<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Industry Innovations</title>
    <description>
      <![CDATA[What are the latest products being introduced into the security market, and what specific benefits can they bring to your enterprise?]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2212-industry-innovations</link>
    <language>en-us</language>
    <item>
      <title>Security technology at GSX 2022</title>
      <description>
        <![CDATA[<p>As GSX nears, <em>Security </em>magazine has a roundup of some of the security products, technologies and services that security management professionals may discover at the event.
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/98164</guid>
      <pubDate>Mon, 15 Aug 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/98164-spotlight-on-security-technology-at-gsx-2022</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/August/SEC-0822-Prod-Feat-Slide1-1170x658.webp?t=1662126323" type="image/jpeg" length="93035"/>
    </item>
    <item>
      <title>Product spotlight on threat monitoring and risk assessment solutions</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine spotlights threat management and risk assessment solutions and tools for improved physical security operations. 
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97992</guid>
      <pubDate>Fri, 15 Jul 2022 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97992-product-spotlight-on-threat-monitoring-and-risk-assessment-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/july/SEC-0722-Prod-Feat-Slide1-1170x658.webp?t=1658510172" type="image/jpeg" length="95606"/>
    </item>
    <item>
      <title>Product spotlight: Sports, venue and entertainment security</title>
      <description>
        <![CDATA[Security magazine highlights sports, venue and entertainment security solutions, including drone countermeasures, parking management systems, weapons detection and more.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97837</guid>
      <pubDate>Fri, 17 Jun 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97837-product-spotlight-sports-venue-and-entertainment-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/June/SEC0622-ProdSpot-Feat-Slide1_1170x658.webp?t=1655499457" type="image/jpeg" length="92823"/>
    </item>
    <item>
      <title>Product spotlight on video surveillance</title>
      <description>
        <![CDATA[<p>From drone security footage to video wall management, Security magazine spotlights video surveillance solutions and tools.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97627</guid>
      <pubDate>Mon, 16 May 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97627-product-spotlight-on-video-surveillance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/may/SEC-0522-Prods-Feat-Slide1-1170x658.webp?t=1652701348" type="image/jpeg" length="92297"/>
    </item>
    <item>
      <title>RSA Conference 2022 product preview</title>
      <description>
        <![CDATA[<p>From security policy building to automated cybersecurity defense, <em>Security </em>magazine spotlights solutions from the 2022 RSA Conference.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97416</guid>
      <pubDate>Wed, 13 Apr 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97416-rsa-conference-2022-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/april/SEC-0422-Prods-Feat-Slide1-1170x658.webp?t=1649851509" type="image/jpeg" length="92384"/>
    </item>
    <item>
      <title>Are You Utilizing Big Data in Your Building Security?</title>
      <author>reedaj@bnpmedia.com (Amanda Reed)</author>
      <description>
        <![CDATA[<p>When it comes to big data, physical security is a little late to the game. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97411</guid>
      <pubDate>Tue, 12 Apr 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97411-are-you-utilizing-big-data-in-your-building-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/april/digital.webp?t=1649776993" type="image/png" length="807183"/>
    </item>
    <item>
      <title>Product spotlight on pandemic management and contact tracing solutions</title>
      <description>
        <![CDATA[<p>Security magazine spotlights solutions that aid enterprises in their efforts to mitigate COVID-19 risk, including disinfecting robots, employee wellness checks and more.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97250</guid>
      <pubDate>Mon, 14 Mar 2022 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/97250-product-spotlight-on-pandemic-management-and-contact-tracing-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/March/SEC0322-Prods-Feat-Slide1_1170x658.webp?t=1647262161" type="image/jpeg" length="92902"/>
    </item>
    <item>
      <title>How to Use Data, AI &amp; the Cloud to Change Your Building Operations</title>
      <author>reedaj@bnpmedia.com (Amanda Reed)</author>
      <description>
        <![CDATA[<p>Every day, CISOs, CSOs, and their teams are challenged to discover hazards, assess risk, and respond appropriately.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97119</guid>
