Top Stories


Fluidmesh and On-Line Communications Give Metuchen Savings Connectivity They Can Bank On

Existing laser antennas were replaced with a solution that addressed all mandated requirements, time lines and budgetary considerations.

Secret Service Agents Allegedly Crash into White House Barrier While Drinking

Secret Service Agents Allegedly Crash into White House Barrier While Drinking

The Department of Homeland Security is investigating the incident.

Secret Meeting Reveals How to Break Apple

Secret Meeting Reveals How to Break Apple's Security

Security researchers meet to discuss tactics and strategies for exploiting security flaws in iPhones and iPads.



Catalyst AV Distribution Network Appoints AHA Distributing for Southeast Territory

AHA picks-up APC, Catalyst Wire & Cable, ClearView CCTV, Dropcam, EnGenius, IC Realtime, Nest, Rapid Mounts, TiVo and Vivitek lines.

Genetec and Prism Skylabs Help Retailers Gain In-store Insights

New integration enables retailers to leverage their video surveillance system to understand customer shopping patterns and extend their video monitoring capabilities.

Apple Watch

The Security Features of the Apple Watch

We don’t know much yet, but Apple has shown a few features that will help keep your information safe.

CertainSafe Prevents Payment Card Industry Data Breaches

MicroTokenization adds protection to data “around the card," adding to the newest requirement set for October 2015 EMV Standards.

IDSecurityOnline.com Launches New ID Card Service Bureau

Improve efficiency and turnaround time for customers.

Open Options Upgrades to New Headquarters

Access control company’s growth prompts need for more space.

Honeywell Expands Performance Series IP NVR

Compatibility with Honeywell’s equIP and Performance Series cameras multiplies options for customized surveillance systems.

7 Steps to Keeping a Connected Home Safe

7 Steps to Keeping a Connected Home Safe

There are steps anyone can take to ensure hackers will have a more difficult time accessing your system

Airport Security Mix-Up Brings NFL Player to Elementary School

Airport Security Mix-Up Brings NFL Player to Elementary School

The player accidentally swapped laptops with a principal while going through security.

Tri-Ed Releases 2015 Product Catalog

250+ page catalog features thousands of products in various categories.

School Break-in Averted with Measures Provided through Stanley Security Grant Program

Montessori School of Dayton credits security products and services as preventing crime.

ZKAccess Releases BioCam300

An affordable, IP-based, stand-alone access control camera.

$5 Million Gold Bar Heist

$5 Million Gold Bar Heist

After further investigating, one detective believes it could have been an inside job.

Woman Rams Police Car at Miami International Airport

Woman Rams Police Car at Miami International Airport

The FBI has since taken over the investigation.

SmartTek Systems Grants OnWatch of Australia Exclusive Rights to App Trio

Agreement opens floodgates for international expansion.

Featured

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.