Top Stories


Pivot3 Introduces HC-3 Healthcare Validated VDI

Pivot3 Introduces HC-3 Healthcare Validated VDI

HC-3 provides seamless interoperability for VMware Horizon View, Samsung, Teradici and Imprivata OneSign on Pivot3's vSTAC VDI appliances.

TREXPO Joins Forces with GovSec to Establish Event Showcasing and Tools for Law Enforcement

TREXPO Joins Forces with GovSec to Establish Event Showcasing and Tools for Law Enforcement

This year, TREXPO is joining forces with GovSec– the Government Security Conference and Expo – to bring together leaders in law enforcement, military, security and federal agencies in a single location.

Information Security Professionals Say Their Organization is a Target for Cyber Attacks

Information Security Professionals Say Their Organization is a Target for Cyber Attacks

According to Tim ‘TK’ Keanini, chief research officer for nCircle, the public perception of the country with the most-advanced, nation-state, cyber attack capabilities has clearly been shaped by recent media coverage.



University of Kentucky Deploys Unified Security Management Platform to Enhance Campus Security Platform to Enhance Campus Security

University of Kentucky Deploys Unified Security Management Platform to Enhance Campus Security

University selected NLSS Gateway to help take a proactive stance with security operations.

ESX Announces 2013 Keynote Speaker

ESX Announces 2013 Keynote Speaker

Roy Spence, marketing maven, to inspire and enlighten on the importance of what businesses stand for and about the purpose that drives us.

HID Global Broadens its Latin American Presence to Deliver Best in Class Security Identity Solutions

HID Global Broadens its Latin American Presence to Deliver Best in Class Security Identity Solutions

HID Global's dedication to building a stronger, Latin American presence reinforces the company's genuine commitment to customer satisfaction as well as to delivering a more comprehensive portfolio of secure identity solutions.

From Bigfoot to Ballerina

Online Exclusive - From Bigfoot to Ballerina: Compressing the Border Checkpoint's Footprint

Border checkpoints can’t afford to cut technologies or staff to reduce their footprint because doing so could allow dangerous materials, contraband or even outright threats to enter the country unchecked.

IP Liftoff

IP Liftoff

Airports have broken the analog barrier. No longer are airport directors and security executives arguing the merits of analog vs. IP. Here is what airport leaders have been saying and, more importantly, doing.

SentryNet Announced SentryCon 2013

SentryNet Announced SentryCon 2013

SentryCon 2013, the 18th Annual Dealer Conference, will be held in Mobile, Alabama, April 17th-18th.

IndigoVision Appointed a New Canadian Sales Director

IndigoVision Appointed a New Canadian Sales Director

IndigoVision is delighted to announce the addition of Sean Thompson as Canadian Sales Director.

FST21 Saferise Solution Raised the Bar on School Security

FST21 Saferise Solution Raised the Bar on School Security

The Bais Yaakov School for Girls (BYLA), has been a proactive leader in the arena of school access security, taking some serious, ongoing steps to harden security on their campus.

Platinum Tools Appointed Bob Howard Regional Sales Manager

Platinum Tools Appointed Bob Howard Regional Sales Manager

The fast-growing company for the security, datacom, telecom and electrical wiring markets has strengthened its distribution support.

Automate Your Access Control

Automate Your Access Control

The effectiveness of access control really comes down to local decisions made at each door. However, enterprise systems are deployed and managed on a global scale, which presents a challenge of how to manage all those local access control decisions efficiently and effectively.

Promoting the Partnerships

Promoting the Partnerships

Selecting an enterprise security system is a little bit like buying a car. When buying a car, you choose the make and model of the vehicle, you choose tires made by a well-known manufacturer and recommended for the vehicle, and an audio system probably by a manufacturer outside the automotive industry. This way, you can get the best-of-breed approach.

Smart Thermal Cameras

Smart Thermal Cameras

As prices fall and capabilities increase, new applications are emerging that leverage the advantages offered by thermal technology for securing outdoor assets. The result is a market tipping point for thermal cameras and an opportunity to use the best detection technology available for costs that meet or beat less-effective approaches.

Streamline Traffic Flow

Streamline Traffic Flow

Building owners have found that integrating an elevator destination control system with its security management system enhances these benefits for tenants because they can use their credential for both access control and elevator access, but careful planning is a must to ensure cost effectiveness.

Fully Powered

Fully Powered

PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.

Restoring a Lagoon - Project calls for high definition surveillance on the edge

Restoring A Lagoon

On June 1, 2012, the California Department of Parks and Recreation (CDPR), in connection with various partner agencies, began a six-month construction project to restore wetland function within Malibu Lagoon State Park.

Security System Advantages

Security System Advantages

System design and equipment choices designed to protect key assets have never been more diverse. IP-based systems offer many advantages for capturing and transmitting high-quality HD images via the Internet or a LAN connection for remote monitoring.

Gaining Intelligence

Gaining Intelligence

Today’s biometrics systems are moving identity authentication toward real time, accurate and secure, individual ID based on unique biometric characteristics, including iris patterns, fingerprint minutiae, facial structure or voice.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3