Top Stories


Pivot3 Operation with Milestone Video Software is Tested and Documented

Certification between vSTAC and XProtect ensures availability and performance.

GTL Includes Key-injected Credit Card Scanners

Updates kiosk inspection protocol to ensure customer data safety.

Identiv Enters Distribution Partnership with PSA Security Network

uTrust TS Premises Readers designed to support existing building access system.



Absolute Collaborates with AMD to Extend Benefits of Persistence Technology

Technology embedded into core of devices at factory and provides reliable two-way connection.

ISCON Imaging Releases New Videos Showcasing their Handheld, Full-body Scanners

Highlights unique benefits and ease of use of FocusScan and SecureScan.

Sielox CLASS Emergency Notification & Response Solution Proving Effective for Education Sector

Solution delivers lockdown alerts with status and communications.

Zetron Offers HD-quality IP-based Video and Audio Recording for Interrogation Rooms

Recordings of interviews with suspects, victims and witnesses made easy and provides integrity of data to protect officers from allegations of coerced confessions or the mistreatment of suspects.

Identiv Announces U.S. Government Certification of uTrust TS ScramblePad Reader

General Services Administration (GSA) lab evaluated and approved this product.

Integrated Voice Calling Gives Synergy Users Comms Control

Unified communication software enables operators to make and receive calls as part of rapid response protocols.

Uber to Strengthen Data Security

Uber to Strengthen Data Security

The ride service is significantly expanding its security team.

A Word about Universal Security

Welcome Universal to the Security Industry

Do American movie theaters need better security?

Integrating Multi-use School ID Cards

Online Exclusive: Integrating Multi-use School ID Cards

Vast number of schools printing their cards in-house instead of relying on third-party service bureau.

Security Zones and Fences to be prepped for Pope’s Philadelphia Visit

Security Zones and Fences to be prepped for Pope's Philadelphia Visit

The mayor addressed school closures, taxi services and much more.

IBM Achieves U.S. Government's First FedRAMP Mobile Authorization

Cloud-based MaaS360, enterprise mobility management and security platform reaches milestone.

Southco Presents Curtiss-Wright with Supplier-of-the-Year Award

Award presented in facility at Cwmfelinfach, UK and related to solenoid actuator assmeblies.

Absolute Collaborates with RSA to Offer Enhanced Endpoint Data Collection & Remediation

Collaboration supports and is designed to deliver seamless interoperability.

Goodix Expands U.S. Operations for Inventive Human Interface and Fingerprint Touch Sensing Technology

Strong demand across its entire touch, display, biometric and mobile payment portfolios, including solutions that integrate fingerprint sensors into touchscreens to simplify mobile device and data security.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.