Critical Infrastructure


A Tale of Three Cities

Salvaging the existing investment in coax cabling is often the number-one reason surveillance users are reluctant to switch to network video. The perceived cost of storage is a close second.

New Index Ranks Ability of G20 Nations to Withstand Cyber Attacks, Harness Digital Environment

A benchmark study of 19 of the world’s 20 leading economies found that the United Kingdom and the United States lead Group of 20 (G20) countries in their ability to withstand cyber attacks and to deploy the digital infrastructure necessary for a productive and secure economy. The index also found that several major economies—Argentina, Indonesia, Russia and Saudi Arabia—do not have cybersecurity plans and do not appear to be developing them.

Power to the System

Power to the System

Power supplies are a vital system component but are not always considered to be mission critical. Often situated in a utility area, power supplies are essential to continuous, trouble-free operation.

Powering Your Campus

Powering Your Campus

By the time disaster strikes, it is too late to take many of the important steps to protect a campus. Unfortunately, many educational institutions overlook disaster preparedness planning or simply assume a calamity won’t happen on their campus.

Symantec: Global Critical Infrastructure Providers Less Aware and Engaged in Government Programs

Critical infrastructure providers come from industries that are of such importance that if their cyber networks were successfully attacked and disabled, it would result in an actual threat to national security.

Achieving Integrated Security Excellence

Achieving Integrated Security Excellence

With the number of IT devices used in businesses today growing rapidly, organizations are seeking solutions that not only reduce risk and secure property and staff, but also offer IT and security convergence for maximum protection of people and property across buildings systems.

Lets Work Together

Let's Work Together

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.

Finding Financing

Finding Financing

Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.



Securing Products on the Go

Securing Products on the Go

Distributors worldwide are increasingly challenged with enhancing the effectiveness of their operations. In an industry characterized by high turnover, strict regulations, slim margins and tenuous customer loyalty, retail distributors need to make smarter decisions and manage their businesses more effectively.

Tale from the Dark Side

Tale from the Dark Side

In this autumnal month of witchery, trickery, and general tom-ghoulery, there comes a Halloween-worthy tale disturbing enough to haunt the mind of any business owner or information technology professional.

PureTech Systems Offers Internship Program for Students

The internship program for Arizona college students is entering its third term.

Ethernet Direct to Donate Percentage of Profits to Twin Towers Orphan Fund

Five percent of all gross profit made in the month of September will be donated to the Twin Towers Orphan Fund.

On The Cyberwar Path

On the Cyberwar Path

If, like me, you’re geeky enough to still recall certain scenes from 1983’s “WarGames” (and right now I can still pretty clearly see Barry Corbin as the general saying to Dabney Coleman’s character, “After very careful consideration, sir, I’ve come to the conclusion that your new defense system sucks”), then the news permeating the summer about the Pentagon publishing (in part) its first formal cyberwar strategy probably was no big surprise. In fact, the only eye-opening part might have been that prior to this summer it didn’t already have one.

WAGO Names 2010 National and Regional Distributors of the Year

WAGO Corp. has named long-time distributors, Heilind Electronics and B.W. Clark Inc. the 2010 National Distributor and Regional Distributors of the Year.

Massachusetts Sheriff's Department Deploys COLDSTORE Surveillance Storage System

After a lengthy search and the evaluation of multiple potential storage solutions, the Worcester Sheriff's Department has chosen Veracity's COLDSTORE as the surveillance storage system for a new 300+ camera project. COLDSTORE will be used to provide over 500TB of storage in conjunction with Genetec's Security Center 5.0 Unified Security Platform.

clouDevice VDI Thin Clients Receive Citrix Ready Verification

Interphase Corp. recently announced that clouDevice VDI (virtual desktop infrastructure) thin client devices have received Citrix Ready verification for Citrix XenDesktop.

USFA Releases University Housing Fires Report

FEMA’s United States Fire Administration (USFA) has issued a special report focusing on the causes and characteristics of fires in college and university residential buildings that include dormitories and fraternity and sorority houses.

SightLogix Names Dollacker & Associates as Manufacturer's Rep

The systems expert will represent SightLogix outdoor video solutions in the south central U.S.

Boston Hynes Convention Center Up to Code with Community R-Series

John B. Hynes Veterans Memorial Convention Center is one of three convention centers in Boston, located in the city's historic center.

4D Security Solutions Expands Urban Management Capabilities

The company, in partnership with Microsoft, improves the safety and efficiency of cities and municipalities with its new capabilities.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.