Top Stories


Making the Grade with Locks and Door Hardware

Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations.

Choosing the Right Solution

Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years.

New Report Reveals Top Security Risks for U.S. Retail Chains

Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024.



Axis Communications Announces New ARTPEC-9 Chip Featuring Significant Enhancements for Cloud-Based Video and AI Applications

Axis Communications, the industry leader in video surveillance, today announced the 9th generation of its purpose-built system-on-chip (SoC). The new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth and storage needs, especially beneficial for cloud-based video solutions. With an incredibly low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail.

Eagle Eye Networks Releases 2025 Trends in Video Surveillance Report

Eagle Eye Networks, provider of cloud video surveillance, today released the 2025 edition of its annual Trends in Video Surveillance report, identifying six trends that will have the largest impact on businesses around the world in 2025.

Gaining a Competitive Edge

Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI.

6 Ways Security Awareness Training Empowers Human Risk Management

Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk.

The Stage is Set

The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways.

Genetec Expands Access Control Market Share

According to the 2024 Access Control report by Omdia, Genetec Inc, provider of enterprise physical security software, has consistently gained market share over the last six years, solidifying its position as a worldwide market leader and building upon its #2 global position for access control software.

Access Control Technology

As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections.

AMAG Technology Welcomes Chris Meiter as Vice President Global Business Development Video Solutions

AMAG Technology is pleased to announce the appointment of Chris Meiter as AMAG Technology's Vice President of Global Business Development for Video Solutions. This new role underscores the organization’s continued expansion support to its entire technology suite.

Napco Access Pro Launches New MVP Access App

Napco Access Pro, a division of NAPCO Security Technologies, is proud to announce the availability of the MVP Access™ App on the Apple App Store and Google Play. This advanced mobile solution brings the full power of the *MVP Access™ Cloud-Hosted Enterprise Security and Access Platform* to users’ fingertips, providing unparalleled command and control for dealers, integrators, and security directors managing systems of all sizes.

i-PRO Launches High Zoom Bullet Camera

i-PRO Co., Ltd. (formerly Panasonic Security), provider of professional security and public safety solutions, today announced a new line of High Zoom Bullet cameras designed to deliver exceptional long-range coverage with advanced edge AI capabilities. Equipped with powerful zoom and IR LED technologies, the new cameras offer unrivaled precision for long-distance monitoring across various environments, such as highways, parking lots, bridges, ports, and stadiums.

Evolon and UCC Partner to Deliver Proactive Video Monitoring Solutions

Evolon Technology, provider of proactive AI-driven security solutions, and United Central Control (UCC) and COPS Monitoring (COPS), premier providers of professional video monitoring, have announced a partnership to transform the proactive video monitoring market.

ASIS International, International Protective Security Board Sign Memorandum of Understanding

ASIS International (ASIS) and the International Protective Security Board (IPSB) today announced the signing of a Memorandum of Understanding (MOU) to promote collaboration and information-sharing between the two organizations. This partnership aims to foster the growth of the security industry and the executive protection community.

Cutting Retail Losses

Retail is still a more complex and dynamic security vertical in modern society. Inherent challenges with in-store and distribution center operations are primarily due to constantly shifting consumer buying trends. Retailers must show daily flexibility to keep workers, meet sales goals and attract customers while maintaining safe and efficient operations. Retail is an intricate web of interconnected elements.

TMA Awards Four Mel Mahler Awards for Outstanding Contributions

The Monitoring Association’s (TMA) President Steve Butkovich honored four of TMA’s long-serving volunteers for their impactful contributions to TMA’s ASAP service with the 2024 Mel Mahler Award, formerly known as the President’s Award on Oct. 9th at the 2024 Annual Meeting in St. Thomas, U.S. Virgin Islands. The Mel Mahler Award is presented at the discretion of the TMA president in recognition of outstanding contributions within his/her tenure. The 2024 Mel Mahler Award recipients are Bill Hobgood, CommSys Incorporated; Jennifer Holloway, CIBC Bank; Daniel Oppenheim, Affiliated Monitoring; and Pam Petrow, Vector Security.

TSA Announces Proposed Rule Requiring Establishment of Pipeline, Railroad Cyber Risk Management Programs

The Transportation Security Administration (TSA) published a Notice of Proposed Rulemaking that proposes to mandate cyber risk management and reporting requirements for certain surface transportation owners and operators.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.