Top Stories


countering domestic ieds

Countering Domestic IEDs

Improvised explosive devices (IEDs) are no longer an overseas or war zone threat; they are an increasing threat on U.S. soil from both global and domestic terrorists.

Cellular Challenges

Cellular Challenges

Connection of industrial network devices with a cellular modem can be challenging. In most cases, industrial network devices are operating backwards from how typical consumers utilize an Internet connection over a cellular modem.

the future is here, you just have to find it

The Future is Here, You Just Have to Find It

I wanted to share some of our technology visions and the IP video trends we see shaping up in the near future. What might some of the most forward looking real-world security installations look like five years from now?



Mobile Discussion

Mobile Discussion

As they use mobile applications in other aspects of their lives, students entering the workforce will fuel demand for increased use of their smartphones.

adding ip video to manage shrink

Adding IP Video to Manage Shrink

Milestone provides Creaseys Guernsey management team and supervisors with an effective tool for protecting the outlet from cash handling and high-value item theft.

Lights, Camera, Action

Lights, Camera, Action

Just as cutting edge movie-making technology has changed the face of the entertainment industry, cutting-edge IP video surveillance technology has changed the face of physical security.

Lighting a New Design

Lighting a New Design

A large, multinational banking institution with several thousand branches across the United States was faced with inconsistent exterior lighting around entrances, ATMs and night depositories, which presented potential security and safety issues for customers and employees.

Security Industry Association Voices Support for School Security Initiatives

The SIA announced the formation of a committee to assist lawmakers with the issue of school security.

MOBOTIX Welcomes TOTUS Solutions as Technology Partner

MOBOTIX delivers IP surveillance to outdoor, lighting-based security platforms.

The American Symbol Comes Under Video Surveillance

The American Symbol Comes Under Video Surveillance

Berry College has welcomed a couple of new "students" to their campus - a pair of bald eagles, representative of America.

American Fibertek Positioned to Take Advantage of Changing Landscape

With American Fibertek's innovative, infrastructure technology and value, this company is fulfilling idustry demand.

CTO of HID Global Shares Projections for Top Secure Identity Trends of 2013

HID Global's Chief Technology Officer, Selva Selvaratnam, outlines secure identity trends that will influence how organizations will create, use and manage secure identities.

Morse Watchmans Key Control Saves Time and Improves Service

Morse Watchmans Key Control Saves Time and Improves Service

At the Birmingham Marriott Hotel, in Birmingham, England, a key management system frees up staff in order to better serve their guests.

Matrix Systems Welcomes New Regional Sales Manager

Matrix Systems Welcomes New Regional Sales Manager

Steve Kingsbury, new regional sales manager for Matrix Systems, is welcomed to the company.

First Transmission Solution App Launched

First Transmission Solution App Launched

ComNet announced a mobile app that identifies signal transmission solutions, and it's available at no charge.

Quantum Secure Appoints John Skowronski as VP of Global Sales and Announces Record Revenue

Quantum Secure Appoints John Skowronski as VP of Global Sales and Announces Record Revenue

An experienced executive is appointed to expand the sales channel and partnerships for PIAM supplier.

XTex Technology Secures and Coordinates Presidential Inauguration

XTec Technology Secures and Coordinates Presidential Inauguration

XTec Incorporated worked with DC Government’s Homeland Security & Emergency Management Agency and the National Guard to provide mobile accountability and tracking during inauguration events.

Online Exclusive: Calculating the Relative Performance of a PIDS System

Calculating a realistic Probability of Detection (POD) or determining a measurement of actual detection performance for a PIDS is not quite as simple as many people believe. You need to understand the highly interactive and closely coupled relationship that exists between the detection of intrusions versus unwanted nuisance alarms.

Featured

  • Facing Facts for Facilities

    Despite the proliferation of constantly evolving security solutions, there remains a troubling trend among many facility operators who often neglect the most important security assets within their organization. Keys and shared devices like radios, laptops and tablets are crucial to successful operations, yet many operators are managing them haphazardly through outdated storage systems like pegboards and notebooks. Read Now

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

  • TSA Begins REAL ID Full Enforcement Today

    Today, the Transportation Security Administration (TSA) announced the imminent implementation of its REAL ID enforcement measures at TSA checkpoints nationwide. Read Now

  • Body-Worn Cameras on the Rise

    On the evening of Oct. 29, 2024, the owner of 300 Guard based in Houston, was shot while on duty at a convenience store. He returned fire. He was wearing a plated vest and thankfully recovered in the hospital. Read Now

  • Brazil Port Enhances Surveillance and Supports Wildlife Conservation with Sustainable Technology

    Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritizing sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.