Allied Universal, a leading facility services company and the largest security force in North America, has teamed up with PlanetRisk to offer organizations an enterprise risk Software as a Service platform to stay informed of threats to their operation in real time.

Allied Universal & PlanetRisk to Offer GSOC Service & Product Offering

Allied Universal, Triple Recipient of 2017 ‘ASTORS’ Homeland Security Awards, has teamed up with PlanetRisk to offer organizations an enterprise risk Software as a Service platform to stay informed of threats to their operation in...

Ross XT-2200 Retractable Bollard Ideal Solution for Urban Settings

By Scott Espensen, Perimeter Security Product Manager for Ross Technology Retractable bollards serve as a practical solution for safely securing access points shared by both vehicles and pedestrians because they limit vehicle...
Howard Johnson, COO, G4S Technology SymmetryNet Global Products Division

AMAG Hosts Annual Security Engineering Symposium (Learn More)

AMAG Technology held its annual Security Engineering Symposium in Newport Beach, California, February 23-26, 2018 at the Balboa Bay Resort, with nearly 70 end users, integrators and consultants attended the highly...

Vanderbilt Industries Teams Up with Access Hardware Supply (Video)

Vanderbilt, a global leader in creating state-of-the-art security systems, has entered into an enhanced strategic partnership with Access Hardware Supply to distribute the company's latest access control solutions to the North American...
The driver of a rental truck drove down a busy bicycle path in New York near the World Trade Center on October 31, 2017, killing eight people and injuring about a dozen others in what officials said was an “act of terror.”

To Protect and Protect Again Against Vehicular Attacks (Multi-Video)

In January 2018, Bill de Blasio, the Mayor of New York, and the City’s Security Infrastructure Working Group announced plans to bring permanent perimeter barriers, or bollards, to high-profile sites and to...

What You May NOT Know About Perimeter Security (Multi-Video)

By Cathy McHugh, PROTECH When it comes to protecting the perimeters of highly sensitive sites, not all technologies are the same. Perimeter Intrusion Detection Systems (PIDS) range from: Infrared beams (invisible fences) Fence-mounted intrusion...
In every emergency there is too much at stake to be delayed at the gate. SOS Silent is saving lives, money and time.

Is Your Gated Community Equipped to Avert Disaster? (Learn How, Video)

Chris Clingan died from his wounds on June 16, 2013, after waiting nearly 10 minutes for first responders to save his life. The 22-year-old man was stabbed repeatedly by his roommate inside...
The FiberStrike advanced fiber optic sensing platform's system architecture facilitates configuration for virtually any security monitoring application, and multiple sensor types address a broad range of intrusion detection applications.

FiberStrike Light Capturing Sensing Solutions for Intrusion Detection

Cleveland Electric Laboratories (CEL) Fiber Optic sensors, Platinum Award Winner for Best Motion Detection System in the 2017 'ASTORS' Homeland Security Awards Program, are used in security applications to monitor arrays of...
The XT-4200 Post and Beam Gate provides crash tested certification to ASTM F2656-15 standards, with a M50-P1 rating. (Image courtesy of Ross Technology)

See Award-Winning Cost-Effective Wide Access Control Point Security

By Scott Espensen, Perimeter Security Product Manager for Ross Technology When it comes to securing and controlling vehicular traffic at high-risk facilities with wide entrances, there are several types of anti-ram vehicle...
BlackBerry® Jarvis is a powerful binary static analysis SaaS tool that can help automakers secure their software supply chain by inspecting binary files in an easy, quick, scalable, and cost-effective way, and delivering deep insights into the quality and security of software components.

BlackBerry Jarvis: Game Changing Cybersecurity Tool for OEM (Videos)

A modern car has over 100 million lines of software. As the software in a car grows so does the attack surface, which makes it more vulnerable to cyberattacks. Each poorly constructed piece...