Emerging Technologies


AOC Receives an Award for Innovation in Commercial Payments

AOC Receives an Award for Innovation in Commercial Payments

Automated prefund process earns CIP’s Global Award for Excellence

Next Level Security Systems Honored at the 9th Annual Global Excellence Awards

Next Level Security Systems Honored at the 9th Annual Global Excellence Awards

A respected guide bestowed silver-level honor on NLSS Cloud Services.

Technology Advancement

Technology Advancement

RMON provides its administrator the capability to monitor, analyze and troubleshoot a multitude of security threats from a distance. Keywords: from a distance— what’s the point of security if you have to put yourself in harm’s way?

Lights, Camera, Action

Lights, Camera, Action

Just as cutting edge movie-making technology has changed the face of the entertainment industry, cutting-edge IP video surveillance technology has changed the face of physical security.

Biometrics on the Front End

Unlike other forms of strong authentication, biometrics is the only means of determining who is using the system. Systems relying on PINs, passcodes or less reliable means of user authentication are rapidly becoming both ineffective and obsolete.

Worlds Colliding

There’s no question that the 21st century has brought significant change to security solutions. An abundance of connectivity options and the application of technologies—such as IP, virtualization, hosted solutions and mobile—are enhancing the way we secure the enterprise and helping to improve security.

Ease of Inspiration

There were dreams and promises of Minority Report-like video intelligence that could predict a crime before it happened. Fortunately, industry expectations have come back down to earth, and we’ve learned some valuable lessons along the way.

Network vs. Device Security

As virtual offices and remote workforces become the norm, so does the need for a secure mobile collaborative environment.



Frankenstein Programmers Test a Cybersecurity Monster

UT Dallas computer scientists are trying to stay one step ahead of cyber attackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.

Milestone Systems Expands Development of Integration With Optex

Milestone Systems and Optex, Inc. are expanding integration development with dedicated support of IP sensors and detectors for Milestone XProtect video management software (VMS).

Cayman and FLIR Help Law Enforcement Battle Designer Drugs

Cayman Chemical and FLIR Systems have come together to provide law enforcement with a powerful new tool in the battle against designer drugs by using Cayman Chemical’s forensic standards to create a Mass Spectral Library for FLIR’s Griffin 460 transportable Gas Chromatograph Mass Spectrometry (GC/MS) system.

Cooper Notification Keeps Residents Informed During Storms

On the heels of a rare and extremely dangerous storm in our National Capital Region (NCR), Cooper Notification, the leading supplier of Life Safety and Mass Notification System (MNS) solutions, is helping to keep those affected informed.

From The Edge To The Cloud

System designers must ensure that sufficient storage is available to archive video for the required length of time and at the required frame rate and resolution.

Video Security

Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.

Senstar Sells More Than 200 Km of Perimeter Intrusion Detection Systems

Senstar Corporation announced today the sale of over 200 Km of perimeter intrusion detection systems (PIDS) protecting solar power generation facilities in Germany.

Rensselear Researchers Unveil Prototype Disaster Management Simulator

Engineers and scientists at Rensselaer Polytechnic Institute are working to develop powerful new decision-making and data visualization tools for emergency management.

Honeywell Reaches 1 Million Subscribers For GSM Alarm Radios

Honeywell has crossed the 1 million subscriber threshold for GSM alarm radios.

One World, One Call

Many of today’s growth-oriented businesses aim to extend operations to other states and countries after solidifying success in existing markets, and this trend will only continue to accelerate.

Into the Air

The development of custom video drivers is a huge barrier for less-established brand names. From a stand-alone camera manufacturer’s perspective, it is impossible to gain market share without being included in the more popular VMS platforms. Without strong market share, however, VMS companies cannot devote the time or the energy to support these lower-tier brands.

Addressing SSTDR Technology

Security and alarm systems become more complex every day as new services, features, technologies and capabilities are added.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.