Top News


Outside the Walls

Outside the Walls

When it comes to video surveillance for outdoor use, security solutions often require specialized camera technology to be effective and maximize monitoring capabilities.

The How and Why

Current RFID devices, particularly those operating at 125 kHz, are not suitable for secure identification. Proximity credentials that operate at 125 kHz are vulnerable to cloning.

A True Calling

A True Calling

If the pandemic has taught us anything, it’s that secure remote access to systems is no longer a “nice to have” feature.

A Technology Advancement

It is amazing that the year of convergence from analog to IP was supposed to be 2008 but it was not until 2012 that IP-cameras started to outsell analog cameras. We sure have come a long way from those analog-oriented days.

The New Age

The New Age

During the early days of the COVID-19 pandemic, commercial passenger air travel in the United States dropped by more than 90%.

Grooming the Landscape

The explosion of IoT devices in today’s technology landscape makes a perfect storm for attackers to exploit.

cybersecurity map

Timing Isn't Everything But It Helps

Many lessons were learned in enterprise IT and security teams in 2020, right down to the final weeks of the year with the Solarwinds attack. We closed out a miserable year with a devastating reminder about the danger of third party access and supply chain attacks.

DHS Issues a National Terrorism Advisory System (NTAS) Bulletin

DHS Issues a National Terrorism Advisory System (NTAS) Bulletin

The Acting Secretary of Homeland Security has issued a National Terrorism Advisory System (NTAS) Bulletin today after consultation with the intelligence community and law enforcement partners. There is currently a heightened threat environment across the United States that is likely to persist over the coming weeks.



Genetec Broadens its Access Control Offering for Government Customers

Genetec Inc. has announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis™ access control system with support of Veridt Stealth access control readers.

Rave Mobile Safety Announces 11th Consecutive Year of Double-Digit Revenue Growth

From ensuring 9-1-1 dispatchers had the best data to provide situational awareness to responders, to offering tools that enable collaboration for the immediate response to civil unrest, to solutions to effectively communicate the latest official information on COVID-19, Rave provided support to customers in a year that thrust public safety and health to the forefront.

Featured

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.