Top Stories


An Elephant in the Living Room

Security managers are more aware than ever that information security requires a layered approach with components addressing every point of intrusion on the corporate network.

The Value of a Smart Home

The Value of a Smart Home

In Utah, locals refer to the Orem/Provo area as Happy Valley. It is a quiet, conservative college town, but all this doesn’t stand in the way of building a booming business.

New Focus on the Classroom

New Focus on the Classroom

It’s been two weeks and it’s time for me to introduce the latest video surveillance technology to the daycare center. They need to install IP cameras, so I can clearly see what that baby girl is doing, and make sure she is treated like I expect my granddaughter to be treated.



The New Alphabet

Mastering the alphabet used to be as simple as learning your ABCs. Not anymore. A whole new alphabet has been created for the world of analog video. Don’t try to sing this one to the “Alphabet song” we all grew up with. It doesn’t work. Trust me. I just spent 15 minutes trying.

Too Good to be True

There has been a noticeable increase in mass-produced, lowcost cameras available in the security industry. Low prices can be hard to resist, especially considering the tight budgets faced by government agencies at all levels.

Trendy Beverly Hills

Trendy Beverly Hills

Beverly Hills, Calif., has been glamorized in countless film and television depictions as the home of the wealthy and the famous.

Changes are Coming

Changes are Coming

During the past 10 years there have been some magnificent technological innovations in the security industry, but the pace of change has never been higher.

Appropriate Response

Appropriate Response

Everybody knows the old saying that the only things certain in life are death and taxes. But, alarm dealers understand that there’s a third certainty: false alarms.

Capturing Teachable Moments

Capturing Teachable Moments

When you’re conducting a therapy session, it’s virtually impossible to be fully engaged with the client and be an objective observer of your own interactions at the same time.

The Zoo at Night

The Zoo at Night

The fierce competition in the hospitality market has created a need to think creatively in order to increase the number of visitors. Therefore, Copenhagen Zoo constantly looks for new ways to give their customers an interesting and out-of-the-box experience.

Building a Foundation

Building a Foundation

Now more than ever, major network vulnerabilities are making national and international news headlines.

More Comfortable Operations

Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.

Technologies Drive Interagency Collaboration

Technologies Drive Interagency Collaboration

Cities are a challenge to secure and manage—they encompass a wide geographic footprint and include a multitude of key stakeholders comprising local, state and federal agencies along with a variety of private business entities and public organizations.

Collaboration is Key in the Video Vortex

Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.

A Strategic Approach

A Strategic Approach

The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.

How Cyber Secure Are Your Physical Security Devices

How Cyber Secure Are Your Physical Security Devices?

Are your physical security devices attached to the same network as your sensitive business data?

Connecting Disparate Systems

NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets.

How Secure are Your Devices?

Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.

Featured

  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.