Top News


Through several stages of card technologies, organizations still didn’t know who was carrying the card

Finding Biometrics

For more than 20 years, biometric hand geometry systems have been providing the highest level of security, access control and convenience in a wide range of applications all over the world.

Turning up the heat

Turning Up the Heat

The remote solar field was pitch black, yet the thermal cameras detected movement by the fence and sent out an alarm. The officer on duty at Campus Safety took one look at the thermal images streaming onto the video monitor and realized the magnitude of the alert.

A Strong Alliance

A Strong Alliance

When Pat Comunale, the president and CEO of independent security distributor Tri-Ed, began forming a relationship with India-based distributor Aditya Infotech, Ltd., it occurred to him that the relationship should be more than just a casual one. The two companies had great conversations regarding current market trends and the future of the industry.

Investing in the Custom Channel

IC Realtime is Sailor’s vision that started in 2005, in large part because he didn’t feel the company he was then working for was doing things right. He saw a void in the security industry and felt certain he could fill it.

GovSec West Exhibitors Feature Several Products and Solutions

GovSec West Exhibitors Feature Several Products and Solutions

A comprehensive overview of this year's GovSec West 2013 Conference and Expo provided by the staff at Security Products magazine.

Michigan community protects beachgoers and harbor

A Swell of Security

Code Blue Corp. was tabbed by the city of South Haven to install a pair of blue light pedestals, equipped with emergency speakerphones operated by a high-tech software system.

Stay Away

The good people of Newtown, Conn. have pleaded with the media to stay away during the first year anniversary of the now infamous shooting at the elementary school. Has anything changed so significantly that the national media feels it must descend upon the village and try to cover new ground?

Management systems solve compliance issues of multi-state gaming rules and regulations

Key Control

In the American casino industry, the name Boyd Gaming stands out as a model of business efficiency and success.



An Essential Tool - Customer-centric security operations now require mobility

An Essential Tool

Mobile devices and mobile apps have become a fixture in the lives of people around the globe.

Video Insight to Donate Video Surveillance Systems to Schools and Colleges Via Security Grant

Video Insight to Donate Video Surveillance Systems to Schools and Colleges Via Security Grant

Security professionals step up to help make and keep schools and colleges safer.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.