Top Stories


10 Top Cyber Security Safety Tips

In honor of National Cyber Security Awareness Month, these not-so-familiar tips will help keep you safer online.

Japan Court Orders Google to Remove Search Results

Japan Court Orders Google to Remove Search Results

The court ordered Google to remove results of a man’s unflattering past.

Twitter Files Suit over National Security Data

Twitter Files Suit over National Security Data

Social media giant feels First Amendment right has been violated.



Zwipe Biometric Card Holders Can Now Use Installed Proximity as well as Smart Card Readers

With biometric sensor directly on the card, organizations can also leverage legacy proximity card readers to add biometric authentication.

Napco Security Systems Continental Access Alarm Lock and Marks USA Exhibit Solutions at ASIS 2014

Featured products and solutions met and exceeded market demands for security, connectivity, locking and access control.

HTC Announces $199 RE Camera

HTC Announces $199 RE Camera

The camera includes a 16MP sensor but lacks a viewfinder

Amazon

Amazon's Loss Prevention Strategy Lands them in Court

Employees must stand in line, waiting to be screened before they are allowed to leave the premises.

Symantec Reportedly Looking to Split into Two

Symantec Reportedly Looking to Split into Two

The security and storage company looks to split the two categories into separate organizations.

Viscount Systems Awarded US Patent for Freedom Security Technology

IP protection added, revolutionizing how access control systems are deployed and managed.

Middle Atlantic Names Colindres As Western Regional Sales Manager

Marco brings extensive sales and marketing experience.

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program

Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

CTS Partners with Real-Time Technology Group to Provide Advanced Identity Management

Cooperative effort leverages RTTG's expertise in developing and hosting advanced identity management programs.

Key Takeaways from ASIS 2014

With over 600 exhibitors and over 20,000 attendees, security knowledge was floating around Atlanta’s Georgia World Congress Center

ASIS 2014 Proves Social Media Works

I understand that parts of the security industry are rather “hush-hush,” and can’t and shouldn’t be discussed openly; however, it seems that the security industry as a whole is coming out of its shell a bit, at least on social media platforms, Twitter in particular.

The Pros of a Tradeshow

No one would argue a lot of work goes into a tradeshow. I marvel at all the exhibitors and the lengths they go to, to ensure a successful three-day event.

Secura Key Offers Updated Card Ordering Guide

Allows resellers and customers to have a reference tool for all aspects of the card ordering process.

Milestone Systems Navigates New Sales Channels with Netgear and Zucchetti

New partnership expands the reach of Milestone Systems in Italy, extending the sales channel beyond traditional security trade.

Featured

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • Allied Universal Report Highlights Expected Security Hazards

    All is not well with the world. I know that is not breaking news. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX
  • Nothing Artificial About this Intelligence

    I have been looking forward to this year’s GSX show in New Orleans, the Cresent City, or if you prefer The Big Easy. It seems like quite a while since we’ve been here. Twenty years ago, ASIS, as it was known then was literally washed out of the city by someone known as Katrina. It is a good thing to come back to NOLA. Read Now

  • From Monitors to Mission Control

    Security Operations Centers (SOC) were once defined by rows of static monitors, each displaying a single feed with operators quietly watching for issues. That model has become obsolete. Incidents evolve too quickly, data comes from multiple locations, and decisions must be made in seconds—not minutes. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.