Top Stories


Fujitsu Launches PalmPartner Program

Fujitsu Frontech North America Inc., a provider of IT-based business solutions, including advanced technology products, biometric security, and digital media solutions, recently announced a new channel sales program called PalmPartner that is designed to educate and to provide technical, marketing and sales support for Fujitsu’s PalmSecure product resellers, technology partners and system integrators.

Research: Axis Communications Now Top Global Surveillance Camera Provider, Even When Including Analog

Axis Communication, a video-surveillance company, is now ranked as the number one global manufacturer of surveillance cameras in the latest IMS Research report.

Report Says Global RFID Market Will Continue Growing in Next Four Years

TechNavio's Global RFID Market Report says radio frequency identification is expected to grow in the healthcare industry.



New York City Real Estate Firm Using EasyLobby Secure Visitation Management Software

Trinity Real Estate, a firm based in New York City, is using HID Global's EasyLobby Secure Visitor Management software to streamline how tenants can control visitor access at their firm's commercial real estate properties in Lower Manhattan.

Researchers Building Computer System That Can Protect Itself From Online Attacks

In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself.

Patriot Bank Installs Diebold Fire, Security Technology

Patriot Bank of Tulsa, Okla., has added new Diebold fire and security systems in an effort to protect their customers and employees.

Web TV Production Studio Using New Cameras to Stream Live Concerts Around the World

Benow.tv, a Web television-production studio, is using cameras to stream live concerts from premier clubs around the world.

Report Says Cybercriminals Targeted Users of Major Social Networking Sites in April

GFI Software, a provider of web-monitoring software and security, has released a report citing the 10 most prevalent cyber-threats detected in April. The report says cybercriminals exploited people who use social networking sites Facebook, Twitter, Tumblr and Pinterest to spread malware and spam surveys.

Smoke Alarm Tips

Smoke alarms aid in protecting you and your family against fires, so it is important to properly maintain your alarms. Here the U.S. Fire Administration offers some valuable smoke alarm tips.

Johnson Controls Expands Fire and Burglary Monitoring Services

Johnson Controls, a Milwaukee-based alarm-monitoring facility, is now using IP-based alarm transmissions instead of analog to monitor fire and burglary panels.

Merck Pharmaceuticals Installs Arecont Vision Megapixel Cameras at Mexico Facility

Merck Pharmaceuticals has installed an Arecont Vision megapixel technology solution at their new facility in Mexico to help ensure that all activity and incidents are captured in high-resolution video.

CyberLock Develops System to Help Water Utilities Meet EPA Guidelines

CyberLock Security Systems is working to help water utilities meet EPA guidelines for protecting watersheds and sources of drinking water.

TriEd and Northern Video Distribution Partnering With VideoIQ

Tri-Ed/Northern Video Distribution is partering with VideoIQ, a leading innovator in intelligent video analytics and surveillance. .

Department of Homeland Security to Test U.S. Bridges for Vulnerability

The Department of Homeland Security’s Science and Technology Directorate (S&T) has joined forces with the Federal Highway Administration and the U.S. Army Corps of Engineers Engineer Research and Development Center to conduct series of experiments that assess potential vulnerability of critical structural components of aging steel bridges.

New Technology Could Help Thwart Nuclear Terrorism

Attacks involving nuclear devices or materials are among the terrorism scenarios that raise the most concern. For that reason, technology that can effectively detect smuggled radioactive materials is considered vital to U.S. security.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

Israeli Bank Selects NICE Technology

NICE announced recently that Israeli bank, Bank Mizrahi Tefahot, selected the new NiceVision banking solution to secure its branches and ATM systems located throughout Israel. The new NiceVision banking solution captures video recordings inside branches and from ATMs for fraud detection and claim settlement, and allows for easy access and retrieval of video evidence -- supporting compliance with law enforcement requirements.

Report: Mobile Use of Social Networking Becoming Preferred Way to Infect Mobile Devices

AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.