Top Stories


Boon Edam Inc. Expands Presence at ISC West

To accommodate record sales growth in the past several years, Boon Edam Inc. is proud to announce an increased presence of a larger exhibit space this year at the ISC West International Security Conference and Exhibition in Las Vegas, NV, on April 2nd - 4th.

Meetup.com Deals with First Extortion Attempt Ever

Meetup.com Deals with First Extortion Attempt Ever

Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.

Understanding the Capacity of the Product

Understanding the Capacity of the Product

When Barbara Morgan settles into her classroom, she has a room full of teaching aides and equipment that keeps installers, end users and dealers focused on the topic of the day. Her message to her students is quite simple.



Momentum has shifted technology to the network

The OSI Model and Physical Security

When the IP camera was introduced to the physical security industry in the mid-1990s, the move from analog to digital was set in motion. Adoption of this technology began slowly but has steadily gained momentum.

Train Well, and Often

Train Well, and Often

Training is an essential priority for any security dealer or integrator seeking to enter the fire alarm market, while continuing education is important for dealers who already install fire alarms systems.

Taking Training Very Seriously

Taking Training Very Seriously

Training is the life blood of any successful organization. Training employees on how to do their jobs better is one thing, but training dealers and integrators on how to use and incorporate security products is another.

Drawing a Fine Line

Drawing a Fine Line

Dealers just need to remember one thing: Security— the promise to help protect customers’ lives and property—must remain at the core of their business.

The Integrator/Manufacturer Relationship

When a security integrator begins deciding which manufacturer to use for an installation, a myriad of key elements come into play. Does the manufacturer have easy-to-use online training?

Digital Watchdog Acquires Award-Winning Innovative Security Designs

“Digital Watchdog is the perfect complement for ISD.” said Ian Johnston, CEO of Innovative Security Designs, Inc.

New Power Supply and Data Transmission Products Deliver New Solutions to Longstanding Problems

New Power Supply and Data Transmission Products Deliver New Solutions to Longstanding Problems

Greater efficiency provided by accommodating multiple cameras over a single coax or Ethernet cable.

Lighting Up Lansing

Lighting Up Lansing

Each year in Lansing, Mich., the holiday season unofficially begins with the Silver Bells Parade. On Nov. 22, 2013, approximately 80,000 people crowded this city’s streets to see the parade that ends in front of the Michigan State Capitol building with a traditional tree lighting ceremony.

Fit for Security

Fit for Security

To say I’m sold on biometrics for athletic clubs after using the Hand- Key since 1995 is an understatement. Back then, we were remodeling our check-in area. While doing so, we decided to re-evaluate our check-in software.

Not in My School

Back in the day, students were taught how to protect themselves from fire and the unimaginable nuclear attack.

Precious resource in Arizona gets makeover

Upgraded Fire Protection

Water is one of Arizona’s most precious resources, and the Colorado River satisfies much of this demand via the 336-mile-long Central Arizona Project (CAP) aqueduct that annually delivers approximately 1.6 million acre-feet of Colorado River water to cities, Indian Tribes and farms in central and southern Arizona.

The New Normal

The New Normal

We live in a very different world today—one of risks and fast changes—and looking ahead, such changes and risks will only continue. I call it “the new normal,” since this is expected to be the basis going forward.

Reaching out with a higher level of video storage and management

A New World of Information

We live in a world full of information as data is being collected each day because the demand is higher than ever before. Consumers want faster access to online data to make quicker, more informed decisions regarding everything from nearby restaurants to the highest-rated tablets.

Preventing Abductions

Preventing Abductions

On March 10, 2007, three-day-old Mychael Darthard-Dawodu disappeared from her mother’s hospital room in the maternity ward of Covenant Medical Center in Lubbock, Texas. Even though the infant had been fitted with a state-of-the-art security bracelet around her ankle, the woman who abducted her simply snipped through the device and carried the five-pound bundle-of-joy out of the facility in her purse.

Why Audio? Why Not?

Why Audio? Why Not?

It’s 2014 and time for a new way of thinking when it comes to security. It’s kind of like our five senses; we have each one for a reason, and they are all equally valuable.

Reimagining Strategies

Reimagining Strategies

Security is no longer chained to a desktop, and breaking these chains has changed the face of remote monitoring. It used to be that remote monitoring meant keeping an eye on things from a central station, like a corporate security command center or even a thirdparty monitoring service.

In Clear View

In Clear View

High definition and megapixel cameras play an important role in video surveillance applications. They can provide images that are more useful, with a higher quality of detail and have wider coverage than standard-resolution cameras.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3