Dealers & Integrators


Join the Team

Join the Team

Winning more business is typically thought of as using marketing, advertising, referrals, or even cold calls and precision pitching to secure new opportunities at new clients. When it comes to physical security integration, there are after all, only so many doors to secure in your area of operation.

The Evolution of a Standard

Like many other standards, ONVIF has evolved incrementally and its development, use and acceptance have as well. The journey ONVIF is on is actually quite typical for a standards organization.

Case Study: Everett Public School System Chooses Hanwha Techwin Cameras

Case Study: Everett Public School System Chooses Hanwha Techwin Cameras

The information technology department of the Everett Public School district was asked to design a modern security system that would serve the district’s current needs, be cost effective and handle future expansion.

Technology at the Door

Advancements in emerging technologies require leadership, critical thought about the future, and a willingness to take risks. Stretching oneself to integrate with new technologies is critical, of course, but the true promise of innovation is offering new solutions to the market.

Service Driven Security

Service Driven Security

Efficiency is part of Climatec’s DNA—after all, much of their work is in energy and access solutions—but efficiency doesn’t mean taking shortcuts. Climatec believes in client-focused, service-driven work and solutions.

Digital Security in a Zero Trust World

Digital Security in a Zero Trust World

We’re hearing about security breaches every day in the news. From retailers like Target and TJ Maxx, to financial services firms like Equifax and J P Morgan Chase, and government agencies like the Securities & Exchange Commission (SEC), it seems like no organization is safe.

Artificial Intelligence and Drones

I went shopping after Christmas. Right there, on sale, I spotted a drone. I couldn’t take my eyes off of the box and for whatever reason, I felt compelled to buy it.

Instruction vs. Deduction: Deep Learning and Advances in VCA

As camera counts and the data they provide grow ever-larger, it becomes increasingly difficult for organizations to monitor, perform investigations, and draw useful conclusions from the valuable information gathered by their video surveillance infrastructure.



Radical Departure on the Edge

After several business trips to California, I did bump in to something a little radical and most certainly worth a story. The story begins with Steve Reinharz, a man who is living on the leading edge of technology. It is the people, or things that he associates with that brings pause.

A New Kind of Employee

A New Kind of Employee

More than 22 years ago, Steve Reinharz decided he wanted to become part of the security industry. He stepped into his first integration at a local gas station.

What’s Next?

The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.

Poised for Expansion

Poised for Expansion

Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.

Eliminating Fraud

The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.

The Next Evolution

The Next Evolution

It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.

Archiving Security

Archiving Security

The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.

Get Out of Our Space

Get Out of Our Space

Most people, when confronting a drone (Unmanned Air Vehicle/Unmanned Air System) operating in or around their area of responsibility in an unsafe manner, would like to bring it down immediately.

Playing by the Rules, or Metrics

Recurring Monthly Revenue, almost always referred as RMR, is probably the most important metric of any subscription business.

Our Digital Identities

Our Digital Identities

Blockchain, the backbone technology behind Bitcoin, has grown exponentially since its inception in 2008. Since 2013, Google searches of “blockchain” have risen by 1,900 percent.

Getting a Kick out of Security

Getting a Kick out of Security

You’ll get a real kick out of this security story. It is all about a secure perimeter and access control that is stored in the cloud and a man devoted to those around him.

Getting the Most from Camera Analytics Requires the Right VMS

Getting the Most from Camera Analytics Requires the Right VMS

Ideal for customers seeking an easy to use end-to-end video surveillance solution, WAVE is highly customizable and can create tailored network video solutions for any type of project, on any device.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.