      <pubDate>Mon, 21 Feb 2022 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/97119-how-to-use-data-ai-and-the-cloud-to-change-your-building-operations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/Feb/pixels.webp?t=1645470865" type="image/jpeg" length="329633"/>
    </item>
    <item>
      <title>ISC West 2022 product preview</title>
      <description>
        <![CDATA[<p>Check out the latest products and solutions to be introduced at ISC West 2022, from artificial intelligence-based access control to traffic monitoring and audio threat detection.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/97077</guid>
      <pubDate>Mon, 14 Feb 2022 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/97077-isc-west-2022-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/Feb/SEC0222-ProdSpot-Feat-Slide1_1170x658.webp?t=1644842729" type="image/jpeg" length="93931"/>
    </item>
    <item>
      <title>Product spotlight on healthcare solutions</title>
      <description>
        <![CDATA[<p>Security magazine spotlights solutions that can benefit security professionals in the healthcare sector, from securing medical devices to connecting first responders with live incident video streams.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96904</guid>
      <pubDate>Fri, 14 Jan 2022 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96904-product-spotlight-on-healthcare-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2022/Jan/SEC0122-ProdSpot-Feat-Slide1_1170x658.webp?t=1642118133" type="image/jpeg" length="92117"/>
    </item>
    <item>
      <title>Cybersecurity solutions roundup 2021</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine spotlights cybersecurity solutions released in 2021, covering everything from insider risk mitigation to improved threat monitoring.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96762</guid>
      <pubDate>Fri, 17 Dec 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96762-cybersecurity-solutions-roundup-2021</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/12/17/SEC1221-ProdSpot-WEBex_900px-(1).webp?t=1639772182" type="image/jpeg" length="263795"/>
    </item>
    <item>
      <title>Security solutions roundup 2021</title>
      <description>
        <![CDATA[As the year ends, Security magazine spotlights the security industry’s latest solutions below. Innovative products, services and technologies not only help security leaders thrive in their roles, but also keep people and assets safe to create more secure, efficient and intelligent organizations.]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96674</guid>
      <pubDate>Fri, 10 Dec 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96674-security-solutions-roundup-2021</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/12/09/SEC-1221-Prods-Feat-Slide1-1170x658.webp?t=1639091222" type="image/jpeg" length="123434"/>
    </item>
    <item>
      <title>Product spotlight on identity management solutions</title>
      <description>
        <![CDATA[<p>Securing physical or digital assets are at the heart of reducing enterprise and business risks. Identity management solutions help enterprises verify a user’s identity and ensure that only authorized users access facilities, applications, systems or networks. Let’s explore a sampling of the latest identity management solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96570</guid>
      <pubDate>Tue, 23 Nov 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/96570-product-spotlight-on-identity-management-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/10/SEC1021-ProdSpot-Feat-slide1_900px.webp?t=1634245017" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Achieving accessibility and security with turnstiles</title>
      <description>
        <![CDATA[<p><span style="color: rgb(65, 65, 65); letter-spacing: normal; orphans: 2; text-align: left; white-space: normal; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Accessibility in security has not been a critical focus for the security industry. And, security should never be an oversight. Neither should accessibility.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96367</guid>
      <pubDate>Tue, 26 Oct 2021 09:47:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/96367-achieving-accessibility-and-security-with-turnstiles</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/10/illuminate.webp?t=1636486185" type="image/jpeg" length="496409"/>
    </item>
    <item>
      <title>Product spotlight on mass notification solutions</title>
      <description>
        <![CDATA[<p>In emergencies such as a natural disaster, industrial accident, IT service disruptions or facility intrusion, delivering important messages with real-time speed while collecting situational feedback can save lives and keep critical business operations running. Enter mass notification technology. Here, we explore a sampling of the latest mass notification solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96312</guid>
