Morse Watchmans, provider of key control and asset management systems, is highlighting its Emergency Key Grab (EKG) Kit and other innovative key control solutions for educational security starting today at GSX 2024. The EKG Kit is designed to enhance emergency response and lockdown procedures in educational institutions, corporate campuses, and more, and is featured at booth #1287 alongside a comprehensive range of key control and asset management solutions.
IDIS Americas, a new IDIS business unit formed from the recent merger of IDIS America and Costar Technologies, is kicking off GSX 2024 in Orlando with a strong presence. At Booth #1917, attendees can explore its comprehensive lineup of advanced surveillance solutions, including the scalable IDIS Solution Suite (ISS) VMS and a wide range of AI-powered, NDAA-compliant video surveillance technologies. Designed to excel across key sectors such as banking, retail, education, critical infrastructure, these solutions highlight IDIS Americas' commitment to delivering superior security performance.
SARGENT, an ASSA ABLOY Group brand, is displaying its latest innovations and product enhancements at the Global Security Exchange (GSX) 2024 in Booth #1434. Highlights include an expanded suite of locks with visual status indicators, newly enhanced integrated mechanical and electronic access control solutions, and mortise locks with Motorized Electric Latch Retraction (MELR).
Corbin Russwin, an ASSA ABLOY Group brand, will proudly showcase its enhanced portfolio of locks featuring visual status indicators at the Global Security Exchange (GSX) from September 23-25, 2024, in Orlando, FL. These innovative locks offer instant visual verification of whether a door is locked or unlocked, addressing security, safety and privacy needs across various applications.
Today, the Department of Homeland Security announced the availability of $279.9 million in grant funding for the Fiscal Year (FY) 2024 State and Local Cybersecurity Grant Program (SLCGP). Now in its third year, this program provides funding to state, local, and territorial (SLT) governments to help reduce cyber risk and build resilience against evolving cybersecurity threats.
ASSA ABLOY is working with Boston Dynamics, the global leader in developing and deploying highly agile mobile robots, to deliver the next step in strengthening security monitoring. Kicking off this year’s Global Security Exchange (GSX) in Orlando, ASSA ABLOY is introducing a new digital access solution that allows Spot security patrol robots to unlock and open accessed-controlled automated doors autonomously.
More than 20 companies are being recognized this year for products that help keep us safe.
Securitas Technology, a world leader and global provider of security, health, and safety technologies, unveiled today its Sustainability Initiatives, a pioneering effort to promote environmentally sustainable solutions in the electronic security industry. This initiative will be launched at the Global Security Exchange (GSX) 2024 show, September 23-25, in Orlando, Florida.
Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer.
- By Ralph C. Jensen
- Sep 18, 2024
It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor!
- By Brent Dirks
- Sep 18, 2024
In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively.
- By Andy Schreyer
- Sep 18, 2024
Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats.
Frederick Tucker, Allied Universal security professional, has been honored with the 2023 Ralph Day Memorial Security Officer Heroism Award for his life-saving actions during a shooting at the Nashville Metro Public Library. The award is the highest recognition a security officer can receive for an act of heroism.
After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool.
Research from the National Skills coalition (NSC) suggests that 92% of today’s jobs require digital skills. It’s frankly hard to believe that figure isn’t at 100 percent. Businesses of all kinds are significantly impacted by applications that manage all sorts of transactions internally and externally. The capture, storage, and use of data is prolific across all industries—and subject to increased risk of unauthorized access and cybersecurity breaches.
- By Perry Carpenter
- Sep 16, 2024
During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery.
- By Monique Merhige
- Sep 13, 2024
PureTech Systems, a provider of geospatial AI-boosted video analytics for perimeter and border security, is excited to announce the expansion of their perimeter solutions by further integrating with Axis Communications products. The most recent integration combines PureTech's patented video analytics with the detection capabilities of the Axis Communications D2110-VE security radar.
ISC East, with its premier sponsor Security Industry Association (SIA) and in partnership with the ASIS NYC Chapter, announced this year’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination.
ASSA ABLOY has acquired Level Lock, a technology solutions business based in Redwood City, California.
Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks.