<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>New Security Technology</title>
    <description>
      <![CDATA[For unified physical security, learn about security technology and the latest security products, including video surveillance cameras, perimeter fencing, access control, risk assessments, CCTV, fire alarms and more.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2666-new-security-technology</link>
    <language>en-us</language>
    <item>
      <title>Product Spotlight on Analytics</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a few analytics products on the market in 2026.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102107</guid>
      <pubDate>Mon, 09 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102107-product-spotlight-on-analytics</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-ProdSpot-Feat_1170x658.webp?t=1770858203" type="image/jpeg" length="90105"/>
    </item>
    <item>
      <title>Product Spotlight on Healthcare</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a few healthcare security products for 2026.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102087</guid>
      <pubDate>Mon, 26 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102087-product-spotlight-on-healthcare</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-ProdSpot-Feat_1170x658.webp?t=1768927718" type="image/jpeg" length="72333"/>
    </item>
    <item>
      <title>RSA 2025 product preview</title>
      <description>
        <![CDATA[<p>RSA 2025 takes place from April 28 through May 1 in San Francisco, California, bringing together cybersecurity leaders from all over the country. Security magazine highlights a few products from this year’s RSA exhibitors.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101521</guid>
      <pubDate>Tue, 08 Apr 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101521-rsa-2025-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/04-April/SEC-0425-ProdSpot-Slide_1170x658.webp?t=1744035739" type="image/jpeg" length="92307"/>
    </item>
    <item>
      <title>2025 ISC West product preview</title>
      <description>
        <![CDATA[<p>Security magazine highlights a variety of products on display at this year’s conference.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101455</guid>
      <pubDate>Tue, 11 Mar 2025 23:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101455-2025-isc-west-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/03-March/SEC-0325-ProdSpot-Feat_1170x658.webp?t=1741696130" type="image/jpeg" length="92531"/>
    </item>
    <item>
      <title>Product spotlight on mobile solutions</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights both cyber and physical mobile security solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101334</guid>
      <pubDate>Fri, 07 Feb 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101334-product-spotlight-on-mobile-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/02-February/SEC-0225-ProdSpot-Feat_1170x658.webp?t=1738003905" type="image/jpeg" length="91960"/>
    </item>
    <item>
      <title>Product spotlight on video surveillance</title>
      <description>
        <![CDATA[<p>Security magazine highlights a number of video surveillance solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101278</guid>
      <pubDate>Fri, 10 Jan 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101278-product-spotlight-on-video-surveillance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/01-January/SEC-0125-ProdSpot-Feat1_1170x658.webp?t=1736265758" type="image/jpeg" length="92616"/>
    </item>
    <item>
      <title>Product spotlight: Year in review</title>
      <description>
        <![CDATA[<p>Security magazine highlights some of the products that have been released in 2024.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101227</guid>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101227-product-spotlight-year-in-review</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/12-December/SEC-1224-ProdSpot-Feat_1170x658.webp?t=1733412804" type="image/jpeg" length="88752"/>
    </item>
    <item>
      <title>Product spotlight on analytics</title>
      <description>
        <![CDATA[<p>Security magazine showcases analytics platforms focused on monitoring and organizing data from a variety of sources.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101175</guid>
      <pubDate>Tue, 12 Nov 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101175-product-spotlight-on-analytics</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/11-November/SEC-1124-ProdSpot-Feat-Slide_1170x658.webp?t=1730826883" type="image/jpeg" length="87189"/>
    </item>
    <item>
      <title>Product spotlight on robotics and drones</title>
      <description>
        <![CDATA[<p>Security leaders can utilize robotics and drones to increase visibility without risking additional personnel.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101101</guid>
      <pubDate>Tue, 08 Oct 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101101-product-spotlight-on-robotics-and-drones</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/10-October/SEC-1024-ProdSpot-FEAT_1170x658.webp?t=1728060462" type="image/jpeg" length="92348"/>
    </item>
    <item>
      <title>Product spotlight: GSX 2024 product preview</title>
      <description>
        <![CDATA[<p>Security magazine highlights some of the products featured at GSX 2024.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101007</guid>
      <pubDate>Tue, 10 Sep 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101007-product-spotlight-gsx-2024-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/09-September/SEC-0924-ProdSpot-Feat_1170x658.webp?t=1725470763" type="image/jpeg" length="92745"/>
    </item>
    <item>
      <title>Product spotlight on cybersecurity</title>
      <description>
        <![CDATA[<p>Security magazine highlights a variety of cybersecurity products to protect data and businesses.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100903</guid>
