Top Stories


Cybersecurity: Simple Tips to Protect Yourself

Cybersecurity: Simple Tips to Protect Yourself

Simply employing the most basic of information security rules will make you and your business more safe and secure.

Winnipeg Health Sciences Centre Staff Outfitted with Personal Alarms

Winnipeg Health Sciences Centre Staff Outfitted with Personal Alarms

he alarms act as a personal security device and emit a loud noise when triggered.



Quora Says 100 Million Users Breached in Security Incident

Quora Says 100 Million Users Breached in Security Incident

The names, email addresses and passwords of 100 million users of Quora have been made vulnerable.

New Secret Service Pins to Include Security Feature

New Secret Service Pins to Include Security Feature

The document says the Secret Service contacted three other vendors, but none were able to “provide the expertise in manufacturing lapel emblems with any type of security technology features.”

As Many as 500 Million Potentially Affected by Marriott Data Breach

As Many as 500 Million Potentially Affected by Marriott Data Breach

"The company has not finished identifying duplicate information in the database, but believes it contains information on up to approximately 500 million guests who made a reservation at a Starwood property," Marriott said in a statement.

Meeting the Challenge

Around the world, the shipping and logistics industry has experienced immense operational growth and development.

Watch for New Trends

Watch for New Trends

What technology and industry trends should you keep an eye out for to stay ahead of the pack? In short, complex analytics are growing hotter which is made possible by the trend towards GPU co-processing.

Smarter Infrastructure

Smarter Infrastructure

Smart city initiatives are growing across the globe, as leaders look to increase security and intelligence across metropolitan environments.

The Next Generation

Hardware Security Modules, or HSMs, protect against insider and external threats by delivering confidentiality for encryption keys in a physically hardened appliance.

Bringing Hope to SMB Networks

Hopemate is a small IT service provider located in the Greater Vancouver, Canada, area that brings IT support to small businesses in its community.

Challenges and Solutions

Challenges and Solutions

Technological advancements are resulting in trends and movements that improve the quality of life and business.

Securing High-End Retail Stores

Securing High-End Retail Stores

It’s no secret Americans like to shop online. A marketing survey showed 40 percent of U.S. internet users made purchases several times a month in 2017.

What Lies Ahead for 2019

What Lies Ahead for 2019

After spending close to 20 years in the security industry, it is always a good exercise to see what projections came through the last year and which ones we foresee in the coming years.

A Market Focus

A Market Focus

Since North American Video (NAV) was founded in 1995, the systems integrator has continued to build an outstanding reputation in the physical security market.

Enabling Your Own Surveillance as a Service Offering

In the dealer/integrator business, recurring monthly revenue (RMR) is like finding a gold mine with several profitable veins that can be mined. RMR is an attractive means for a secondary revenue stream.

Networking Technology is Changing

No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.

From Risk to Reward

In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented addons to generate recurring monthly revenues (RMR).

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities