Top Stories


CEM Systems Releases Latest Version of AC2000 Security Management System

AC2000 v.7 offers a range of new software features, system integrations and enhanced functionality of emerald, the intelligent access terminal.

Vidsys Innovates Software Platform

Convergence of physical and cybersecurity along with information management solutions.

Genetec Announces Security Center 5.3 at ISC West 2015

Latest release focuses on operator efficiency and collaboration with key updates for investigation, access control, archiving and hardware resource utilization modules.

21 Dead, Almost 600 Held Hostage in Kenya Attack

21 Dead, Almost 600 Held Hostage in Kenya Attack

A terror group known as Al-Shabaab is claiming responsibility for an attack on Garissa University College.

Newly-designed Car Features New Security Feature

Newly-designed Car Features New Security Feature

When alarm triggered, security sensors enable series of photos to be taken.

The Security Concerns in Today

School Security Best Practices: The Security Concerns in Today's Society

Keep campuses safe now while helping to prevent future tragedies.

Open Options and Convergint Technologies Partner in Global Dealer Agreement

Convergint adds Open Options Access Control line to global security integration offerings.

SureView Systems Creates Certified Center Designation for Best-in-class Partners

Allows qualifying partners to identify themselves as having met all requirements to become a Certified Center.



Mission 500 Announces CSR and Humanitarian Award Winners

Charitable organization engages with security professionals to sponsor need children through World Vision Organization.

IDIS To Debut DirectIP to the US Market at ISC West 2015

Brings unparalleled quality, simplicity, and affordability to the marketplace with next generation technologies.

More Than 26,000 Twitter Accounts Linked to ISIS

More Than 26,000 Twitter Accounts Linked to ISIS

A cybersecurity activist developed the roster, but it has flaws.

Quantum Secure Now Part of HID Global

Acquisition complements and extends portfolio while application driven software solution helps customers meet identity management and compliance requirements.

On Cloud 9 - Campuses need effective security equipment

On Cloud 9

Perhaps more than any other time in history, school campuses need effective security equipment and tools not only to ensure the physical safety of students, teachers, staff and administration but also to create a safe environment where effective learning takes place as well as manage expensive assets, such as computer equipment, from theft or damage.

Multiple Options for Demanding Applications

Multiple Options for Demanding Applications

Advances in communication technology are opening doors in the field of access control locks.

Condensation Reduction

When condensation forms inside a security camera, it can blur lenses and compromise image quality. Condensation that remains within the enclosure can also corrode electronics, causing premature failure of the camera.

Hospital Complex Cultivates Healthy Fire Protection

Hospital Complex Cultivates Healthy Fire Protection

A decade ago, St. Peter’s Hospital in Albany, N.Y., started a $259 million campus-wide modernization project.

Peace of Mind

Monitored security hasn’t always been a luxury afforded to every home in North America, but similar to the advancement of telecommunications technology, this one time luxury has now become common place.

All in a Day’s Work

All in a Day’s Work

Many years ago, when I decided to become a journalist, I started cutting my teeth by writing sports. I was pretty young at the time, and I enjoyed a variety of sports. It was a perfect training ground for me.

The Right Recipe

The Right Recipe

If there’s any doubt about the value of live monitoring as part of an effective home security system, consider a self-monitored system that sends an alert only to the homeowner.

Understanding Carbon Monoxide Laws Codes and Standards

Understanding Carbon Monoxide Laws Codes and Standards

In the United States alone, this invisible intruder, carbon monoxide (CO), is responsible for sending thousands of people to the emergency room each year with CO poisoning, some resulting in death.

Time to Take Advantage

Time to Take Advantage

For every organization, one of the first steps in providing safety and security is knowing at all times who is in the building. This is true for protecting people, property, or assets, and whether the building is a business, school, hospital or any other location.

Live Longer

Live Longer

Americans want to be safe and the FCC is helping. The FCC reserves valuable radio frequencies for public safety authorities that can be used for Ultra-Reliable wireless video surveillance.

The Heart of the Campus

With a strong reputation for innovative research addressing complex urban issues, the University of Massachusetts Boston offers its diverse, 17,000-student population both an intimate learning environment and the rich experience of a great American city.

Lockdown Alert

Lockdown Alert

All schools in North Carolina have been mandated to successfully install and deploy a panic- lockdown button that links to law enforcement.

Alarm - Monitoring from the end user perspective

Alarm!

We all look at monitoring from a different perspective. The consultant looks at it from a cost benefit analysis standpoint to represent the client’s best interest.

New Yorkers on the Move

New Yorkers on the Move

Valet Anywhere provides on demand valet services throughout the New York City area for New Yorkers who are on the move. The company provides secure car parking in various NYC parking garages.

Ready, Set, Cable

Ready, Set, Cable

The 2014 TCS New York City Marathon was first held in 1970 by the New York Road Runners Club (NYRR) with just 127 competitors running loops around Central Park.

Selecting a Central Station - Infrastructure is a consideration in making choices

Selecting a Central Station

Independent alarm dealers have much at stake when choosing a central station that will enable them to compete with the industry’s largest companies.

A Taste of Innovation

A Taste of Innovation

After completion of the canning plant, Crider needed an effective way to provide security for its large production and processing facilities.

Surveillance Success

Surveillance Success

Ottawa University, in Ottawa, Kansas, has a rich heritage. Since 1865, the university has educated its students. Many people rely on Ottawa University to help them achieve a lifetime of personal growth and significance.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.