      <pubDate>Tue, 06 Aug 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100903-product-spotlight-on-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/08-August/SEC-0824-ProdSpot-Feat-Slide1_1170x658.webp?t=1722452754" type="image/jpeg" length="91169"/>
    </item>
    <item>
      <title>Product spotlight on access control</title>
      <description>
        <![CDATA[<p>Security magazine highlights physical and cyber access control solutions.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100837</guid>
      <pubDate>Tue, 09 Jul 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100837-product-spotlight-on-access-control</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/07-July/SEC-0724-Prod-Feat-Slide1_1170x658.webp?t=1720463512" type="image/jpeg" length="91835"/>
    </item>
    <item>
      <title>Product spotlight on risk and threat monitoring</title>
      <description>
        <![CDATA[<p>Security magazine highlights a few products that help keep critical systems safe from attack.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100767</guid>
      <pubDate>Tue, 11 Jun 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100767-product-spotlight-on-risk-and-threat-monitoring</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/06-June/SEC-0624-ProdSpot-Feat-Slide1_1170x658.webp?t=1717774821" type="image/jpeg" length="92556"/>
    </item>
    <item>
      <title>Axis Communications unveils new experience center in Texas</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">In early May, Axis Communications celebrated the grand opening of its latest Axis Experience Center (AEC) in Frisco, Texas. </span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100700</guid>
      <pubDate>Fri, 17 May 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100700-axis-communications-unveils-new-experience-center-in-texas</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/05/23/Axis-Communications-photo.webp?t=1716474098" type="image/png" length="599970"/>
    </item>
    <item>
      <title>RSA Conference</title>
      <description>
        <![CDATA[<p>Security magazine highlights products being showcased at this year's RSA Conference.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100636</guid>
      <pubDate>Tue, 07 May 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100636-rsa-conference</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/05-May/SEC-0524-ProdSpot-Feat_1170x658.webp?t=1715008498" type="image/jpeg" length="89375"/>
    </item>
    <item>
      <title>ISC West product preview</title>
      <description>
        <![CDATA[<p>This month, Security magazine highlights some of the products that will be featured at ISC West.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100566</guid>
      <pubDate>Tue, 09 Apr 2024 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100566-isc-west-product-preview</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/04-April/SEC-0424-ProdSpot-Feat_1170x658.webp?t=1712074698" type="image/jpeg" length="92737"/>
    </item>
    <item>
      <title>Product spotlight on crisis management &amp; communications</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights crisis management platforms, alert systems and mass-communication channels.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100481</guid>
      <pubDate>Fri, 08 Mar 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100481-product-spotlight-on-crisis-management-and-communications</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/03-March/SEC-0324-ProdSpot-Feat_1170x658.webp?t=1711833837" type="image/jpeg" length="92665"/>
    </item>
    <item>
      <title>Product spotlight on video surveillance solutions</title>
      <description>
        <![CDATA[<p>Security magazine highlights a number of video surveillance solutions, including cameras and video management software (VMS).</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100355</guid>
      <pubDate>Tue, 06 Feb 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100355-product-spotlight-on-video-surveillance-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/02-February/SEC-0224-ProdSpot-FEAT_1170x658.webp?t=1706298396" type="image/jpeg" length="92154"/>
    </item>
    <item>
      <title>AI may revolutionize security, but not without human intuition</title>
      <author></author>
      <description>
        <![CDATA[<p>While there is a lot of excitement around AI, a certain question arises: Can AI replace human intuition? Can it substitute for security expertise?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100378</guid>
      <pubDate>Fri, 02 Feb 2024 08:51:07 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100378-ai-may-revolutionize-security-but-not-without-human-intuition</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/02/01/redd-f-5U_28ojjgms-unsplash.webp?t=1706890250" type="image/jpeg" length="127081"/>
    </item>
    <item>
      <title>Product spotlight on mobile security solutions</title>
      <description>
        <![CDATA[<p>Security magazine highlights mobile and portable security solutions, including alarms, phishing-prevention and communication devices.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100302</guid>
      <pubDate>Tue, 09 Jan 2024 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100302-product-spotlight-on-mobile-security-solutions</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2024/01-January/SEC-0124-ProdSpot-FEAT-Slide1_1170x658.webp?t=1704732203" type="image/jpeg" length="92552"/>
    </item>
    <item>
      <title>Generative AI and IGA: Three considerations</title>
      <description>
        <![CDATA[<p>The introduction of ChatGPT and the generative AI model is one of the most significant new technology developments security leaders have seen.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100292</guid>
