Top Stories


Speco Technologies Unveils Highest Resolution DVR

The new D16DS DVR, which provides a thirty percent increase in “full D1” resolution for analog cameras, is now available from Speco Technologies.

Security System Takes Wing

Springfield-Branson National Airport, located in Springfield, Mo., which has a population of 400,000, recently underwent a large expansion project.

Addressing The Insider Threat

Airline and airport workers require access to sensitive and restricted areas every day. Ensuring that only authorized staff has access to restricted areas is an important aspect of airport security, and one that requires the same high level of attention as passenger security threats.



A Good Pedigree Helps

Good networking and a professional pedigree are significant advantages in any professional endeavor, but in the security world, qualifications mean just about everything. And, it doesn’t hurt to have a love for the business either.

Total Airport Security System: Integrated Security Monitoring Platform

According to the Department of Homeland Security, more than 730 million people travel on passenger jets every year, and more than 700 million pieces of baggage are screened for explosives and other dangerous items.

Straight to the Heart of Cyber Security, Warfare

We often talk about security in terms of commercial and industrial ventures, but the military also speaks of security, and their message varies little from what we hear at tradeshows. In fact, the military is quite interested in private industry partnering where there is value and productivity is placed on many communities in our nation.

Wide-Scale Municipal Security

When Brown County, Wis., decided to install a centralized surveillance solution throughout its government facilities, Milestone XProtect Corporate video management software was deployed over the existing private communications fiber network to increase safety for its departments.

The Facts Speak for Themselves

The numbers speak for themselves. Reducing employee theft within your organization is one of the quickest ways to grow your bottom line. On average, employees steal an average of $1,944 per incident—more than eight times higher than shoplifters.

Deterring Crime on Campus

Over the past two decades, increasing crime and violence in American schools have highlighted the critical need for safer, more secure campuses.

RMR For The Cost Of A PIR

The world has changed. Free video is everywhere. Nobody carries a separate camera anymore—everything is a camera, including laptops, iPads and cell phones.

A Universal Solution

In recent years, colleges across the country have upgraded and improved the way they monitor, assess and respond to security incidents on campus.

Security On The Runway

Security On The Runway

Security in airports has always been a high priority, with high visibility. However, the perimeter surrounding the airport is still, in too many cases, neglected.

Security Awareness Training

While the variety and sophistication of cybersecurity technologies has expanded exponentially over the last decade, the ability of organizations to defend themselves against security breaches doesn’t seem to be improving.

Video Evidence 101

Public schools may not be a hotbed of criminal activity, but they do have their share of incidents on campus that need to be investigated.

Biometrics on the Front End

Unlike other forms of strong authentication, biometrics is the only means of determining who is using the system. Systems relying on PINs, passcodes or less reliable means of user authentication are rapidly becoming both ineffective and obsolete.

Worlds Colliding

There’s no question that the 21st century has brought significant change to security solutions. An abundance of connectivity options and the application of technologies—such as IP, virtualization, hosted solutions and mobile—are enhancing the way we secure the enterprise and helping to improve security.

Managing School Visitors

As a kid, I lived across the street from the school in sleepy Byron, Wyo. It was a wonderful community where everyone knew everyone’s business. Going to school was like going to church; adults could come and go as they wanted.

v2.0 and Counting

Just as typewriters and paper gave way to personal computers and floppy disks, tablets, smartphones and the mobile apps that can be used on these devices are becoming the technology of choice for business and personal use, including the physical security industry.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.