Mobile Security


Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

Security and Privacy for Wearables Not So Good

Security and Privacy for Wearables Not So Good

By 2019, it is predicted that more than half a billion wearable devices will be in use each day.

Two Big Problems with Fingerprint Security

Two Big Problems with Fingerprint Security

One tech expert says biometrics are good, but there are still problems to consider.

SmartTek Systems Grants OnWatch of Australia Exclusive Rights

Agreement opens floodgates for international expansion.

Planes Searched Amid Security Concerns

Planes Searched Amid Security Concerns

One commercial flight was diverted while two were also evacuated

Jimmy Kimmel Exposes Bad Password Security

Jimmy Kimmel Exposes Bad Password Security

The late night host was able to get passwords from strangers off the street in a skit on his show.

Mobile Apps have Exploded

Mobile Apps have Exploded

In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed.



Searching the Horizon

Searching the Horizon

As the time nears on the shutdown of the second-generation, or 2G, wireless network, now is the time for security dealers and integrators to not only start planning for this massive migration but also begin searching for opportunities to make this change easier for themselves as well as their clients.

BlackBerry and Boeing Team up for Self-Destructing Phone

BlackBerry and Boeing Team up for Self Destructing Phone

The BlackBerry Enterprise Server (BES 12) will be integrated into the phone.

Evidence Gathering and Management to Get Smarter in 2015

According to eMarketer, the United States will pass 50% Smartphone penetration among its population.

Tips to Improve Holiday Cyber Shopping Security

Tips to Improve Holiday Cyber Shopping Security

These tips will help secure pay data when shopping online

80 Percent of Patients Worry for Health Data Security

80 Percent of Patients Worry for Health Data Security

A new report indicates consumers remain concerned about medical technology and the security of their health information and data.

7-year-old Hacks Apple Touch

7-year-old Hacks Apple Touch

Stealthy youngster uses ninja-like skills to gain access to his father's iPhone6.

Apple Gets First Real Virus Scare

Apple Gets First Real Virus Scare

Wirelurker sneaks onto computers using unauthorized Chinese apps.

Guardly Enterprise E911 Solution Improves Active Shooter Response

New indoor positioning systems enhance ability for security teams to detect shooters earlier and locate people inside buildings.

mPERS Mobile App Trio Introduced by SmartTek Systems Provides Dealers with a Competitive Edge

Central station-based Smartphone apps that provide anywhere, anytime life protection services and new revenue stream for partners.

Do Not Post Pictures of Your Completed Ballot on Social Media

Do Not Post Pictures of Your Completed Ballot on Social Media

Steep fines are being issued and some are having their votes invalidated.

Using Bluetooth-enabled Devices as the Key to Remote Monitoring

As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security.

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

The ruling doesn’t allow police to unlock phones using passcodes, however.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”