Top Stories


Shaping the Use of Technology

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.

Adapting to See Change

Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality. 

Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.



Enhancing Autonomy Software

In the realm of national and global security, safeguarding critical infrastructure is paramount. It is not just about erecting physical barriers; it is about deploying perimeter security software capable of autonomous detection, alerting, and deterring potential threats. The integration of autonomy software into existing perimeter security systems marks a significant advancement in this field and is now imperative for an effective system.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

How to Roll Out Microsoft Copilot Securely and Ensure Data Security

Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks. However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.

Going Beyond the Perimeter

Wireless locks are a growing segment of the electronic access control (EAC) market, increasing at a rate of 8% annually in the Americas, according to OMDIA. They can be used in a variety of applications and provide many of the benefits of traditional hard-wired access control. Depending on the type, they can be managed as standalone solutions or as part of Physical Access Control Software (PACS) systems.

The Need to Hear and be Heard

Have you ever tried to watch a movie in a movie theater and the sound suddenly stopped working? Or you attended a musical concert, but the sound system failed? What happened? More than likely, the movie or concert stopped until the sound and audio were fixed. Or if it could not be fixed, you likely departed and your money refunded. After all, it is pointless to watch a movie or attend a concert without sound. You are not getting the whole experience.

3xLOGIC Launches VIGIL NVR Case Management Providing Cloud Storage for Sensitive Video Clips

3xLOGIC, a provider of integrated and intelligent security solutions, has launched VIGIL NVR Case Management, a cloud storage solution designed for sensitive video clips. The standalone solution provides cloud storage capability to VIGIL NVRs, making it easier for operators to review, share, and store video clips in a single place.

Getting Smarter About AI

The past few years have seen companies throughout the security and surveillance industry expand their use of AI, some rapidly adopting the technology and others dipping their toes in the water. Either way, AI has certainly moved beyond being an emerging technology to now being a proven reality, with demonstrated abilities to improve security camera imaging performance, enhance the accuracy of people and object detection, reduce false alarms and conserve recording and network bandwidth.

Security Industry Association Expands Its Team to Better Serve Its Members

The Security Industry Association (SIA) has welcomed four new members to the SIA team to support the association’s members and initiatives: Rachel Tayag, associate director of learning and development; Adriana Lopez Cadima, senior manager of design and videography; Natalie Robinson, senior manager of member services; and Adom Yusuf, senior manager of standards and technology.

DHS Unveils Artificial Intelligence Roadmap

Secretary of Homeland Security Alejandro N. Mayorkas and Chief Information Officer and Chief Artificial Intelligence Officer Eric Hysen announced the Department of Homeland Security’s (DHS) first “Artificial Intelligence Roadmap.” The roadmap details DHS’s 2024 plans, including to test uses of the technologies that deliver meaningful benefits to the American public and advance homeland security, while ensuring that individuals’ privacy, civil rights, and civil liberties are protected.

i-PRO Will Showcase Docker Container Support on X Series Line of Cameras at ISC West

At ISC West 2024 on booth # 10037, i-PRO Co., Ltd. (formerly Panasonic Security), a provider of professional security solutions for surveillance and public safety, will showcase Docker container support on its new X Series line of AI-enabled cameras. Docker containers directly support i-PRO’s open platform development initiatives by providing a standardized way for application developers to rapidly advance the AI capabilities of i-PRO edge devices.

Some New Tricks

In the constantly evolving world of AI, you can blink and miss an innovation. This rapid pace of evolution means organizations are under increased pressure to invest in solutions that do not become obsolete a short time after they are installed.

Invixium Welcomes Chris Thompson as National Sales Manager for North America

Invixium, a provider of of biometric access control and workforce management solutions today announces the appointment of Chris Thompson as the new National Sales Manager to support its expanding North American territory. In this role, Chris will drive sales strategies, nurture key partnerships, secure new opportunities, and expand market presence across North America. With this appointment, Invixium aims to advance its industry leadership and growth trajectory in the Americas.

Vantage Standardizes Security at 32 Global Data Centers

Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, announced that Vantage Data Centers has transformed its global security operations using Genetec™ Security Center unified security platform and Genetec Mission Control™ decision management system. The leading operator of large-scale data centers recently standardized on the Genetec unified platform to modernize security at 32 data centers in North America, EMEA, and Asia Pacific.

To Cloud or Not to Cloud?

The cloud is a fact of life across all IT applications—and security is no exception. While most software applications today have moved to the cloud, security is a bit different. There are significant technical and budgetary challenges, particularly as the increasing volume (and image quality) of security cameras in use results in an enormous amount of video data transferred and stored in the cloud.

A 30,000 View

Today it seems like the cloud is everywhere. In the security industry, cloud-based video and access control solutions are certainly big trends. But how, and why, did the journey toward cloud-based video begin? And where is it headed?

Key Management Takes Flight in Tallahassee

In 2017, after attending a national security conference, Thomas Vergo returned to his Tallahassee International Airport (TLH) office with a profound idea. Placing a significant item on both his boss's and director's desks, he sought to revolutionize their approach to access control.

Municipal Digital Access

We hear about Smart Cities more frequently these days, due to considerable progress in recent years. But it is an initiative that has been around for decades. The idea emerged when analysts began using technology to collect images and data to help improve civic services, protect against disasters, and improve citizens' lives. At its core that is still the intent.

Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3