      <pubDate>Fri, 15 Oct 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/96312-connects-people-devices-and-organizations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/10/SEC1021-ProdSpot-Feat-slide1_900px.webp?t=1634245017" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Product spotlight on surveillance for airports/seaports</title>
      <description>
        <![CDATA[<p>Security issues exist every day at airports and seaports, but security solutions and a multi-layered surveillance approach go a long way in a world of ever-increasing risk. Here, we explore a sampling of the latest surveillance solutions for airports and seaports.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96089</guid>
      <pubDate>Wed, 15 Sep 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/96089-product-spotlight-on-surveillance-for-airports-seaports</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/09/15/SEC0621-ProdSpot-Feat-slide1_900px.webp?t=1632860320" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Product spotlight on IP video surveillance</title>
      <description>
        <![CDATA[<p>Switching from analog to IP-based cameras can offer more reliable security and added value for your business, providing higher resolutions to cover larger areas or get more detailed images to meet identification requirements to deliver vital business data and increase surveillance efficiency, all with potential for integration. Here is a sampling of the latest IP video surveillance solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95625</guid>
      <pubDate>Fri, 16 Jul 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95625-product-spotlight-on-ip-video-surveillance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/July/Product-Spotlight/SEC0721-ProdSpot-Feat-slide1_900px.webp?t=1625837938" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>ISC West Product Preview 2021</title>
      <description>
        <![CDATA[<p>Here are some of the security solutions that will be displayed at this year&#39;s ISC West.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95417</guid>
      <pubDate>Wed, 16 Jun 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95417-isc-west-product-preview-2021</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/June/Product-Spotlight/SEC0621-ProdSpot-Feat-slide1_900px.webp?t=1623767242" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Product spotlight on sports, stadiums and venue security</title>
      <description>
        <![CDATA[<p>As COVID-19 remains a threat, security leaders at sporting events and entertainment venues need to pivot and change course as needed &mdash; relying on security technology, procedures and policies to support the health and safety of players, fans, visitors and staff. Here is a sampling of security technologies offered.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95211</guid>
      <pubDate>Mon, 17 May 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95211-product-spotlight-on-sports-stadiums-and-venue-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/May/product-spotlight/SEC0521-ProdSpot-Feat-slide1_900px.webp?t=1621251959" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Product spotlight on cybersecurity, data protection, and privacy solutions</title>
      <description>
        <![CDATA[<p>Check out the latest cybersecurity products, all designed to protect your networks, infrastructure, critical data, assets and private information.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/95033</guid>
      <pubDate>Fri, 16 Apr 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/95033-product-spotlight-on-cybersecurity-data-protection-and-privacy-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/April/product-spotlight/SEC0421-ProdSpot-Feat-slide1_900px.webp?t=1618587848" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Secures Digital Lives</title>
      <description>
        <![CDATA[<p>At the highest level, the goal of a security team is to prevent data from being stolen.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94877</guid>
      <pubDate>Tue, 23 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94877-secures-digital-lives</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-Lookout-slide9_900px.webp?t=1616505216" type="image/jpeg" length="29756"/>
    </item>
    <item>
      <title>Simplifies IT Infrastructure and Secures Data Sharing</title>
      <description>
        <![CDATA[<p>TetherView&rsquo;s Digital Bunker is a one-way-in and one-way-out private cloud solution targeted at businesses, governmental institutions and industries dealing with sensitive and private information.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94876</guid>
      <pubDate>Tue, 23 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94876-simplifies-it-infrastructure-and-secures-data-sharing</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-TetherView-slide8_900px.webp?t=1616505105" type="image/jpeg" length="69998"/>
    </item>
    <item>
      <title>Offers Data Protection Across Structured and Unstructured On-Premises</title>
      <description>
