Top Stories


A Biometric Revolution

In an era where technological advancements redefine the way we live and work, the transition from classic credentials to biometric authentication stands out as a pivotal shift in the realm of security. Nearly gone are the days of traditional badges and access cards; instead, our own unique biological markers are taking center stage, offering a more secure and seamless authentication experience.

Adapting to See Change

Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality. 

Shaping the Use of Technology

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.



Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.

Enhancing Autonomy Software

In the realm of national and global security, safeguarding critical infrastructure is paramount. It is not just about erecting physical barriers; it is about deploying perimeter security software capable of autonomous detection, alerting, and deterring potential threats. The integration of autonomy software into existing perimeter security systems marks a significant advancement in this field and is now imperative for an effective system.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

How to Roll Out Microsoft Copilot Securely and Ensure Data Security

Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks. However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.

The Need to Hear and be Heard

Have you ever tried to watch a movie in a movie theater and the sound suddenly stopped working? Or you attended a musical concert, but the sound system failed? What happened? More than likely, the movie or concert stopped until the sound and audio were fixed. Or if it could not be fixed, you likely departed and your money refunded. After all, it is pointless to watch a movie or attend a concert without sound. You are not getting the whole experience.

Going Beyond the Perimeter

Wireless locks are a growing segment of the electronic access control (EAC) market, increasing at a rate of 8% annually in the Americas, according to OMDIA. They can be used in a variety of applications and provide many of the benefits of traditional hard-wired access control. Depending on the type, they can be managed as standalone solutions or as part of Physical Access Control Software (PACS) systems.

3xLOGIC Launches VIGIL NVR Case Management Providing Cloud Storage for Sensitive Video Clips

3xLOGIC, a provider of integrated and intelligent security solutions, has launched VIGIL NVR Case Management, a cloud storage solution designed for sensitive video clips. The standalone solution provides cloud storage capability to VIGIL NVRs, making it easier for operators to review, share, and store video clips in a single place.

Getting Smarter About AI

The past few years have seen companies throughout the security and surveillance industry expand their use of AI, some rapidly adopting the technology and others dipping their toes in the water. Either way, AI has certainly moved beyond being an emerging technology to now being a proven reality, with demonstrated abilities to improve security camera imaging performance, enhance the accuracy of people and object detection, reduce false alarms and conserve recording and network bandwidth.

Some New Tricks

In the constantly evolving world of AI, you can blink and miss an innovation. This rapid pace of evolution means organizations are under increased pressure to invest in solutions that do not become obsolete a short time after they are installed.

i-PRO Will Showcase Docker Container Support on X Series Line of Cameras at ISC West

At ISC West 2024 on booth # 10037, i-PRO Co., Ltd. (formerly Panasonic Security), a provider of professional security solutions for surveillance and public safety, will showcase Docker container support on its new X Series line of AI-enabled cameras. Docker containers directly support i-PRO’s open platform development initiatives by providing a standardized way for application developers to rapidly advance the AI capabilities of i-PRO edge devices.

Security Industry Association Expands Its Team to Better Serve Its Members

The Security Industry Association (SIA) has welcomed four new members to the SIA team to support the association’s members and initiatives: Rachel Tayag, associate director of learning and development; Adriana Lopez Cadima, senior manager of design and videography; Natalie Robinson, senior manager of member services; and Adom Yusuf, senior manager of standards and technology.

DHS Unveils Artificial Intelligence Roadmap

Secretary of Homeland Security Alejandro N. Mayorkas and Chief Information Officer and Chief Artificial Intelligence Officer Eric Hysen announced the Department of Homeland Security’s (DHS) first “Artificial Intelligence Roadmap.” The roadmap details DHS’s 2024 plans, including to test uses of the technologies that deliver meaningful benefits to the American public and advance homeland security, while ensuring that individuals’ privacy, civil rights, and civil liberties are protected.

To Cloud or Not to Cloud?

The cloud is a fact of life across all IT applications—and security is no exception. While most software applications today have moved to the cloud, security is a bit different. There are significant technical and budgetary challenges, particularly as the increasing volume (and image quality) of security cameras in use results in an enormous amount of video data transferred and stored in the cloud.

Municipal Digital Access

We hear about Smart Cities more frequently these days, due to considerable progress in recent years. But it is an initiative that has been around for decades. The idea emerged when analysts began using technology to collect images and data to help improve civic services, protect against disasters, and improve citizens' lives. At its core that is still the intent.

Key Management Takes Flight in Tallahassee

In 2017, after attending a national security conference, Thomas Vergo returned to his Tallahassee International Airport (TLH) office with a profound idea. Placing a significant item on both his boss's and director's desks, he sought to revolutionize their approach to access control.

A 30,000 View

Today it seems like the cloud is everywhere. In the security industry, cloud-based video and access control solutions are certainly big trends. But how, and why, did the journey toward cloud-based video begin? And where is it headed?

Vantage Standardizes Security at 32 Global Data Centers

Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, announced that Vantage Data Centers has transformed its global security operations using Genetec™ Security Center unified security platform and Genetec Mission Control™ decision management system. The leading operator of large-scale data centers recently standardized on the Genetec unified platform to modernize security at 32 data centers in North America, EMEA, and Asia Pacific.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3