      <pubDate>Fri, 05 Jan 2024 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100292-generative-ai-and-iga-three-considerations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/01/05/mojahid-mottakin-1Na806ZwUPg-unsplash-(1).webp?t=1704488910" type="image/jpeg" length="101825"/>
    </item>
    <item>
      <title>95% of executives say AI initiatives will fail without training</title>
      <author></author>
      <description>
        <![CDATA[<p>Organization's readiness for AI was analyzed in a recent report by Pluralsight, finding that employee's AI confidence and experience don't match.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100201</guid>
      <pubDate>Tue, 05 Dec 2023 14:43:52 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100201-95-of-executives-say-ai-initiatives-will-fail-without-training</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/12/05/adolfo-felix-PG8NyM_Mcts-unsplash.webp?t=1701805256" type="image/jpeg" length="116734"/>
    </item>
    <item>
      <title>Product spotlight on analytics</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a variety of analytics platforms focusing on video surveillance, natural disasters and cyberattacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100107</guid>
      <pubDate>Tue, 07 Nov 2023 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/100107-product-spotlight-on-analytics</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2023/November/SEC-1123-ProdSpot-Feat_1170x658.webp?t=1699301505" type="image/jpeg" length="88255"/>
    </item>
    <item>
      <title>Fighting the dark side of generative AI</title>
      <description>
        <![CDATA[<p>Policymakers and government leaders have rightfully grown alarmed by the rapid rise of generative artificial intelligence (AI) tools such as ChatGPT.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100096</guid>
      <pubDate>Fri, 03 Nov 2023 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100096-fighting-the-dark-side-of-generative-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/11/02/andrew-neel-CVfAqFRYjb0-unsplash.webp?t=1699033223" type="image/jpeg" length="79334"/>
    </item>
    <item>
      <title>3 rising AI trends CISOs must prepare for </title>
      <description>
        <![CDATA[<p>Artificial intelligence's impact on data security will transform the way security leaders shape cybersecurity strategy for years to come. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/100007</guid>
      <pubDate>Wed, 11 Oct 2023 14:33:05 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/100007-3-rising-ai-trends-cisos-must-prepare-for</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/10/11/screen-post-rVcxGBT80j8-unsplash.webp?t=1697048622" type="image/jpeg" length="66202"/>
    </item>
    <item>
      <title>Fighting AI with AI</title>
      <description>
        <![CDATA[<p>Despite only being three years into the decade, the 2020s has already cemented itself as a turning point in the artificial intelligence arms race.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99783</guid>
      <pubDate>Mon, 21 Aug 2023 13:17:12 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99783-fighting-ai-with-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/08/21/markus-winkler-tGBXiHcPKrM-unsplash.webp?t=1692637676" type="image/jpeg" length="78797"/>
    </item>
    <item>
      <title>Rise of AI leads to free training sources</title>
      <author></author>
      <description>
        <![CDATA[<p>The rise of technology such as artificial intelligence (AI) has led to security leaders looking for ways to educate themselves on its uses and risks. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99730</guid>
      <pubDate>Mon, 07 Aug 2023 16:03:51 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99730-rise-of-ai-leads-to-free-training-sources</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/08/07/christin-hume-mfB1B1s4sMc-unsplash.webp?t=1691438522" type="image/jpeg" length="87616"/>
    </item>
    <item>
      <title>Unlocking the power of generative AI </title>
      <description>
        <![CDATA[<p>It doesn’t matter how many security leaders write alarmist letters, the fact is that AI is too widespread and too easily replicated to be locked away.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99718</guid>
      <pubDate>Fri, 04 Aug 2023 09:10:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99718-unlocking-the-power-of-generative-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/08/03/mojahid-mottakin-964EVPuLDoA-unsplash.webp?t=1691161808" type="image/jpeg" length="24238"/>
    </item>
    <item>
      <title>Assessing the pros and cons of AI for cybersecurity</title>
      <description>
        <![CDATA[<p>Artificial intelligence (AI) has significant implications for cybersecurity, both in terms of enhancing cybersecurity defenses and creating new challenges and risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99487</guid>
      <pubDate>Tue, 01 Aug 2023 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99487-assessing-the-pros-and-cons-of-ai-for-cybersecurity</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/07/06/network-g65056e947_1280.webp?t=1698762465" type="image/jpeg" length="362667"/>
    </item>
    <item>
      <title>Using cloud-based video technology in enterprise-level organizations </title>
      <description>
        <![CDATA[<p>In an era of endless new security technology, protecting a business’s employees, customers and the public at large is a priceless endeavor.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/99685</guid>
      <pubDate>Fri, 28 Jul 2023 09:10:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/99685-using-cloud-based-video-technology-in-enterprise-level-organizations</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2023/07/27/jurgen-jester-_PizUeTnvFE-unsplash.webp?t=1690490504" type="image/jpeg" length="32254"/>
    </item>
  </channel>
</rss>
