Top News


Queen of Peace

Queen of Peace

Radius, a second-generation Enterprise Mobile Duress System (EMDS) that leverages a life-safety, wireless infrastructure and duress pendants to locate a mobile person when and where they need help has been the ideal solution.

All Eyes on Campus Safety

All Eyes on Campus Safety

The shooting spree at Sandy Hook Elementary in December 2012 shattered the sleepy town of Newtown, Conn., and once again shattered America’s notions of what constitutes a safe place.

The Fiscal Side of School Security

The Fiscal Side of School Security

Educators aren’t security experts, so they need to partner with integrators and consultants who can guide them through the practical aspects of designing and deploying a workable security strategy for their schools and campuses.

The state of current affairs includes better access control

Focus on Campus

As part of a continuing effort to improve security for its students, Adams State University is upgrading its access control system with new electronic locks that are easy to reconfigure as requirements change.

Standing Above the Rest

Standing Above the Rest

The Penn-Harris-Madison (PHM) School Corporation exercises its security plan often, and to that end, they invite local law enforcement and their security provider, Honeywell Building Solutions, to participate in enforcement procedures, mock events and planning.

Security Masterpieces

Tyco realized that by offering products in access control, video, intrusion and location visibility that this created a palette of truly-inspired, best-in-class solutions that form security masterpieces.

Stopping Truck Bombers

Stopping Truck Bombers

The following provides examples in which highly-secure, crashrated, vehicle barricade systems and bollards have saved lives as well as buildings and property from the destruction of attacks.

IP video has many benefits outside of security

Empowering the Next Generation

An underappreciated benefit of IP-based video surveillance systems is their ability to transform video into useful information.



Air RAID

Redundant Array of Independent Disks (RAID) is a method for configuring multiple disks or hard drives in a single array. While there are many levels of RAID, focusing on RAID 5 for video surveillance is key.

Putting PIV Cards to Practical Use

Putting PIV Cards to Practical Use

The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.

Featured

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities