Top Stories


Locking out the Bad Guys at ASIS 2015

Probably the most known access security products are locks – from the standard lock and key to the more sophisticated connected locks – these tools are designed to keep people out. And, in this day in age of campus shootings, perhaps there is no better place for locks than college campuses.

Wrapping Up ASIS 2015

By the last day of a trade show, it's typical to have aching feet, a fried brain and sore muscles from constant interaction on the show room floor, so when PSIA invited me to their PLAI panel discussion on Wednesday, Sept. 30 at the Hilton Anaheim, I was much obliged.

Tradeshow Season is Over

Another year in the security industry has slipped by and ASIS closes out the season. Of course, there is ISC East and a number of other smaller shows, but the big shows are over until April 2016.



Wrightstyle is a specialist steel and aluminium glazing company and supplies its fire-rated systems internationally.  Lee Coates, the company’s technical director, looks at fire training in the build up to Christmas.

With Apologies, an Early Christmas Warning

Wrightstyle is a specialist steel and aluminium glazing company and supplies its fire-rated systems internationally. Lee Coates, the company’s technical director, looks at fire training in the build up to Christmas.

Paving The Way To Freedom

IT leaders today face complex threats in protecting corporate IT networks from cyber threats that include spoofing, data theft, denial-of-service attacks and many other network risks.

Security Breach

Security Breach

As professionals in the commercial security industry, our ears perk up whenever we hear of a security breach—such as recent perimeter control issues at airports, the White House, and other government and public locations.

The True Cost Of 4K

High definition (HD) and megapixel camera technology continues to evolve, and now 4K is emerging as the latest advancement to video surveillance imaging for security applications.

The New Landscape

The New Landscape

It used to be when attending a trade show that one came away with a tote bag full of printed marketing materials. This practice started to change when CDs and thumb drives were introduced to present these materials.

Confidence In A Secure Classroom

Confidence In A Secure Classroom

Dancing Moose turned to Stone Security of Salt Lake City to design and install the state-of-the-art, integrated monitoring and security system.

The New Standard

The New Standard

As the Internet of Things becomes more prevalent in today’s world, smart locks and access control systems are at the heart of the revolution.

Large Hospital Security: Technical and Physical Challenges

Large Hospital Security: Technical and Physical Challenges

Large hospital environments present unique challenges for a surveillance integrator. Specifically, these challenges can include implementing IP surveillance technology, access control, or networking.

In Your Line of Sight

Terrorist attacks have forever changed the way we think about security.

Hospital Campus Secure

Hospital Campus Secure

University Hospital, the teaching hospital of San Antonio’s University Health Systems is a sprawling campus in the South Texas Medical Center, and one of the health system’s 23 locations across the community that needed the latest security technology.

Patent Trolls Up to No Good

There are troubling, albeit legal, shenanigans going on not only in the security industry but in several other industries, as well.

Court-Ordered Keys

The comings and goings of judges, inmates, attorneys, law enforcement, maintenance staff and others pose a number of safety concerns for courthouses.

Honoring a Great Man and His Legacy

At SIA Honors Night, the Security Industry Association (SIA) will honor the late Frank De Fina, former senior director of strategic sales for Hikvision USA Inc., with the 2015 Lippert Award posthumously.

Verint Unveils Next Evolution in Situation Management

Verint Systems Inc. today announced enhancements to its Verint Situational Awareness Platform™, including the incorporation of advanced solutions to help organizations gain comprehensive situational awareness while driving rapid incident response and enhanced field communications.

Trade Show Trends Emerge at ASIS 2015

At all trade shows, there tends to be overall trends within the security industry that emerge from visiting the various exhibitor booths and this year's ASIS is no exception. The following are the top three trends from the show room floor.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.