Top News


If You Thought Megapixel Cameras Were More Expensive, Think Again

There is a misconception in the security industry that megapixel cameras are more expensive than conventional cameras. Don’t believe it.

Closing Out 2012; Hello New Year

As we close out 2012 and stare into the reality of 2013, I am reminded of all that has happened in our publishing world this year. It has been a wonderful time.

GovSec West Exhibitors Greet Large Crowds

The more than 40 exhibitors were one of the highlights of the conference that wrapped up in October in Dallas.

Securing The Coming M2M Communications Boom

It is beyond dispute that Machine to Machine (M2M) technology and communications will influence our daily personal and business lives in the coming years.

Current and Future Trends Abound

While technology developments such as near-field communications (NFC) and personal identification verification (PIV) credentials are becoming more widespread, emerging product developments that offer interesting challenges to the traditional concepts of access control, like ecosystems and access control as a service (ACaaS), are presenting more of an opportunity for suppliers of access control equipment.

Bordering on Chaos

Wireless for Utilities

Utilities and governments around the world are investing billions of dollars into upgrading the existing analog electric, gas and water grids into two-way communication networks capable of optimizing distribution and reducing costs for consumers.

Distributed Storage Done Right

Scalable system architectures have been the source of many debates within the security industry.



Tackling Theft

In a challenging, ever-changing retail environment, it’s more important than ever for retailers to find innovative solutions to tackle enormous margin-eaters, like theft, in order to create operational efficiencies and protect their bottom line.

Using Similar Strategies as Public Health Could Improve Cyber Security

In a new paper by a team of economists and public health researchers, maintaining good “cyber hygiene” and improving overall cyber security can be achieved by mimicking public health strategies.

Featured

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.