        <![CDATA[<p>Concentric announced the latest advancements in its Semantic Intelligence data access governance solution for autonomous identification and risk assessment of inappropriate access, data sharing and user interactions &ndash; now with insights into user-related risks and support for both structured and unstructured data.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94875</guid>
      <pubDate>Tue, 23 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94875-offers-data-protection-across-structured-and-unstructured-on-premises</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-Concentric-slide7_900px.webp?t=1616505030" type="image/jpeg" length="34918"/>
    </item>
    <item>
      <title>Protects Privileged Accounts</title>
      <description>
        <![CDATA[<p>Thycotic Secret Server provides privileged access management (PAM) to organizations around the world and empowers them to securely monitor, manage and defend their most critical identity accounts and credentials.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94873</guid>
      <pubDate>Tue, 23 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94873-protects-privileged-accounts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-Thyotic-slide5_900px.webp?t=1616504855" type="image/jpeg" length="39454"/>
    </item>
    <item>
      <title>Spots Cyber Threats and Identifies Suspicious Activity</title>
      <description>
        <![CDATA[<p>New Net Technologies Change Tracker Gen 7 R2 provides critical and fundamental cybersecurity prevention and detection.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94872</guid>
      <pubDate>Tue, 23 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94872-spots-cyber-threats-and-identifies-suspicious-activity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/perimeter-security/SEC0321-ProdSpot-NewNet-slide4_900px.webp?t=1616504926" type="image/jpeg" length="58368"/>
    </item>
    <item>
      <title>Ensures Security and Privacy Compliance</title>
      <description>
        <![CDATA[<p>Paradigm by MediaPro is data privacy training that puts people first. The platform focuses on positive action and making an emotional connection with the learner.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94871</guid>
      <pubDate>Tue, 23 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94871-ensures-security-and-privacy-compliance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-MediaPro-slide3_900px.webp?t=1616503981" type="image/jpeg" length="41767"/>
    </item>
    <item>
      <title>Helps Reduce Digital Risk </title>
      <description>
        <![CDATA[<p>Digital Shadows&rsquo; SearchLight continuously identifies where digital assets (data, websites and social media accounts) are exposed, providing sufficient context to understand the risk, and options for remediation.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94869</guid>
      <pubDate>Tue, 23 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94869-helps-reduce-digital-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-Digital-slide2_900px.webp?t=1616440767" type="image/jpeg" length="59431"/>
    </item>
    <item>
      <title>Product Spotlight On Privacy Protection Solutions</title>
      <description>
        <![CDATA[<p>Check out the latest privacy protection solutions designed to reduce digital risk, safeguard data and overall improve privacy.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94867</guid>
      <pubDate>Mon, 22 Mar 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/94867-product-spotlight-on-privacy-protection-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/March/Product-Spotlight/SEC0321-ProdSpot-Feat-slide1_900px.webp?t=1616439744" type="image/jpeg" length="93473"/>
    </item>
    <item>
      <title>Indoor Autonomous Robot Facilitates Security Operations</title>
      <description>
        <![CDATA[<p>Cobalt Robotics&rsquo; security robot solves several physical security challenges for today&rsquo;s organizations, helping protect people, assets and intellectual property.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94370</guid>
      <pubDate>Fri, 15 Jan 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/94370-indoor-autonomous-robot-facilitates-security-operations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/January/product-spotlight/SEC0121-Prods-slide3_900px.webp?t=1610965479" type="image/jpeg" length="32599"/>
    </item>
    <item>
      <title>Quickly Mitigate Drone Threats</title>
      <description>
        <![CDATA[<p>AeroDefense&rsquo;s AirWarden offers fixed and mobile (in-motion) solutions to detect drones and pilots at airports, correctional facilities, stadiums, critical infrastructure and other high-value targets.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/94369</guid>
      <pubDate>Fri, 15 Jan 2021 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/94369-quickly-mitigate-drone-threats</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2021/January/product-spotlight/SEC0121-Prods-slide2_900px.webp?t=1610965457" type="image/jpeg" length="64946"/>
    </item>
  </channel>
</rss>
