Dealers and Integrators


On the Move - Rob Phillips

On the Move

Apps are more prevalent than ever. The best ones are clean, fast and easily navigable for all ages, not just the world’s youngest millionaires.

Upgrading to video verification

Upgrade to Video Verification

Most of the 30 million classic burglar alarms installed since 1970 fail to meet growing consumer expectations of what a modern burglar alarm should be.

True Integration

True Integration

Charlie Howell’s childhood was hardly conventional. While other children were reading comic books, he was poring over repair manuals and installation diagrams.

Project Management

I recently participated in a webinar titled Industrial Security in the Real World: Practical Steps, which indirectly discussed how some fundamental tenants of project management were applied to this topic.

hosted video can be lucrative

Hosted Video Can Be Lucrative

If you’re limiting your business to selling surveillance technology as a capital expense, you’re leaving a lot of money on the table.

The Circle of Life for Your Central Station

What job function does the staff of full-service central stations spend the most time performing? Processing signals? Taking calls? No! The answer is data entry.

Avigilon Acquires Access Control Company

Avigilon Acquires Access Control Company RedCloud

Through this acquisition, Avigilon adds a complementary product line to its end-to-end, high-definition surveillance solution and provides the company with access to a growing segment of the global security market.

Bosch Signs New Distribution Agreement with Ingram Micro

Bosch Signs New Distribution Agreement with Ingram Micro

World’s largest technology distributor expands physical surveillance portfolio with addition of Bosch.



Berk Tek Leviton Technologies Alliance Launches New Combined System Solutions

Berk Tek Leviton Technologies Alliance Launches New Combined System Solutions

System details, specifications and third-party, verified system, test results available at newly launched website.

Twitters Two Factor Authentication How to and Why You Should

Twitters Two Factor Authentication How To and Why You Should

Are you doing all you can to protect your Twitter account?

New G Lite Compact Illuminators by Geutebrunk

New G Lite Compact Illuminators by Geutebrunk

Neat and discreet unobtrusive illuminators for use with day and night cameras.

Dortronics Receives Outstanding Customer Service Award from PSA Security Network

Dortronics Receives Outstanding Customer Service Award from PSA Security Network

Exceptional customer services complements high-quality product portfolio.

HID Global Awarded Prestigious Intergraf Security Printer Certification

HID Global Awarded Prestigious Intergraf Security Printer Certification

HID Global’s German operations center designated by Integraf as a secure printing card manufacturing facility for the government-to-citizen market.

Open Roads VICADS Successfully Integrated with Will Burt LINX Security Solutions

Open Roads VICADS Successfully Integrated with Will Burt LINX Security Solutions

Version 4.1 and Will-Burt LINX Security System delivers a unified and easy-to-manage security station for the operator. This successful integration provides the highest level of security and surveillance for the United States Air Force and Department of Defense.

10 Year Warranty on Polaroid Professional Surveillance Solutions

10 Year Warranty on Polaroid Professional Surveillance Solutions

Longest warranty in surveillance solutions.

Sentry View Systems Launches SentrySPEAR

Sentry View Systems Launches SentrySPEAR

Flexible, remote surveillance solution that is easily transported on a standard-size or cargo flat bed truck or trailer.

Sentry View Systems Launches SiteCOMMANDER

Sentry View Systems Launches SiteCOMMANDER

Turnkey intelligent data management featuring mobile access to critical situational awareness for first responders.

Tyfone Connected Smart Card Solution Fixes Cyber Security and Biometric Vulnerabilities

Tyfone Connected Smart Card Solution Fixes Cyber Security and Biometric Vulnerabilities

Tyfone combines local- and cloud-based technologies for trusted verification of passwords, biometrics and other digital ID credentials to counter security breaches.

Quantum Secure and Electrosoft Win Contract with Dept of Veterans Affairs

Quantum Secure and Electrosoft Win Contract with Dept of Veterans Affairs

As an authorized, value-added reseller of SAFE, Electrosoft is providing the SAFE product as the key component to the ePACS solution for the Department of Veterans Affairs.

Corvus Integration Inc Announces Two Dual Eye Iris Solutions

Corvus Integration Inc Announces Two Dual Eye Iris Solutions

The EY2-2 and EY2H introduces new dual iris and face cameras, with the EY2H being ideal for outdoor and indoor iris collection.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.