits in Kinetic Mesh Wireless Networks

Kinetic Mesh’s secure, mobile network can aid law enforcement, surveillance efforts

Schools Must Be Vigilant in April

Schools Must Be Vigilant in April

Sensationalism drives increased risk of copycats

Trooper, Gunman Dead in Virginia Greyhound Shooting

Trooper, Gunman Dead in Virginia Greyhound Shooting

A Virginia Trooper was shot and killed in an incident at a Richmond Greyhound Station.

Simplify the Complexity

Customers looking to invest in a network- based physical security system have many more options than the traditional analog world used to provide.

Going Behind the Scene

Passenger security can be a nightmare (Orlando, for example), but it’s nothing like the adventure your luggage will experience. In Quebec, luggage moves through six layers of security. One of the steps, if necessary, will be a manual search.

Next Big Challenge

Next Big Challenge

Yes, the world has changed a lot over the last five years and now we’re facing the next big challenge: the Internet of Things (IoT), and how to get it right.

Launching Security into the Cyber World

Putting the cyber security world into perspective, and in tandem with the physical security side, takes a little know-how, elbow grease and brain power.

Data Tells All

Data Tells All

The public has spoken. It is clear as day. Mobile is winning. People are increasingly using on-the-go applications in their everyday lives.

Always Room for a Consultant

Always Room for a Consultant

In the security industry, a completed camera installation, active access control platform, and all its moving parts are nothing short of a work of art.

Following the Code

Following the Code

There are seven basic code categories for electrified hardware used to control access or egress, and each has seen recent code changes.

Dovetailing Cybersecurity into an IoT World

Dovetailing Cybersecurity into an IoT World

When it comes to cybersecurity the world falls into two camps: those focused on securing their hardware and applications as a closed system, and those who recognize that converging technologies calls for a more ecosystem-centric approach.

Growing To New Heights

Growing To New Heights

Business is booming in higher education, and campuses all around the country are stepping up to the challenge to enhance security.

Coming of Age

Law enforcement, homeland security, surveillance, emergency response and military operations may span a range of operations, but they all share a crucial need for a detailed, real-time picture of rapidly changing events from various field locations.

Protecting Client Assets

Protecting Client Assets

TelX helps companies build more agile businesses faster with reduced infrastructure complexity and broader reach to new markets.

360-Degrees of Security

360-Degrees of Security

As a camera views and records in 360 degrees, a circular, distorted image is produced, making it essential to process the image so that the human eye can comprehend the image easily.

Lockdown!

Lockdown!

Wireless locks are increasingly becoming the solution of choice in commercial facilities worldwide.

Unique Challenges

Unique Challenges

With almost 33,000 students and just under 5,000 academic and administrative staff, BYU takes its responsibility to provide a secure environment for students, staff and visitors very seriously.

Organizing a Team

Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.

Holding an Open Door

A top tier university serving more than 40,000 students needed a cost effective way to improve the level of security at its non-card access controlled doors.

Smarter Surveillance

Smarter Surveillance

School surveillance continues to be one of the most important markets for video surveillance, And with good reason.

Protecting the Goods

You already know you’re going to put some of that expensive security equipment outside in the elements. You also know how brutal the elements can be on sophisticated electronic solutions.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities