Critical Infrastructure


A Tale of Three Cities

Salvaging the existing investment in coax cabling is often the number-one reason surveillance users are reluctant to switch to network video. The perceived cost of storage is a close second.

New Index Ranks Ability of G20 Nations to Withstand Cyber Attacks, Harness Digital Environment

A benchmark study of 19 of the world’s 20 leading economies found that the United Kingdom and the United States lead Group of 20 (G20) countries in their ability to withstand cyber attacks and to deploy the digital infrastructure necessary for a productive and secure economy. The index also found that several major economies—Argentina, Indonesia, Russia and Saudi Arabia—do not have cybersecurity plans and do not appear to be developing them.

Power to the System

Power to the System

Power supplies are a vital system component but are not always considered to be mission critical. Often situated in a utility area, power supplies are essential to continuous, trouble-free operation.

Powering Your Campus

Powering Your Campus

By the time disaster strikes, it is too late to take many of the important steps to protect a campus. Unfortunately, many educational institutions overlook disaster preparedness planning or simply assume a calamity won’t happen on their campus.

Symantec: Global Critical Infrastructure Providers Less Aware and Engaged in Government Programs

Critical infrastructure providers come from industries that are of such importance that if their cyber networks were successfully attacked and disabled, it would result in an actual threat to national security.

Achieving Integrated Security Excellence

Achieving Integrated Security Excellence

With the number of IT devices used in businesses today growing rapidly, organizations are seeking solutions that not only reduce risk and secure property and staff, but also offer IT and security convergence for maximum protection of people and property across buildings systems.

Lets Work Together

Let's Work Together

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.

Finding Financing

Finding Financing

Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.



Securing Products on the Go

Securing Products on the Go

Distributors worldwide are increasingly challenged with enhancing the effectiveness of their operations. In an industry characterized by high turnover, strict regulations, slim margins and tenuous customer loyalty, retail distributors need to make smarter decisions and manage their businesses more effectively.

Tale from the Dark Side

Tale from the Dark Side

In this autumnal month of witchery, trickery, and general tom-ghoulery, there comes a Halloween-worthy tale disturbing enough to haunt the mind of any business owner or information technology professional.

PureTech Systems Offers Internship Program for Students

The internship program for Arizona college students is entering its third term.

Ethernet Direct to Donate Percentage of Profits to Twin Towers Orphan Fund

Five percent of all gross profit made in the month of September will be donated to the Twin Towers Orphan Fund.

On The Cyberwar Path

On the Cyberwar Path

If, like me, you’re geeky enough to still recall certain scenes from 1983’s “WarGames” (and right now I can still pretty clearly see Barry Corbin as the general saying to Dabney Coleman’s character, “After very careful consideration, sir, I’ve come to the conclusion that your new defense system sucks”), then the news permeating the summer about the Pentagon publishing (in part) its first formal cyberwar strategy probably was no big surprise. In fact, the only eye-opening part might have been that prior to this summer it didn’t already have one.

WAGO Names 2010 National and Regional Distributors of the Year

WAGO Corp. has named long-time distributors, Heilind Electronics and B.W. Clark Inc. the 2010 National Distributor and Regional Distributors of the Year.

Massachusetts Sheriff's Department Deploys COLDSTORE Surveillance Storage System

After a lengthy search and the evaluation of multiple potential storage solutions, the Worcester Sheriff's Department has chosen Veracity's COLDSTORE as the surveillance storage system for a new 300+ camera project. COLDSTORE will be used to provide over 500TB of storage in conjunction with Genetec's Security Center 5.0 Unified Security Platform.

clouDevice VDI Thin Clients Receive Citrix Ready Verification

Interphase Corp. recently announced that clouDevice VDI (virtual desktop infrastructure) thin client devices have received Citrix Ready verification for Citrix XenDesktop.

USFA Releases University Housing Fires Report

FEMA’s United States Fire Administration (USFA) has issued a special report focusing on the causes and characteristics of fires in college and university residential buildings that include dormitories and fraternity and sorority houses.

SightLogix Names Dollacker & Associates as Manufacturer's Rep

The systems expert will represent SightLogix outdoor video solutions in the south central U.S.

Boston Hynes Convention Center Up to Code with Community R-Series

John B. Hynes Veterans Memorial Convention Center is one of three convention centers in Boston, located in the city's historic center.

4D Security Solutions Expands Urban Management Capabilities

The company, in partnership with Microsoft, improves the safety and efficiency of cities and municipalities with its new capabilities.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.