• SEC's risk management program with University of South Carolina

    Risk management education with the Security Executive Council and USC

    Video • April 26th, 2012

  • Shayne Bates on the impact of the cloud on security

    Recorded at The Great Conversation/ASG Security Summit: Shayne Bates of LMC Consulting/Microsoft Global Security discusses the value that cloud services will bring to the security industry.

    Video • April 26th, 2012

  • ASG's William Plante on why systems integrators need to be IT experts

    Recorded at The Great Conversation: ASG's William Plante discusses the importance of IT training for security integration firms, plus how the role of the systems integrator is changing based on needs of security end-users.

    Video • April 26th, 2012

  • 2 Minutes with IQ - About the IQ Certification Program

    The first in a series of videos to inform you about the Installation Quality Certification Program for security alarm companies

    Video • April 23rd, 2012

  • Using FIPS, TWIC and CAC cards with Continental Access CA3000 card access control software

    Scott Schramme, vice president of sales for Continental Access, discusses PIV, FIPS 201, TWIC and CAC card integration and enrollment with Continental's Card Access 3000 (CA3000) access control software

    Video • April 20th, 2012

  • Proximex Surveillint 6.0 PSIM solution

    Award-winning solution helps organizations expand their incident response reach to stakeholders and agencies as well as unite physical security and business operations.

    Video • April 18th, 2012

  • Continental's Enterprise Security Solution

    Company integrates technologies to create Napco Fusion solution

    Video • March 28th, 2012

  • A camera that can look around corners

    It's out of (line of) sight, but not out of view. The Camera Culture group at MIT's Media Lab has created CORNAR: Looking around Corners with Femtophotography. With CORNAR, femtosecond imaging technology provides a way to see things beyond the line of...

    Video • March 26th, 2012

  • Mythbusters try to beat a PIR intrusion sensor

    In this YouTube video, the team from Mythbusters try to beat a thermal intrusion security sensor (a passive infrared sensor, aka PIR, that detects thermal differences). See how many attempts and what lengths they have to go to out-smart a basic system.

    Video • March 20th, 2012

  • How to get your alarm customers back

    Bob Ryan, SVP, Sales & Marketing, ASG Security on how to convert alarm cancellations into customers

    Video • March 13th, 2012

  • Best Practice: Locking in your fire service contracts

    How Pro-Tech turned $67 into $67,000: An interview with Angela White, president, Pro-Tech Systems

    Video • March 13th, 2012

  • Networking Topology Tutorial

    The third in a series of networking tutorials from, this one covers topics like network terminations, ring topology, switches, mesh networks -- these are great videos if you're a security industry specialist wrestling with today's new...

    Video • February 24th, 2012

  • Networking Basics Tutorial

    A great tutorial video from on key IT networking basics like nodes, client/host, servers, NICs. Recommended if you know next to nothing about computer networking, but probably too basic for those of you who have configured routers and...

    Video • February 24th, 2012

  • Benefits of being a CISSP

    Internet humorist "InfoSecCynic" talks about the real value of a prominent industry certification and gives a laugh for those of you who have worked hard to get letters behind your name.

    Video • February 24th, 2012

  • Workplace violence prevention for small retail

    A 1992 video from Washington State Dept of Labor & Industries discusses workplace violence prevention for small retail stores.

    Video • January 16th, 2012