Corporate Security


New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.

Smart Business Communications

How secure is your business data network? It’s a question that can be tough to answer when new security risks seem to emerge on a daily basis. Broadband data and voice communications are the lifeblood of business, and without a network that functions optimally all the time, the productivity, profitability and even viability of businesses in many vertical sectors are at risk.

Darren Nix

Security Tip of the Month: Preparing for the Ordinary Means Protection for the Extraordinary

When a security program is designed to prevent more common and unwanted activities, in many ways the program will also lessen the potential of more extraordinary events. Many of us understand the principle of layered security using a number of resources.

DHS To Adopt ASIS National Preparedness Standard

ASIS International recently announced that the Department of Homeland Security has selected the ANSI/ASIS Organizational Resilience American National Standard as one of three sets of standards to be adopted as a national preparedness standard for private-sector entities as part of the DHS PS-Prep program.

Getting The Message

Safety on campus continues to be a concern for colleges and universities across the country. With legislative updates associated with the Clery Act passed last year, and violent events across the United States once again threatening campus safety, the need for security and safety awareness on campus has not diminished.

Survey: Majority Of Companies Lack Transparency Needed To Prevent Insider Threats

Despite a renewed focus on governance and transparency, a recent survey from SailPoint Technologies revealed a disconnect between regulatory compliance and proactive risk management.

Ready For Any Situation

Situational readiness is a valuable tool which brings the public and private sector the ability to improve awareness of man-made and natural calamities.

Ask the Expert

As U.S. car sales near a 27-year low, dealerships have a higher stake than ever in ensuring the safety of their inventory. Many are enhancing security procedures or developing new measures to prevent theft, deter vandalism and ensure the safety of their employees and inventory.



Study: Many Businesses Have Not Put In Place An Effective Emergency Notification System That Can Reach Recipients

Despite the fact that disasters and unplanned business interruptions have made it absolutely critical for organizations to quickly and accurately communicate with all stakeholders during such an event, many businesses have not put in place an effective emergency notification system that can actually reach recipients, according to an annual study conducted by Varolii Corp.

Man Up

An increasing number of business continuity professionals and disaster recovery experts are discovering that the most vulnerable links in the continuity- of-operations chain are the people a business serves and the people who serve them. While this seems intuitively obvious now, for decades, resolving the fragility of technology had been the exclusive focus of the industry.

Preparing for the Worst

From severe weather to acts of violence, schools across the nation are forced to deal with a variety of emergencies. As a result, districts and administrators have become well versed in crisis planning.

Without Incident

Defined as occurrences that have or might have a negative impact on the continuity of routine operations, incidents may occur in any organization, public facility or business entity.

ASIS Issues Second Edition of TASR Guideline

The ASIS Commission on Standards and Guidelines has released the second edition of the Threat Advisory System Response Guideline (TASR).

Safe and Risk-Managed

While every individual and organization that provides security products or services will have their spin on what security is and how to achieve the desired level, the truth is, security is essentially an unachievable outcome. A common definition of security is, “freedom from danger, fear and anxiety.” Security defined as such is, therefore, unattainable.

Disaster Preparation for the 21st Century Business

Business is all about managing risk, and risk management comes down to making solid business decisions to avoid and mitigate potential threats, including natural disasters.

Ready for Takeoff

When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.

A Double-edged Sword

Securing an entire network at a finite number of ingress points simply does not offer the risk mitigation companies need.

Making IT Your Business

Sometimes it seems as if everything is about security these days. Homeland security, physical security, digital security— there’s constantly a new security issue that needs attention.

The Business of Knowing

You’ve all seen that guy in the hallway: that unfamiliar face. “He must be the new guy.” “He must be here for a meeting.” “Isn’t he Jane’s husband?” “He probably works for facility management.” In too many cases, employee simply do not know who or why that person is wandering around the premises

A Growing Threat

In the United States, people encounter a perpetual tradeoff between freedom and security. The nation depends on a complex system of critical infrastructures to maintain a high quality of life and the freedoms enjoyed every day. New threats to security have these organizations taking a second look at their vulnerabilities, however, scrambling to minimize disruption and to maintain the integrity of their operations. In the past, national security was perceived as the role of government. Today, Department of Homeland Security efforts to protect critical infrastructures from physical attack are a shared responsibility of the public and private sectors, as well as individual citizens.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.