Top Stories


The New Normal

The New Normal

We live in a very different world today—one of risks and fast changes—and looking ahead, such changes and risks will only continue. I call it “the new normal,” since this is expected to be the basis going forward.

Reaching out with a higher level of video storage and management

A New World of Information

We live in a world full of information as data is being collected each day because the demand is higher than ever before. Consumers want faster access to online data to make quicker, more informed decisions regarding everything from nearby restaurants to the highest-rated tablets.

Preventing Abductions

Preventing Abductions

On March 10, 2007, three-day-old Mychael Darthard-Dawodu disappeared from her mother’s hospital room in the maternity ward of Covenant Medical Center in Lubbock, Texas. Even though the infant had been fitted with a state-of-the-art security bracelet around her ankle, the woman who abducted her simply snipped through the device and carried the five-pound bundle-of-joy out of the facility in her purse.

Why Audio? Why Not?

Why Audio? Why Not?

It’s 2014 and time for a new way of thinking when it comes to security. It’s kind of like our five senses; we have each one for a reason, and they are all equally valuable.

Reimagining Strategies

Reimagining Strategies

Security is no longer chained to a desktop, and breaking these chains has changed the face of remote monitoring. It used to be that remote monitoring meant keeping an eye on things from a central station, like a corporate security command center or even a thirdparty monitoring service.

In Clear View

In Clear View

High definition and megapixel cameras play an important role in video surveillance applications. They can provide images that are more useful, with a higher quality of detail and have wider coverage than standard-resolution cameras.

Take Control of the Wheel

Take Control of the Wheel

With the recent downturn in U.S. automotive sales, many dealerships were left struggling. There were few options for increasing revenue, and many were forced to cut expenses through employee reductions, cutbacks in marketing and selective pruning of operational services.

LILIN North America Expands Branch Office with Automation Experience Center, LILIN Solution Center

LILIN North America, the US entity of IP video provider Merit LILIN, recently announced its continued expansion in the markets of IP video and automation with the launch of two new demo rooms – the Automation Experience Center (AEC) and the LILIN Solutions Center (LSC). Both new additions to the North American facility are designed to cater to security and automation dealers, serving as prime product displays and training centers.



Parking Facility Locks Down with Integrated Security Management

Based on current statistics, roughly 80% of the criminal acts at shopping centers and business offices occur in the parking lot.

New URC Integration for Full Operation of LILIN IP Cameras

LILIN announces that users of URC's Total Control now have full integration of LILIN's IP Video Cameras.

Milestone Systems Expands Device Support with More than 3,000 Supported Devices

Device Pack 7.2 for Milestone XProtect video management software gives deep driver support.

Washington Family Ranch Extends Campus Reach with Barix IP Paging

Washington Family Ranch Extends Campus Reach with Barix IP Paging

Outreach ministry informs guests and staff with clarity and consistency across multiple zones.

Delta

Delta's New Electrically-Controlled Barrier Receives P1 Rating at ASTM M50 Test Level

With only a 24-inch foundation new Delta HD300 stops 15,000 pound truck at 50 MPH.

The Evolution of Identity Management: What to Expect

The Evolution of Identity Management: What to Expect

Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.

Virginia’s Quik-E Foods Cuts Losses with March Networks Retail Video Surveillance Solution

Solution integrates high-quality video, audio and transaction data to combat point-of-sale (POS) fraud and other threats to the business.

Profile of a Modern Terrorist

Profile of a Modern Terrorist

Learn what terrorists believe, their goals, timeline and tactics, and last but certainly not least, how to protect ourselves against terrorism.

Allegion Ramps Up K-12 School Security Resources

Allegion Ramps Up K-12 School Security Resources

Training courses, seminars and webinars, face-to-face meetings at events, funding help, new products designed specifically for K-12 applications and free security assessments.

Galaxy S5 Adds Biometrics to Increase Security

Galaxy S5 Adds Biometrics to Increase Security

Adding to their repertoire of products, the S5 boasts a fingerprint scanner, water and dust resistance and heart rate monitor.

Axis Camera Extension for SketchUp 3D CAD Software

Axis Camera Extension for SketchUp 3D CAD Software

New tool for integrators, architects and engineers that helps make designing video surveillance systems easier and more accurate.

2014 Growth in Security Industry Driven by Serving Customers

2014 Growth in Security Industry Driven by Serving Customers' Needs

Financial results for the major manufacturers of security products in the last quarter of 2013 and first quarter of 2014 show a steady growth in revenues and profitability. There is also confidence to forecast that this trend will continue for the rest of

Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.

Retail Exit Challenges

Many retail establishments and fast-food restaurants understand the concept of placing height strip stickers on their exit door jambs to more accurately describe the height of an individual committing a crime or robbery as they quickly exit the store. However, the ability to obtain a useful facial image as they exit a retail store or bank is a challenge.

ITIC and KnowBe4 Latest Study Reveals Companies Lack BYOD Security

ITIC and KnowBe4 Latest Study Reveals Companies Lack BYOD Security

New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.

Geutebruck Continuity and Compatibility at L’Oréal

Geutebruck Continuity and Compatibility at L’Oréal

Geutebruck products still compatible with earlier analog systems, saving much of the company's existing infrastructure.

Honeywell Adds Hybrid Technology to MAXPRO NVR Portfolio

Honeywell Adds Hybrid Technology to MAXPRO NVR Portfolio

MAXPRO hybrid NVRs and HVE encoders allow security pros to transition customers from analog to HD IP video.

CyberLock Offers Wide Variety of Electronic Cabinet Locks

CyberLock Offers Wide Variety of Electronic Cabinet Locks

Retrofits into standard cam lock openings and installed without power or wiring.

Body Odor Biometrics for Identity Verification

Body Odor Biometrics for Identity Verification

Hey, what's that smell? Oh, that's just Bob strolling through the entry point.

Colin L. Powell to Keynote ASIS 2014 in Atlanta

Colin L. Powell to Keynote ASIS 2014 in Atlanta

Former Secretary of State to share leadership insights gained over the course of 50 years in public service.

Wearables Startup Cuff Incorporates Security with Jewelry

Wearables Startup Cuff Incorporates Security with Jewelry

Fashion and security collide to bring a new line of wearables to the market for personal safety.

Bitcoin ATMs Launching This Month in the US

Bitcoin ATMs Launching This Month in the US

Is your city one of the first in America to host a Bitcoin ATM?

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.