Dealers and Integrators


Security Squared

AT the most basic level, there are just two types of security: physical security to protect people and assets, and information security to protect bits and bytes in data systems. And, information security products are generally more intelligent than physical security products.

Opportunity Knocks

THE future is creeping in, and it brings new opportunities for the security installer and dealer alike. Those in the security industry all know of the buzzwords that infest office chatter each day.

A New Deal

RECENTLY, security dealers and integrators in the access control industry have seen a great shake-up. Widespread demand and overall adoption of IP-compatible devices has, in many cases, introduced security dealers to the IT world for the first time.

Backbone for Surveillance

THE Mount Vernon City School District is located in the southeastern corner of Westchester County, N.Y., operating 15 schools with an enrollment of more than 10,000 students.

Security's Iron Hammer

ANALOG video has been replaced by digital technology in many enterprise-level organizations. And analog, being aligned with the VCR era, can be seen as outdated.

Integration Ingenuity

IN a typical IT environment, heterogeneity is the standard -- in server operating systems, in database platforms and in software applications running on those servers.

Forces of Nature

MARCO Island is one of Florida's crowning gulf communities. Known to many as the gateway to Everglades National Park, the coastal town's seasons are marked by the changing faces of its visitors.

Harvesting Energy

THE first security systems used wires and were typically only used for newly constructed buildings. For existing buildings, it is often difficult or too expensive to fish wires through walls.



Ask The Expert

BURGLAR -- or intrusion -- alarms have been around for many years, and they are often overlooked, as excitement focuses on Internet protocol cameras, biometrics, video analytics and other technological marvels becoming part of the security industry.

Sensing a Change

In Sharp Focus

NOT too often does the security industry see new imaging technology -- at least not one that provides system designers, installers and users with a unique feature set that delivers improved efficiency.

Foundation for Success

DORTRONICS' reputation for in-house engineering expertise and production capabilities was recently put to the test while being faced with a situation when a specified switch assembly purchased from another company was not measuring up to Dortronics' standards.

The Right Stuff

WHEN you consider the investment companies have made in analog devices, moving to IP can be a difficult task.

Supermarket Hype

WHEN Carrefour, one of the largest food retailers in the world, expanded its presence of hypermarkets across three continents, the company hired security system integrator UTI to establish loss prevention systems within the unique shopping environment.

The Big Bang

AS the technology drums continue to beat in support of Internet Protocol video security solutions, many may wonder about its impact on the business community -- most notably, on those organizations that have invested heavily in their legacy analog components.

Industry Insight

WHEN you reflect upon the past few decades of the security industry, it's apparent that technology has played a significant role in the development of products and in the advancements within the industry. There has been a growing trend to increase the level of sophistication within security systems -- to move away from disparate components that do not work in tandem with other security equipment and, therefore, are unable to provide a more cohesive security system.

Retail Security Goes High-Tech

MANY retail owners are not getting all they can out of their security systems. This is either because they are using outdated technology, they haven't been told how to use all of the features their systems possess or they simply do not have their systems set up in the best possible manner.

The Educated Consumer

AS an end user, it's important to understand the market as a whole and the individual product you're purchasing. Warranties are just one area that must be clarified. The more educated you as a consumer are, the more successful you'll be at your job.

Industry Insight

SPEAKING with security dealers and systems integrators across the country, it is interesting to hear them talk about the state of our industry as it relates to video surveillance. Most are excited and express a high degree of optimism about the opportunities they see on the horizon.

Theia Technologies’ ISO 9001:2015 Certification Renewed

Theia Technologies today announced that their quality management system has once again been certified to ISO 9001:2015 standards by DQS Inc following a successful audit.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.