Online Exclusives


A Work of Art

Located on the campus of Duke University, the Nasher Museum of Art displays a growing collection of modern and contemporary art. With an exhibition space of more 65,000 square feet it is one of the most important university are museums in the country.

Verify the Signature

Banks, financial institutions, municipal, state and federal governments are demanding more reliable, less expensive authentication and authorization systems for everyday activities, from performing financial transactions to boarding an aircraft, entering a secure physical location or crossing international borders.

Leaving Your Mark

Today’s mobile professionals carry more sensitive information than ever before. A single laptop can contain information that can be valued in the millions, if not billions, of dollars.

Crossing the Chasm: Deterrence to Defeat

In this age of widespread easy access to personal information, identity theft has become the fastest growing and most lucrative crime in America.

Mobile Monitoring

Internet-enabled products and services are now gaining wider acceptance and delivering better results than before. Remote monitoring services are no exception.

Case Study: MITOC

Regardless of the scope and scale, when disaster strikes, first responders need a rapid and effective way to collect and communicate information in the early moments.

Tools Designed for Securing Tools

There are two "S"s critical to the construction industry: safety and security. Protecting workers from harm is obviously of primary concern, but protecting assets on the jobsite against theft is also on the top of one's mind.

Critically Speaking

Critical infrastructure organizations are essential to the functioning of societies and economies. The role of these facilities in international commerce makes their security a top priority. But given the complex and often geographically dispersed nature of these facilities and assets, critical infrastructure security often presents a daunting challenge.

On the Fast Track

An organization suspects that an employee is not following his or her route. In the past, a security manager would personally follow the employee or instruct someone to do so. This tactic is time consuming, especially if, on that particular day, the employee actually goes where he’s supposed to go.

Disaster Preparation for the 21st Century Business

Business is all about managing risk, and risk management comes down to making solid business decisions to avoid and mitigate potential threats, including natural disasters.

Safe and Risk-Managed

While every individual and organization that provides security products or services will have their spin on what security is and how to achieve the desired level, the truth is, security is essentially an unachievable outcome. A common definition of security is, “freedom from danger, fear and anxiety.” Security defined as such is, therefore, unattainable.

On the Fast Track

Rise of the Digital Certificates

Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?

Ready for Takeoff

When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.

The Power of PoE

With an explosive demand for security monitoring worldwide, cameras are appearing in every conceivable location. The challenge is how to support this rapidly growing infrastructure with affordable and flexible real-world solutions. The adoption of PoE offers new opportunities for the design of products directly powered over Ethernet lines, drastically reducing overall installation and maintenance costs.

Transit Agencies Work with TSA to Improve Security

Several New York regional authorities have teamed with TSA to increase security, focus on threats and to make funding available to the right people, for the right projects at the right time.

Sound the Alarm

If you pick up any local employment guide, you cannot avoid seeing the many call centers with ads that read, “Customer service representatives wanted—immediate hire.” Why are these call centers continuously struggling with hiring and turnover?

Meeting Terrorism Head On

Politicians know full well the impact of terrorism in Europe. They’ve faced it for years, if not decades.

Producing an Advantage

Have you ever looked at a surveillance image and wondered why the image quality is so poor when compared with the clear, detail-packed images captured by consumer digital cameras or even the newest cell phones?

Prepare for the Worst

Often, when people think of business continuity and disaster recovery, they immediately focus on protecting their employees and organization’s key assets, such as facilities and inventory. However, in more recent years, many have become significantly more reliant on computer infrastructures and the data that is produced with these systems.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.