Top Stories


Extraordinary Protection

Following several high-profile incidents alleging abuse special needs students (including some non-communicative students), and the activism of a number of parent groups in the state of texas, governor greg abbott signed texas senate bill 507, requiring districts to install audio and video surveillance equipment into select special education classrooms when requested.

Detecting And Mitigating

Detecting And Mitigating

Insider threat has become an increasingly prevalent concern for organizations, and the damage from breaches caused by current or former employees, contractors or partners misusing access credentials can be devastating.

Understanding Interoperability

Understanding Interoperability

Since 9/11, travel through the world’s busiest airports has changed dramatically. Security professionals are focused on extensive security investments to protect these “Soft Targets” from threats, including terrorist attacks, crime, theft and vandalism.



What You Need To Know

Being in school every day is vital for a student’s success, and with state funding associated with attendance, it is also vital that school districts keep close track of when students are in school and when they are not.

Plan Of Action

As concerns for campus safety rapidly rise within higher education communities, it is important to implement a proactive plan as the first step to acknowledging your security needs.

Lack of Ethics is a Problem

The pharmaceutical industry is a business exposed to many unique risks. Attaining capital, investing in intensive research and development, the uncertainty of FDA approval and the constant shroud of legislative risks are merely some of the many significant challenges that innovative pharmaceutical companies regularly face.

How Safe Is Your Campus?

Effective campus security consists of more than just a budget line-item and the proverbial “knocking on wood” in today’s day and age.

Planning Ahead

One of the most important things that you can do at the start of a new year is to refine your business plan with both short and long-term goals.

Class Is In Session

Class Is In Session

Students and the facilities in which they attend classes face more threats in today’s society than at any other point in history.

Today's Technology - An Insider's View

Video surveillance permeates our lives today; it is part of a changing world. We recently sat down with Jeff Whitney, vice president of marketing for megapixel camera manufacturer Arecont Vision to get an industry insider’s view on where the video surveillance market is today, how we got here, where we can expect it go in the near future, and what his own company is doing to keep up.

Streamlining Arena Security

Streamlining Arena Security

Frustrated with a faulty analog security setup, Chicago’s United Center set out to raise their technology standards and centralize operations through a network system.

Leveraging Data

Leveraging Data

Campus security, both in a corporate and higher education setting, can be improved by leveraging data from access control systems to drive future security decisions.

Conquering A Feeding Frenzy

Conquering A Feeding Frenzy

Pensacola christian college (pcc), in northwest florida, is located just off the warm emerald waters of florida’s gulf coast. pcc became a reality in 1974 when 100 students arrived at the college’s one building.

Increasing Profits

Increasing Profits

In our last contributed article, Anixter examined the topic of “Sourcing to Become a Leaner Organization.” Here we take a look at another important component of increasing profitability—Reducing and Managing Non-Productive Labor.

Biggest Security Incidents of 2016

Biggest Security Incidents of 2016

Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.

The Continuing Evolution of Power and Transmission Solutions

The Continuing Evolution of Power and Transmission Solutions

Thanks to a number of new technology advancements, power supplies and transmission solutions with network management features are a natural progression for ensuring the reliability of today’s IP-based physical security systems.

Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.

Featured

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.