Top Stories


The DLR Standard

Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.

ObjectVideo, Tyco Security Products' American Dynamics Business Unit Enter into Patent Licensing Agreement

ObjectVideo, Inc., announced today the signing of a global patent licensing agreement with Tyco Security Products’ American Dynamics business unit. This agreement provides American Dynamics access to ObjectVideo’s portfolio of video analytics patents as American Dynamics develops and launches a wide-range of its own video analytics software and hardware products.



Reaching Each Milestone On Time

The IT division’s network team at WKU implemented Milestone’s open platform video management software, XProtect Corporate.

Credit Union Gets Good Grades

Teachers Credit Union, headquartered in South Bend, Ind., is the largest credit union in the state, reaching from inside the Michigan border from Niles, Mich., to Greenwood, Ind.

Las Vegas Store Secure with Moonblink

One retail store on the Las Vegas Strip now has a higher level of security thanks to Moonblink Communications.

A Tale of Three Cities

Salvaging the existing investment in coax cabling is often the number-one reason surveillance users are reluctant to switch to network video. The perceived cost of storage is a close second.

Digitizing Documents For Increased Security

Anyone involved in law enforcement knows how crucial secure document management is to efficiency across all departments.

Remote Possibilities

A security guard doing his nightly rounds on the perimeter of a power plant encounters a car left in a restricted area outside the security fence. The driver is nowhere to be found. Is this a threat?

Cellular Activity

This just in: There are now more cell phone users on the planet than wearers of shoes. That random yet eye-opening nugget comes courtesy of WikiAnswers, so consider the source, but still: more than shoes?

Adapting to Change

Adapting to Change

Perhaps the most common challenge and opportunity facing any industry in today’s world is creating solutions that can accommodate the transitions that come with the rapid advancement of technology.

Respect the Border

Not only do we as U.S. citizens have a right to be concerned about security, we should be up in arms about what the federal government is not doing to protect our country.

Principles for Intrusion Detection

The best defense is a good offense. That often-used sports principle applies to military applications. It is an axiom that applies to the security industry, as well.

Colorado Judicial Center Installs New System to Comply with Government Mandates

The Ralph Carr Judicial Center in Denver, Colo., on track for completion in spring 2013, selected AMAG Technology’s Symmetry Homeland V7 Security Management System.

G4S Joins Coporate Partnership Program Supports IACLEA

G4S Joins Corporate Partnership Program Supports IACLEA and Campus Public Safety

The G4S partnership, under a program developed to honor IACLEA’s 50 years of service, will support initiatives to enhance campus public safety at higher education institutions around the world.

Australia's Largest Retailer Enhances Surveillance Across 1,300 Sites

Woolworth's Limited, an Australian retail market, will soon deploy new visual intelligence software across thousands of existing March Networks video recording systems in a phased upgrade program. The software delivers enhanced live monitoring and searching capabilities that make it even easier for the retailer to centrally manage surveillance video used for security and loss prevention in more than 1,300 remote locations.

Monitoring Quality Assurance at Wholesale Food Distribution Co.

Arecont Vision megapixel cameras are finding new applications above and beyond conventional video surveillance solutions. At General Trading Company, a private wholesale food distribution company in Carlstadt, N.J., the Arecont Vision cameras were installed to update the operation by providing an overview of employee performance and productivity and to review inbound and outbound shipments for quality control as well as expand existing surveillance coverage of the facility.

HID Global NFC Mobile Access Control Pilot Program Arizona State University

Arizona State University's New NFC Mobile Access Control Pilot Program

The world's first university pilot of NFC smartphones carrying digital keys was recently completed.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.