Top Stories


Best Practices for Securing Documents

Best Practices for Securing Documents

Exploring basic best practices for securing documents on your computer and smartphone

Camden Door Controls Releases Its 2017 Price List

Camden Door Controls is pleased to announce that its 2017 Price List is now available in both U.S. and Canadian editions.

Istanbul Twin Bombings Kills 38, Leaves 155 Injured

Istanbul Twin Bombings Kills 38 Leaves, 155 Injured

The explosions occurred after a heavily attended football game at Basiktas Vodafone Arena.



High School Student with Knife on Campus Shot by District Police Officer

High School Student with Knife on Campus Shot by District Police Officer

Police rushed to Hug High School after reports of a knife-wielding student and a shot fired.

Vanderbilt Provides Cost effective Expanded Access Control with Allegion Integration

Vanderbilt announced the integration of its award-winning lite blue® and bright blue® access control solutions with Allegion's Schlage® NDE Series wireless locks with ENGAGE™ technology.

Hanwha Techwin America Invites End Users to Join its TAC Force Advisory Council

Member Input and Feedback Will Help Drive Direction of Product Development

Manhunt underway for Suspect Who Shot Two Officers, One Fatally

UPDATE: Americus Suspect Who Shot Two Officers, One Fatally, is Dead

Police responded to a domestic call in Americus, Georgia before being shot upon by the 32-year-old suspect.

New Software Upgrade for Access Control Software AccessNsite

American Direct Procurement, Inc. announced today the release of software enhancements to their next generation access control software, AccessNsite®.

FLIR Launches Second Generation FLIR Meridian Network Video Recorder

Latest all-in-one NVR offers advanced embedded enterprise video management features for small and medium business users.

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Now, the understanding of cloud technology and its value are clear, but safety often comes into question for security professionals.

How Safe is Your Campus?

Effective campus security consists of more than just a budget line-item and the proverbial “knocking on wood” in today’s day and age.

The Building Blocks

Educational institutions face an increasing risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. This has led to an increase in public demand for improved security solutions across campuses. K-12 schools, early-learning institutions, and higher education alike strive to meet the safety expectation of all stakeholders.

Holiday Precautions

With the holidays upon us, there is no better time to start implementing these safety measures.

Plan of Action

As concerns for campus safety rapidly rise within higher education communities, it is important to implement a proactive plan as the first step to acknowledging your security needs. By preparing a communications system and plan of action prior to an incident, the effectiveness and response of your team can be better executed. By incorporating emergency communication products, a campus can ready itself by providing prominent crime deterrents, self-help options and a wide range of surveillance.

Extraordinary Protection

Following several high-profile incidents alleging abuse special needs students (including some non-communicative students), and the activism of a number of parent groups in the State of Texas, Governor Greg Abbott signed Texas Senate Bill 507, requiring districts to install audio and video surveillance equipment into select special education classrooms when requested.

IPVideo Corporation Announces Carey Lefebvre as Its Western Regional Channel Manager

New York-based manufacturer of IP-based surveillance and command center solutions expands and hires new Western Regional Channel Manager

RapidRun Optical Modular Cabling System Eases the 4K/UHD Transition for the Residential Market

Middle Atlantic Products announced today that C2G's powerful commercial solutions are now available exclusively to residential integrator partners along with Middle Atlantic robust roster of power and AV system foundational products

Tech Giants Create Database for Terrorist Content

Tech Giants Create Database for Terrorist Content

Facebook, YouTube, Twitter and Microsoft are collaborating to crackdown on terrorist content on their platforms.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities