Top News


Verint Launches its Road to Certification Technical Training Roadshows System

May 15-18 Verint’s “Road to Certification” roadshows are designed for system integrators who manage, utilize or support the Nextiva VMS platform.

RSA Conference Announces Recipients of 15th Annual Award Program

RSA Conference, the world’s leading information security conferences and expositions, recently announced the honorees of its 15th annual awards program.

Diamond in the Rough

Though the thief stole thousands of dollars worth of jewelry, the Calderons were just thankful to be alive.

Tap Into Security Remotely

Organizations whose operations span cities, countries and even continents face formidable challenges in their efforts to secure people, property and assets.

What The Glock

Come and listen to the story of an Austrian named Glock, He and wife, Helga, made curtain rods in their shop, Then one day he invented a new handgun, And the Austrian army said, “We gotz to have us one.” Glock, that is. Lightweight. Model 17. Well, the first thing you know ol’ Glock’s a billionaire, Kinfolk said, “Gast’, export it away from there!” Said, “USA is the place it oughta be.” So he marketed it abroad to frontline security. The police, that is—needing new fire power.

Securing the Global Trade Market

Advances in communication technology, trade barriers and production cost reductions have furthered global capital markets and provided new economic opportunities.

Growth in SaaS, Mobile Applications Increases Requirement for Software Security Testing at Scale

Veracode Inc. recently announced the availability of a whitepaper, ‘Outsourcing the problem of software security’, produced by primary research and analysis company, Quocirca.

Alarm Protocol

Many people—even within the security industry—may be surprised to learn how traditional alarm dispatches work. It can be a lengthy process.



Study: Encryption Critical to Increase Security Posture

Thales, provider of information systems and communications security, recently announced the publication of the 2011 Global Encryption Trends Study.

Upgrading To A New Era

In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.