Top Stories


Droning On

Curious by nature, I’ve wondered about lots of things, and later in life, I wonder about the necessity and effectiveness of unmanned aerial vehicles, or drones, as a tool for security.

Meeting the challenge

Meeting The Challenge

After 9/11 and the recent bombings in Boston, the issue of security has become an increasingly pressing matter across the country

LAX gets it

LAX Gets It

According to LAX, the airport is undergoing a $4.11 billion capital improvement program that covers everything from new high-tech gates to receive latestgeneration aircraft to upgraded retail and restaurant outlets. Enhanced security is a major part of this investment.



Printers increasing security

Printers Increasing Security

DPS had a few sporadic ID system capabilities throughout the district; however, this made it difficult to implement standard process improvements that would speed up the creation of new IDs at the beginning of each school year.

Lets Shake On It

Hardly a day goes by without hearing someone extol the virtue of partnerships. In a global environment, partnerships often provide the resources to start the wheels of a project turning and keep it rolling to the finish line.

Real-time Intelligence, Real-world Results

To reduce the emerging problems with vandalism and theft, Marine Container’s management team knew they needed to monitor access to its facilities and property. With a 130,000-squarefoot warehouse and six acres to monitor, this was no small feat.

Intelligent Protection - The next generation of Intermodal security

Intelligent Protection

Cargo theft is the costliest crime in America, reporting an estimated $25 billion in merchandise stolen, with incidents on the rise, according to the International Cargo Security Council.

The Heat is On

The Heat Is On

As police surrounded the suspected Boston bomber hiding inside a boat stored behind a Watertown, Mass., home last April, officers with a thermal camera peered through the hull and tarp to watch his every move.

To Store and Protect

IP surveillance allows port officers access to relevant information from anywhere at any time, and delivers automatic incident alerts and alarms to reduce incident response times.

Indiana Courthouse Deploys Brivo Access Control

Brivo Systems LLC, leader in cloud applications for security management, today announced that the historic courthouse in Crown Point, Ind., has substantially upgraded their access control management capabilities with a cloud-based Brivo ACS WebService system.

Staffing Issues

Staffing Issues

Security has never been more important to organizations of all sizes and industries across the United States.

Strength in the alternative

Strength in the Alternative

When it comes to choosing the best digital security and surveillance solution, there is a lot of confusion around bestof- breed solutions compared to commercial off-the-shelf or turnkey solutions.

more access control

More Access Control

In today’s more dangerous world, electronic access control assuredly provides a heightened solution to mechanical locks.

Stop theft in its tracks

Stop Theft in its Tracks

You don’t produce 170 million barrels of oil in a single year without being an innovator. That’s exactly what EOG Resources Inc. is—an innovator and a game changer.

School security gets smarter

School Security Gets Smarter

From program management to application and deployment, security practitioners from schools, corporations and government agencies are asking: Do we have enough security?

Quantum Secure Now on FIPS 201 Approved Products List

Quantum Secure Now on FIPS 201 Approved Products List

Physical access and identity management now available to federal agencies.

Safe and Secure Data in a Digital World

Safe and Secure Video Data in a Digital World

As the world moves more and more toward digital, securing data is essential.

HID Global Prime Contractor for US Citizenship and Immigration Services Green Card Program

HID Global Prime Contractor for US Citizenship and Immigration Services Green Card Program

HID Global awarded contract to manage production and delivery of up to two million state-of-the-art secure ID cards.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.