Top Stories


The Truth about Biometric Exit

How can the United States ensure that the millions of visitors who travel to this country with a temporary visa uphold their agreement to leave before it expires, while also enhancing convenience for travelers? Biometrics technology holds the answer. In fact, this technology dramatically lowered cost estimates for U.S. airport exit control systems from $6 to $3 billion in 2008 to $1 billion today.

Leveraging IT for Access Control

Trying to navigate through the numerous security regulations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals.

Cutting-edge Surveillance

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur.



Providing Efficient Technologies

By now, most security professionals are familiar with the two types of wireless that have been used in access control implementations for the last decade or so.

A Great End to a Busy Day at ASIS 2014

For those of you who know me, I'm a foodie at heart! I love experiencing new flavors and flavor combinations, but the magical component of sharing a meal with someone is how food brings people together, whether they naturally mesh or not. Sharing food with people has a way of breaking down barriers and allowing people to just be themselves in conversation and human togetherness.

Dual View and Density

Dual view legislation for cargo screening in the United Kingdom will fall into place in January 2015. This has been a phased-in approach to allow freight-handling companies to make the necessary equipment and procedural changes.

Historic Southern City Upgrades to High-Tech Traffic Management

Savannah, Georgia is a study in contrast. As the state’s oldest city, it was founded long before the American Revolution. Yet, beneath its cobblestoned streets lies 38 miles of fiber optic cable, evidence of a metro-region firmly rooted in modernity.

Securing the Old with the New

To accomplish such a comprehensive and multi-stage migration and expansion— and avoid issuing brand new credentials to nearly 20,000 employees —the team devised a strategy to run C•CURE 9000 on the front end using proximity technology with the legacy access control system running in the background to support the existing magnetic stripe cards.

Security is Personal

For small to medium-sized businesses (SMBs), access control needs to be affordable, scalable and easy to install, manage and maintain. Business is no longer left at the office, as today’s small business owner needs control and visibility of the organization while on the go.

A Capitol Idea

California’s historic State Capitol building, completed in Sacramento in 1874, has seen its share of serious security episodes during its colorful existence. In 1927, a lobbyist shot and murdered a secretary on the fourth floor.

Putting Out the Welcome Mat for Video Surveillance

For Conlin Properties, IP surveillance cameras from Axis Communications have played a critical role in the program’s success. Executives estimate that they have seen a 40 percent reduction in incident calls since they started using and publicizing these cameras.

All American to the Core

You don’t get much more passionate than Alan Forman, and there isn’t anyone more personable to their staff and co-workers. Forman is the co-founder and president of Altronix, located in Brooklyn, N.Y.

A Day in the Life at ASIS 2014

With a packed schedule of back-to-back meetings, quick drive-bys to say hi to new and old acquaintances within the security industry, an early-morning breakfast and, of course, no time for lunch, I welcomed a full day on the ASIS 2014 tradeshow floor.

The Cloud Can Change Everything for Law Enforcement

Many people envision law enforcement agencies around the country as resembling mythical portrayals on TV and in movies, with leading-edge technology that can track every suspect’s move across the grid.

The Roots of Remote Monitoring

Over the years, remote monitoring has become increasingly sophisticated as wireless area network (WAN) bandwidth, transmission speeds and image quality have improved. Today’s remote monitoring systems can scale almost infinitely, making them cost-effective solutions for securing large, geographically dispersed environments.

USSS Director Writes Testimony Regarding White House Perimeter Breach

USSS Director Writes Testimony Regarding White House Perimeter Breach

Director Pierson brings up some new concerns about the Secret Service.

Panasonic Introduces New i-PRO ULTRA 360 Dome Cameras

Panasonic System Communications Company of North America recently announced its new i-PRO ULTRA 360 panoramic indoor (WV-SFV480) and outdoor (WV-SFN481) cameras that offer ultra high resolution, ultra sensitivity, ultra intelligence and ultra toughness.

Choice of Words

In my business we get to use words to explain and herald new products, technology and solutions. In this business, our writing follows the AP Stylebook. It's supposed to help journalists use the right words.

Featured

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities