Top Stories


Making the Grade with Locks and Door Hardware

Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations.

Choosing the Right Solution

Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years.

New Report Reveals Top Security Risks for U.S. Retail Chains

Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024.



Gaining a Competitive Edge

Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI.

Eagle Eye Networks Releases 2025 Trends in Video Surveillance Report

Eagle Eye Networks, provider of cloud video surveillance, today released the 2025 edition of its annual Trends in Video Surveillance report, identifying six trends that will have the largest impact on businesses around the world in 2025.

6 Ways Security Awareness Training Empowers Human Risk Management

Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk.

Genetec Expands Access Control Market Share

According to the 2024 Access Control report by Omdia, Genetec Inc, provider of enterprise physical security software, has consistently gained market share over the last six years, solidifying its position as a worldwide market leader and building upon its #2 global position for access control software.

The Stage is Set

The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways.

Access Control Technology

As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections.

AMAG Technology Welcomes Chris Meiter as Vice President Global Business Development Video Solutions

AMAG Technology is pleased to announce the appointment of Chris Meiter as AMAG Technology's Vice President of Global Business Development for Video Solutions. This new role underscores the organization’s continued expansion support to its entire technology suite.

Napco Access Pro Launches New MVP Access App

Napco Access Pro, a division of NAPCO Security Technologies, is proud to announce the availability of the MVP Access™ App on the Apple App Store and Google Play. This advanced mobile solution brings the full power of the *MVP Access™ Cloud-Hosted Enterprise Security and Access Platform* to users’ fingertips, providing unparalleled command and control for dealers, integrators, and security directors managing systems of all sizes.

Evolon and UCC Partner to Deliver Proactive Video Monitoring Solutions

Evolon Technology, provider of proactive AI-driven security solutions, and United Central Control (UCC) and COPS Monitoring (COPS), premier providers of professional video monitoring, have announced a partnership to transform the proactive video monitoring market.

ASIS International, International Protective Security Board Sign Memorandum of Understanding

ASIS International (ASIS) and the International Protective Security Board (IPSB) today announced the signing of a Memorandum of Understanding (MOU) to promote collaboration and information-sharing between the two organizations. This partnership aims to foster the growth of the security industry and the executive protection community.

i-PRO Launches High Zoom Bullet Camera

i-PRO Co., Ltd. (formerly Panasonic Security), provider of professional security and public safety solutions, today announced a new line of High Zoom Bullet cameras designed to deliver exceptional long-range coverage with advanced edge AI capabilities. Equipped with powerful zoom and IR LED technologies, the new cameras offer unrivaled precision for long-distance monitoring across various environments, such as highways, parking lots, bridges, ports, and stadiums.

Cutting Retail Losses

Retail is still a more complex and dynamic security vertical in modern society. Inherent challenges with in-store and distribution center operations are primarily due to constantly shifting consumer buying trends. Retailers must show daily flexibility to keep workers, meet sales goals and attract customers while maintaining safe and efficient operations. Retail is an intricate web of interconnected elements.

TSA Announces Proposed Rule Requiring Establishment of Pipeline, Railroad Cyber Risk Management Programs

The Transportation Security Administration (TSA) published a Notice of Proposed Rulemaking that proposes to mandate cyber risk management and reporting requirements for certain surface transportation owners and operators.

Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps.

Milestone Systems Enhances Cloud Connectivity and the Care Plus Experience with the Latest XProtect Release

Milestone Systems, a provider of open platform video management software (VMS), today announced the release of the R2 2024 update to its XProtect platform. This release introduces XProtect Remote Manager, a cloud-connected service that enhances the value of Care Plus subscriptions. The update also includes improvements to user experience and expanded language support.

TMA Awards Four Mel Mahler Awards for Outstanding Contributions

The Monitoring Association’s (TMA) President Steve Butkovich honored four of TMA’s long-serving volunteers for their impactful contributions to TMA’s ASAP service with the 2024 Mel Mahler Award, formerly known as the President’s Award on Oct. 9th at the 2024 Annual Meeting in St. Thomas, U.S. Virgin Islands. The Mel Mahler Award is presented at the discretion of the TMA president in recognition of outstanding contributions within his/her tenure. The 2024 Mel Mahler Award recipients are Bill Hobgood, CommSys Incorporated; Jennifer Holloway, CIBC Bank; Daniel Oppenheim, Affiliated Monitoring; and Pam Petrow, Vector Security.

Wavelynx Expands into Middle East and North Africa with New Office in Dubai

Wavelynx Technologies recently announced the launch of its Middle East and North Africa (MENA) operations, appointing Vishal Khullar, Director of Business Development, as head of the region. Wavelynx's secure and interoperable access control solutions enable businesses to modernize their authentication technology at a pace that suits their needs.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3