Top Stories


Monitoring Student's Locations via the School Bus

Tracking students before and after school gives all adults involved in the safety and security of students peace of mind.

ASSA ABLOY Reveals Strategic Initiative to License Seos

Mobile access solutions built on the Seos platform simplify life by eliminating the need for multiple physical credentials.

Honeywell Launches Entry-level PIR

False alarm-reducing sensor combines value with high performance for residential installations.



UniKeys Smart Access Control App Integrates into Samsung KNOX

Collaboration allows Samsung KNOX customers to gain secure, convenient, touch-to-open, keyless and cardless entry for consumers and businesses through UniKey's global platform.

Hikvision USA Awarded Vendor of the Year by ADI

Testament to strong relationships dedicated to growing the video surveillance market.

Ganz Introduces Transmission Product Line

Complete line of Ethernet transmission products round out line of IP cameras, recording devices and monitoring products.

Costar Video Systems Unveils Website Redesign

With consistent increases in mobile and tablet traffic, it was time for an upgrade.

SureView Systems Announces Integration with AMAG Technology

Immix platform integrates with Symmetry access control software.

Properly Trained School Security Guards

Properly Trained School Security Guards

Suggestions for what to include in a school security guard curriculum.

Secret Service Investigating Two White House Security Breaches

Secret Service Investigating Two White House Security Breaches

The Secret Service is investigating two separate instances that have occurred in the last 24 hours.

Securing Access Control

Just watching the news each night is reason enough to explain why security professionals worry about the security of their access control systems. If the card system is hacked, there can be major problems.

Integrating Security - Logistics company takes advantage of information management solutions

Integrating Security

The logistics company wanted a single solution to provide high-resolution video images as well as the ability to monitor, verify and restrict access to the facility in order to better manage employee time and attendance while also reducing theft and misplacement of inventory.

How an Interruption Sparked an Industry Trend - Key management systems developed to store, track sensitive keys

How an Interruption Sparked an Industry Trend

There are hundreds, if not thousands, of selfhelp sales books on the market offering advice for everyone from the beginner through to the seasoned sales veteran. A primary concept behind all of them is how best to get a foot in the door in order to pitch your product and show how this product will help solve the customer’s problem.

Now Trending

Our homes are becoming living, breathing, speaking organisms a buzz with device-controlled door locks, thermostats, shades, video cameras, garage doors, etc.

Changing the Landscape - Wireless intrusion makes a big splash in commercial applications

Changing the Landscape

Wireless intrusion solutions have been perceived as complicated systems with time-consuming installs, and the possibility for strong interference and constant on-site maintenance. However, as technology continues to advance, it has changed the landscape of wireless intrusion and opened the door for commercial applications—making wireless intrusion not only a viable option, but an ideal solution.

Bring on the Power - Understanding that PoE impacts network design

Bring on the Power

When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.

Making Recommendations - Manufacturer provides more successful training experiences

Making Recommendations

After more than 10 years of offering technical training on our physical security entrance products to integrators, installers, and distributors, we’ve refined our approach to a fully developed program that offers a mix of online webinar training, onsite training and in-house factory training.

Slain TSA Officer Honored

Slain TSA Officer Honored

It was recently revealed that Congress, as a whole, has an approval rating of about 12 percent.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.