Our Blog

Categories
July 17, 2019

Secret Service Report Outlines Warning Signs Before a Mass Attack

The U.S. Secret Service released a report Tuesday, July 9th analyzing trends from 27 mass attacks that took place in the United States during 2018. In nearly all of the incidents, the assailant made threats or communicated in a way that caused others to be concerned. Out of the 27 mass attacks carried out in […]

Drone surveillance
July 1, 2019

Amazon Gets U.S. Patent to Use Delivery Drones for Surveillance Service

Amazon is considering using drones not simply to deliver packages but additionally to provide surveillance as a service to its customers, based on a patent granted to Amazon earlier this month by the US Patent and Trademark Office.

Intern at 3Sixty Integrated
June 21, 2019

Career Stories: My Experience as an Intern at 3Sixty Integrated

The summer before my senior year at Trinity, I participated in an internship program called Students + Startups. Through a series of networking events and interviews, I was able to connect with the Chairman and Founder of 3Sixty Integrated and Trinity Alumnus, Joseph Ndesandjo. With no knowledge of the industry and little experience in product development, Joseph’s excitement and passion were all that I needed to draw me to the challenge.

School Security Enhancement Act
June 7, 2019

School Security Enhancement Act — Bipartisan Goal of Keeping Kids Safe

Party affiliation aside, the importance of keeping children safe at school is a topic everyone can agree on. That’s where the School Security Enhancement Act comes in. This bill will amend the Elementary and Secondary School Education Act of 1965…

IS West 2019
May 30, 2019

ISC West 2019: What We Saw, What We Learned

Last month, our executive team attended the ISC West 2019 event in Las Vegas and it was three days of non-stop learning about significant trends and new products in the industry. There have been sweeping changes in technology over the past year making the annual pilgrimage to ISC West even more exciting than usual. We’ve […]

May 16, 2019

Looking Back: What Columbine Taught Us About School Security

Last month marked the 20th anniversary of one of the worst school shootings in US history. The 1999 attack on Columbine High School that killed 13 people and wounded 24 set in motion a new era of school violence. After the Columbine tragedy, there has been an increase in school security measures to ensure the […]

security integration trends
May 15, 2019

Top 8 Trends to Watch in Security Integration

As technology continues to evolve, people and businesses are focusing more of their attention on security. Whether they are looking to protect themselves, their data, or their company and employees, the top security integration trends showcase the latest technology available to meet their needs. Cloud Storage for Video Surveillance The cloud has been around for […]

active shooter training
May 10, 2019

Active Shooter Training Impacting Response to Violent Events

Active shooter training and changes to lock-down procedures are impacting the way people respond in violent events. School districts traditionally use the hide and lock-down tactic, which make students ‘sitting targets.’ Instead, many schools have changed to using active shooter training drills, which incorporate action-based responses.  Active Shooter Training Played a Role at Highlands Ranch […]

Texas School Safety Bill
May 10, 2019

Texas School Safety Bill — Comprehensive School Safety Program Proposed

Almost a year after the Santa Fe High School shooting, state lawmakers hope to pass a bill to strengthen school safety. The Texas School Safety Bill, officially Senate Bill 11, calls for a comprehensive school safety program, requiring emergency response training for all district staff, establishing “threat assessment teams” to help identify troubled or potentially […]

May 10, 2019

Combining Active Directories and Access Control for Better Visitor Management

There’s a distinct challenge in using access control for visitor management. Designers of access systems may focus only on those who need permanent access, as they consider visitor management a separate issue entirely. Many enterprises choose to segregate their visitor management and access control protocols, but this can lead to more work for employees and […]