Top News


Theft on Wheels

Theft on Wheels

Oddly enough, in a world where virtually any item is only a mouse click and 24-hour delivery window away, we tend not to think much about how our merchandise gets from some warehouse to our front door. Unfortunately, there are thieves who do.

Smart City Technologies

Smart City Technologies

Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.

Ushering in a New Era

Ushering in a New Era

Privacy issues continue to dominate headlines as the world’s biggest companies are being challenged on the ways they collect and use people’s data. Consumers are growing more concerned about how their activities are being tracked across the web as companies sell information to advertisers for a profit.

The Technology Role

While the political discussions that focus on how to secure America’s borders rage on without a clear resolution regarding what or how policies and procedures could change, one element of the discussion remains clear and present–that technology must and will play an ever more significant role at the U.S. border.

Technology at Risk

The San Francisco Board of Supervisors’ vote to ban the use of facial recognition technology puts the city at risk of not only falling behind on technological innovation, but returning to what one expert described as archaic processes.

Quality Control is Everything

Quality Control is Everything

In today’s world, there are a myriad of different manufacturers that produce similar products and there are so many options available to customers.

Are Contractors Ready for DOD’s Cybersecurity Framework?

Are Contractors Ready for DOD’s Cybersecurity Framework?

Contractors will face big changes and tight timelines next year when the Defense Department institutes its new Cyber Maturity Model Certification framework



Expanding Cybersecurity Solutions

Expanding Cybersecurity Solutions

Under GDPR, companies can be fined for not having their records in order, not notifying the supervising authority and those affected by a breach, or not conducting an impact assessment.

best buy store

Family of Murder Victim Sues Best Buy, Delivery Companies For Poor Background Check Practices

Evelyn Udell was allegedly killed by a deliveryman employed by a Best Buy contractor. Her family says her death could have been prevented by better background checks.

Featured

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.