Facility Security


Livingston County, Michigan Implements Eagle Eye 911 Emergency Security Camera Sharing

With the common goal of improving security and emergency response in the event of a critical incident, community members in Livingston County have deployed technology that turns their standard security cameras into a powerful resource for 911 Emergency Communications Center telecommunicators (911 professionals).

ZeroEyes Launches ZeroEyes One Proactive Gun Detection Solution for Smaller Deployments

ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, reently announced the availability of ZeroEyes One (ZEO), a first-of-its-kind AI-powered, human-verified gun detection solution available for deployments ranging from 1-16 IP cameras

IDIS Video Technology Provides Foundation For Indian Railways Growth Plans

Asia’s largest rail network, Indian Railways, is using an IDIS video solution integrated with facial recognition as part of an ambitious, multi-phase technology upgrade targeting significant growth.

The Recipe for Stadium Security

The threat landscape of stadium security is fluid. Today’s venues and stadiums have operational security 24/7, hosting sporting events, community events, concerts, conventions and more – each with a unique visitor base and each with unique security risks.

Multifamily Manager Methodologies

Property managers have their hands full, especially when it comes to establishing successful security systems on their properties. There are many pieces to the puzzle that come together for a property to protect itself properly.

Securing the Flow of Operations

The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly.

Mobile Applications Are Empowering Security Personnel

From real-time surveillance and access control management to remote monitoring and communications, a new generation of mobile applications is empowering security personnel to protect people and places. Mobile applications for physical security systems are emerging as indispensable tools to enhance safety. They also offer many features that are reshaping how modern security professionals approach their work.

Florida Healthcare System Uses Evolv Threat Detection Technology

Evolv Technology, a security technology company pioneering AI-based screening to create safer experiences, recently announced its partnership with Lee Health, one of the largest not-for-profit health systems in Florida. Lee Health uses Evolv’s state-of-the-art Evolv Express screening solution at the entrances to three of its emergency departments, with plans to install Evolv Express systems at three additional locations.



How a Security System Can Enhance Arena Safety and the Fan Experience

Ensuring guests have both a memorable experience and a safe one is no small feat for your physical security team. Stadiums, ballparks, arenas, and other large event venues are increasingly leveraging new technologies to transform the fan experience and maintain a high level of security. The goal is to preserve the integrity and excitement of the event while enhancing security and remaining “behind the scenes.”

Elevating Security

Willis Tower, an iconic symbol in Chicago for more than 50 years, has undergone significant transformations to become a modern workplace and community hub that delivers the best experiences for its tenants, area residents and visitors. Originally known as Sears Tower, it was renamed Willis Tower after a change in ownership in 2009.

Global Physical Security Market for LiDAR Sensors to Exceed $6 Billion by 2030

Enhancing physical security, especially perimeter intrusion detection (PID) at critical infrastructure sites like airports, data centers, warehouses, and utilities, is increasingly crucial due to growing threats such as theft, protests, sabotage, terrorism, and war.

Conference to Offer Education, Networking, and Solutions on Workplace Violence Management

The Security Executive Council, with Rice University and MD Anderson Cancer Center, will facilitate a day and a half of expert-led sessions on workplace violence risk management for corporate security practitioners, cross-functional partners, and police and emergency responders.

Solving Loitering and Open Access Challenges

Loitering is generally not considered a crime with few instances of arrests reported nationally, but it is becoming an increasing problem for a multitude of reasons. One being the use of private spaces such as public-faced restrooms for drug use, other forms of illicit behavior, or as safe havens where homeless individuals are seeking shelter and protection from the elements. In any case, the misuse and prolonged occupancy of publicly accessible spaces prevents them from being accessed for their intended purposes by legitimate users.

Shaping the Use of Technology

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.

Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

Vantage Standardizes Security at 32 Global Data Centers

Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, announced that Vantage Data Centers has transformed its global security operations using Genetec™ Security Center unified security platform and Genetec Mission Control™ decision management system. The leading operator of large-scale data centers recently standardized on the Genetec unified platform to modernize security at 32 data centers in North America, EMEA, and Asia Pacific.

Boston Red Sox Choose Centripetal as Cyber Network Security Partner

Cybersecurity provider Centripetal recently announced that it has been selected as the Official Cyber Network Security Partner for the Boston Red Sox and Fenway Park. Under the multi-year partnership, Centripetal will protect the Boston Red Sox by deploying its CleanINTERNET solution at Fenway Park and their training facilities.

FC Dallas to Open 2024 MLS Regular Season With Evolv Technology

Evolv Technology recently announced its partnership with Major League Soccer’s FC Dallas. With the start of the FC Dallas regular season at Toyota Stadium this month, it will now use Evolv Express systems to screen fans and staff at all of its entrances. Toyota Stadium can accommodate more than 19,000 fans, and Express allows fans to move through the entrances at pace. FC Dallas saw the success of Evolv at other facilities across MLS and switched to Express from metal detectors, which contributed to long lines and bottlenecks at entry.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.