Top Stories


Trendy Beverly Hills

Trendy Beverly Hills

Beverly Hills, Calif., has been glamorized in countless film and television depictions as the home of the wealthy and the famous.

Changes are Coming

Changes are Coming

During the past 10 years there have been some magnificent technological innovations in the security industry, but the pace of change has never been higher.

Appropriate Response

Appropriate Response

Everybody knows the old saying that the only things certain in life are death and taxes. But, alarm dealers understand that there’s a third certainty: false alarms.



Capturing Teachable Moments

Capturing Teachable Moments

When you’re conducting a therapy session, it’s virtually impossible to be fully engaged with the client and be an objective observer of your own interactions at the same time.

The Zoo at Night

The Zoo at Night

The fierce competition in the hospitality market has created a need to think creatively in order to increase the number of visitors. Therefore, Copenhagen Zoo constantly looks for new ways to give their customers an interesting and out-of-the-box experience.

Building a Foundation

Building a Foundation

Now more than ever, major network vulnerabilities are making national and international news headlines.

More Comfortable Operations

Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.

Technologies Drive Interagency Collaboration

Technologies Drive Interagency Collaboration

Cities are a challenge to secure and manage—they encompass a wide geographic footprint and include a multitude of key stakeholders comprising local, state and federal agencies along with a variety of private business entities and public organizations.

Collaboration is Key in the Video Vortex

Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.

A Strategic Approach

A Strategic Approach

The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.

How Cyber Secure Are Your Physical Security Devices

How Cyber Secure Are Your Physical Security Devices?

Are your physical security devices attached to the same network as your sensitive business data?

Connecting Disparate Systems

NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets.

How Secure are Your Devices?

Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.

Hearing Security Solutions

Hearing Security Solutions

Audio is a vital component in the security industry. For years, companies have focused on video, trying to perfect image capture, data storage and analytics.

Should Nuclear Missiles be on High Alert

Should Nuclear Missiles be on 'High Alert?'

Hopefully, hackers have heart not to launch nuclear weapons.

Proposed Security Guard Training Measure Delayed Again

Proposed Security Guard Training Measure Delayed Again

The measure, from the Pittsburgh City Council, would require security companies that guard large buildings to put their employees through a city-approved training program.

Paint Booth Expansion Creates New Opportunities for Code Blue

1,500-square-foot facilities will further strengthen its reputation for providing emergency communication solutions.

LILIN Launches New Mobile Video Surveillance Solution at APTA

American Public Transportation Association conference scheduled for May 5, 2105 at the Fort Worth Convention Center.

Securitron Secures Perimeters with New GL1 Gate Lock

Weather-resistant access control for gate applications.

Industry Event Celebrated 10 Years of Innovation

Customers, channel partners, reps and industry friends and supporters recognize leader in wireless systems.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3