Top Stories


Overcoming the challenges of fleet management

Addressing Fleet Technology

The ever-increasing challenges that fleet managers face may seem impossible to overcome—fluctuating fuel costs, increased maintenance costs and stricter emission regulations, not to mention, the most important challenge for any fleet manager: security—keeping employees and properties safe.

Car Dealership Test Drives Remote Services

Car Dealership Test Drives Remote Services

Shiny new and gently used vehicles are valuable retail assets that most auto dealerships leave on display outdoors both day and night. Needless to say, the auto industry faces a unique challenge in securing retail facilities and merchandise.

Mixing it Up on the Golf Course

Mixing it Up on the Golf Course

It doesn’t matter whether he is protecting high-rise apartment residents from an unwanted delivery person or mixing it up on the golf course by ensuring that people’s favorite course is fully protected, Levy Acs, president and founder of AISG Security, is all about security.



Through several stages of card technologies, organizations still didn’t know who was carrying the card

Finding Biometrics

For more than 20 years, biometric hand geometry systems have been providing the highest level of security, access control and convenience in a wide range of applications all over the world.

Turning up the heat

Turning Up the Heat

The remote solar field was pitch black, yet the thermal cameras detected movement by the fence and sent out an alarm. The officer on duty at Campus Safety took one look at the thermal images streaming onto the video monitor and realized the magnitude of the alert.

A Strong Alliance

A Strong Alliance

When Pat Comunale, the president and CEO of independent security distributor Tri-Ed, began forming a relationship with India-based distributor Aditya Infotech, Ltd., it occurred to him that the relationship should be more than just a casual one. The two companies had great conversations regarding current market trends and the future of the industry.

Investing in the Custom Channel

IC Realtime is Sailor’s vision that started in 2005, in large part because he didn’t feel the company he was then working for was doing things right. He saw a void in the security industry and felt certain he could fill it.

GovSec West Exhibitors Feature Several Products and Solutions

GovSec West Exhibitors Feature Several Products and Solutions

A comprehensive overview of this year's GovSec West 2013 Conference and Expo provided by the staff at Security Products magazine.

Michigan community protects beachgoers and harbor

A Swell of Security

Code Blue Corp. was tabbed by the city of South Haven to install a pair of blue light pedestals, equipped with emergency speakerphones operated by a high-tech software system.

Marketing Resolutions for the New Year

Marketing Resolutions for the New Year

A popular New Year’s resolution for people is simply putting themselves out there by making new friends, socializing, networking and broadening horizons.

Stay Away

The good people of Newtown, Conn. have pleaded with the media to stay away during the first year anniversary of the now infamous shooting at the elementary school. Has anything changed so significantly that the national media feels it must descend upon the village and try to cover new ground?

Management systems solve compliance issues of multi-state gaming rules and regulations

Key Control

In the American casino industry, the name Boyd Gaming stands out as a model of business efficiency and success.

An Essential Tool - Customer-centric security operations now require mobility

An Essential Tool

Mobile devices and mobile apps have become a fixture in the lives of people around the globe.

Video Insight to Donate Video Surveillance Systems to Schools and Colleges Via Security Grant

Video Insight to Donate Video Surveillance Systems to Schools and Colleges Via Security Grant

Security professionals step up to help make and keep schools and colleges safer.

40 Million Credit Card Accounts Breached at Target

40 Million Credit Card Accounts Breached at Target

What to do if you own one of the credit cards that have been accessed without your consent.

Dortronics Introduces Dual Door Control Bathroom System

Dortronics Introduces Dual Door Control Bathroom System

One-touch control offers privacy and convenience in shared restrooms.

TSA Agent Catches Falling Baby

VIDEO: TSA Agent/Airport Security Guard Catches Falling Baby

Contrary to popular belief, they do more than simply make you throw away your water bottles.

Web users need to take the initiative and read the privacy policies of the privacy platforms they

As Online Privacy Becomes Commercialized, Consumers Need to Get Educated

Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.

Featured

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities