Top News


Connecticut Governor Gives State Gun Laws a Makeover

Connecticut Governor Gives State Gun Laws a Makeover

Armed with pen in hand, Gov. Dannal P. Malloy makes a strong statement about gun control by signing strong and harsh Connecticut legislation.

Top 10 Security Apps for iPhone Plus 5 FREE Bonus Apps

Top 10 Security Apps for iPhone Plus 5 FREE Bonus Apps

With over 500,000 apps in the Apple App Store, what security professional has time to wade through that list? I have compiled a list of the top 10 security-related, must-have apps.

Sentry360 ISC West Preview

Sentry360 ISC West Preview

Check out Sentry360's ISC West 2013 show preview and see what company Sentry360 has partnered with.

Woodhouse Day Spa Improves Customer Experience with IQinVision Monitoring

Woodhouse Day Spa Improves Customer Experience with IQinVision Monitoring

IQeye megapixel cameras keep track of staff and guests with ease, deepening relaxation.

Third Iris VIAAS App Now Available on Apple App Store

Third Iris VIAAS App Now Available on Apple App Store

New VIAAS iOS app allows users to easily view current surveillance activity and simplifies investigation of historic surveillance videos and images - anytime, anywhere.

PlustekSecurity Debuts Two Hi Def Edge Network NVRs and ONVIF Video Encoder at ISC West

PlustekSecurity Debuts Two Hi Def Edge Network NVRs and ONVIF Video Encoder at ISC West

Security surveillance manufacturer to give live demos of new devices at ISC West 2013 in Las Vegas.

American Dynamics Expands High Definition IP Camera Line

American Dynamics Expands High Definition IP Camera Line

New Illustra 600 Box and Bullet Cameras bring high-quality, superior low-light performance and are easy to install.

Taiwan Companies to Showcase Innovative and Stylish New Products at ISC West 2013

Taiwan Companies to Showcase Innovative and Stylish New Products at ISC West 2013

Top security equipment makers from Taiwan will display new products at an event press conference.



Always Excitement in Vegas

At any tradeshow the size of ISC West, you have to wonder what is new. I think about this every time we make plans to attend and set up booth appointments.

Get Sweaty to Help Children in Need at The Security 5K

Get Sweaty to Help Children in Need at The Security 5K

You must be the change you want to see in the world.(Mahatma Gandhi)

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.