Top Stories


Scammers Taking Advantage of Apple Pay

Scammers Taking Advantage of Apple Pay

Criminals are using the platform to buy goods with stolen identities and credit cards

Monitoring Student's Locations via the School Bus

Tracking students before and after school gives all adults involved in the safety and security of students peace of mind.

ASSA ABLOY Reveals Strategic Initiative to License Seos

Mobile access solutions built on the Seos platform simplify life by eliminating the need for multiple physical credentials.



Honeywell Launches Entry-level PIR

False alarm-reducing sensor combines value with high performance for residential installations.

UniKeys Smart Access Control App Integrates into Samsung KNOX

Collaboration allows Samsung KNOX customers to gain secure, convenient, touch-to-open, keyless and cardless entry for consumers and businesses through UniKey's global platform.

Hikvision USA Awarded Vendor of the Year by ADI

Testament to strong relationships dedicated to growing the video surveillance market.

Ganz Introduces Transmission Product Line

Complete line of Ethernet transmission products round out line of IP cameras, recording devices and monitoring products.

Costar Video Systems Unveils Website Redesign

With consistent increases in mobile and tablet traffic, it was time for an upgrade.

SureView Systems Announces Integration with AMAG Technology

Immix platform integrates with Symmetry access control software.

Properly Trained School Security Guards

Properly Trained School Security Guards

Suggestions for what to include in a school security guard curriculum.

Secret Service Investigating Two White House Security Breaches

Secret Service Investigating Two White House Security Breaches

The Secret Service is investigating two separate instances that have occurred in the last 24 hours.

Securing Access Control

Just watching the news each night is reason enough to explain why security professionals worry about the security of their access control systems. If the card system is hacked, there can be major problems.

Integrating Security - Logistics company takes advantage of information management solutions

Integrating Security

The logistics company wanted a single solution to provide high-resolution video images as well as the ability to monitor, verify and restrict access to the facility in order to better manage employee time and attendance while also reducing theft and misplacement of inventory.

How an Interruption Sparked an Industry Trend - Key management systems developed to store, track sensitive keys

How an Interruption Sparked an Industry Trend

There are hundreds, if not thousands, of selfhelp sales books on the market offering advice for everyone from the beginner through to the seasoned sales veteran. A primary concept behind all of them is how best to get a foot in the door in order to pitch your product and show how this product will help solve the customer’s problem.

Now Trending

Our homes are becoming living, breathing, speaking organisms a buzz with device-controlled door locks, thermostats, shades, video cameras, garage doors, etc.

Changing the Landscape - Wireless intrusion makes a big splash in commercial applications

Changing the Landscape

Wireless intrusion solutions have been perceived as complicated systems with time-consuming installs, and the possibility for strong interference and constant on-site maintenance. However, as technology continues to advance, it has changed the landscape of wireless intrusion and opened the door for commercial applications—making wireless intrusion not only a viable option, but an ideal solution.

Bring on the Power - Understanding that PoE impacts network design

Bring on the Power

When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.

Making Recommendations - Manufacturer provides more successful training experiences

Making Recommendations

After more than 10 years of offering technical training on our physical security entrance products to integrators, installers, and distributors, we’ve refined our approach to a fully developed program that offers a mix of online webinar training, onsite training and in-house factory training.

Slain TSA Officer Honored

Slain TSA Officer Honored

It was recently revealed that Congress, as a whole, has an approval rating of about 12 percent.

Safe and Secure

Safe and Secure

Jumping into the security industry was a calculated and well-planned venture for Quantum Secure. In fact, company president and CEO, Ajay Jain, walked a few tradeshows and talked to potential customers before making the leap.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3