Emerging Technologies


U.S. Air Force, Lockheed Martin Complete Environmental Testing of the Nation's Next Missile Warning Satellite

Lockheed Martin has successfully completed thermal vacuum testing of the U.S. Air Force's second Space Based Infrared System geosynchronous satellite.

Securitys Range and Capabilities

Security's Range and Capabilities

The mobility and convenience offered by handheld devices has caught the attention of manufacturers and integrators, who are now marketing numerous security solutions.

Engineers Developing Military Applications for Smartphones

Engineers from the MU College of Engineering, with funding from the U.S. Army/Leonard Wood Institute, have enhanced popular smartphones to be able to find and track targets.

Department of Defense Announces Successful Test of Army Advanced Hypersonic Weapon Concept

A first-of-its-kind glide vehicle, designed to fly within the earth’s atmosphere at hypersonic speed and long range, was launched from the Pacific Missile Range Facility, Kauai, Hawaii to the Reagan Test Site, U.S. Army Kwajalein Atoll.

HID Global and Sony Introduce NFC-enabled Contactless Smart Card Reader Platform

HID Global, a source for secure identity solutions, and Sony Corporation recently introduced a jointly developed contactless smart card reader platform that embeds secure access control capabilities and Near Field Communication (NFC) functionality into laptops and other mobile devices.

Naval Research Laboratory's MIGHTI Selected by NASA for Potential Space Flight

A Naval Research Laboratory instrument designed to study the Earth's thermosphere is part of a future science mission that has been selected by NASA for evaluation for flight.

3i-MIND and iJET Partner in the Software Solutions Market

In today’s world, theft, espionage, the discrediting of corporate reputations and other disruptive activities are carried out on social networks and in public forums online. As a result, operational risk reduction requires a combination of subject matter expertise and open-source tools. Without one or the other, corporate security officers and their teams lose the upper hand in the battle against threats to their people and operations. This is the premise behind the integration of OpenMIND in iJET’s existing solution set.

Increase Security Not Complexity

Increase Security Not Complexity

As any security officer will tell you, there’s a compelling reason for integrating access control with a video management system (VMS). Key cards and PINs are just the first line of defense against unauthorized access.



The Future of Airport Passport Control

Digital security specialists, major European electronics makers and experts in biometrics are working together to make passport control at airports faster.

Software Keeps Sensitive Data Confined in Physical Space (With Video)

In a breakthrough that could aid spies, keepers of medical records and parents who want to prevent their kids from "sexting," a team of Virginia Tech researchers has created software to remotely put smart phones under lockdown.

Crime-fighting Tool Identifies Suspicious Individuals at Crime Scenes

A team of University of Notre Dame biometrics experts are developing a crime-fighting tool that can help law enforcement officials identify suspicious individuals at crime scenes.

Researchers Develop a Laser That Could Detect Roadside Bombs

A research team at Michigan State University has developed a laser that could detect roadside bombs.

NASA Scientist Unveils New Chemical Detection Technology

NASA scientists are creating technology that can detect hazardous chemical compounds in the air with a smart phone.

McAfee Highlights Discrepancy Between Data Center Security Perceptions and Reality

McAfee recently released the results of a survey conducted by Gabriel Consulting Group (GCG), an independent analyst firm, showing a serious disconnect between security perceptions and reality among IT Enterprise security managers.

Not for the Faint of Heart

Not for the Faint of Heart

Providing security in the government sector is not for the faint of heart or the uncommitted. The government sector requires expertise in high-level security applications, advanced compliance requirements and the challenge of securing funding.

Verification Versus Priority Dispatch

Over the last decade, the alarm industry has spent millions of dollars and thousands of hours addressing the issue of preventing unnecessary police dispatches from alarm systems.

Lets Work Together

Let's Work Together

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.

Securing Products on the Go

Securing Products on the Go

Distributors worldwide are increasingly challenged with enhancing the effectiveness of their operations. In an industry characterized by high turnover, strict regulations, slim margins and tenuous customer loyalty, retail distributors need to make smarter decisions and manage their businesses more effectively.

Axis, ADT Commercial Announce First Hosted Video Solution Installation

Axis Communications recently announced its first installation with newest hosted video solution provider partner ADT Commercial at Alco Watch & Jewelry in New York City. ADT Hosted Video, which makes its debut at ASIS 2011 in Orlando, utilizes Axis network cameras along with the AXIS Video Hosting System (AVHS) platform to provide video recording and management that is centrally managed by ADT and allows anytime, anywhere video access without the need for an onsite DVR.

ISee3D Unveils Single Lens 3D Technology

ISee3D Inc., developer of single lens 3D technology, announced recent industry-specific updates and advances. ISee3D is introducing a modified lens solution that cuts 3D down to size and increases frame rates, making practical a range of applications and bringing 3D to more markets, such as consumer, automotive, industrial and medical devices.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.