Aiphone News
Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades Limited financial resources are a common pain point for primary/secondary schools looking to implement cutting-edge security technology. But security needs persist despite scarce resources. All school administrators want to do everything in their power to secure their facilities against threats. More schools are recognising the benefits and, in some cases, requiremen...
The people element is a huge variable in the operation of any security system, and in any aspect of business for that matter. Training is a valuable tool to manage that variable, especially as it relates to newer, more complex networked physical security systems. Training can be a challenge throughout our market, which needs well-trained employees at the security front lines of our end users companies as well as competent, knowledgeable technicians handling installation and maintenance of securi...
We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximise the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilising existing technology capabilities are a waste of money, aren’t they?
Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organisations participated in our...
Grants continue to be available for schools to purchase products such as our intercoms and communication systems 2014/2015 Aiphone Review and Forecast: Video surveillance, audio, access control and locks are the four security solutions that typically work together as part of an overall security plan. Demand for video may have been the prime driver, but 2014 was a solid year for each of these solutions as the economy improved noticeably. Also, federal and state governmen...
Western State Hospital (WSH) is a state psychiatric hospital which is licensed and operated by the Virginia Department of Behavioral Health and Developmental Services. In late 2013, patients and staff moved into the brand new $140 million dollar facility, located in Staunton, Virginia. WSH offers individualized treatment to people with mental illness and substance abuse needs. The original facility was built in 1828 at a location nearby and was listed on the National Register of Historic Places...
ADI selected Arecont Vision as its Vendor of the Year for the United States and CDVI for Canada ADI recently announced the recipients of its 2013 Vendor Awards. ADI selected Arecont Vision its Vendor of the Year for the United States, and CDVI for Canada. ADI also recognised vendors in the categories of New Product of the Year, Best Sales Support, Best Marketing Support, Rookie Vendor of the Year, and Best Supplier Delivery Performance. Each year, ADI recognises key suppliers...
The new IP-based systems use the Ocularis software system with more than 4,600 Panasonic network cameras In today’s economy, it can be difficult for correctional facilities to obtain the funding needed to upgrade their security technologies. However, a series of high visibility incidents in Texas in 2008 cast a bright light on the benefits of video surveillance and the critical need to maintain high-performing systems. Now the Texas Department of Criminal Justice (TDCJ)...
Tri-Ed hosts one day Technology Roadshows to familiarise customers with latest technologies Tri-Ed is pleased to continue its comprehensive Technology Roadshow training program throughout 2013. Dealers and integrators will want to mark their calendars for the Tri-Ed Roadshow coming to Anaheim, CA on Wednesday, November 13th. This free one-day event will be held at the DoubleTree by Hilton Anaheim, located at 100 the City Drive in Orange. The Roadshow kicks off at 8 a.m. with...
PSA Security’s PVP program enhances the value of the PSA relationship to its vendor partners PSA Security Network recently announced that IQinVision is the newest addition to their Premier Vendor Partner (PVP) program. IQinVision is a market leader in high-performance HD megapixel IP cameras. The program was created to enhance the value of the PSA relationship to its vendor partners and subsequently to its owners and customers. The PSA Premier Vendor Program has a defin...
The NPS is the premier awards-based marketing programme in the security industryIris on the Move from Sarnoff won the Best New Product Award at the Security Industry Association New Product Showcase. Iris on the Move is an iris recognition device that can capture an iris image at a distance of as much as 10 feet while an individual is in motion and allows a throughput of as many as 30 people per minute.CyberKey Vault from Videx received the Judges' Choice Award, which recognises an entry that of...
Browse security news
- By event
- The Health & Safety Event 2025
- The Security Event 2025
- 11th National Conference On CFIUS
- RSA Conference 2025
- RSAC USA 2025
- 19th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- G2E Asia + Asian IR Expo 2025
- Airport Show 2025
- Secutech 2025
- 6th European Forum on Global FDI Reviews
- Infosecurity Europe 2025
- View more
Anviz W2 Face Hybrid Biometric Time Attendance & Access Control Terminal
Morse Watchmans SmartKey Locker® Touch
Dahua AI-powered 8MP TiOC Pro WizColor Eyeball Camera
How to register the AIPHONE IXG, Intercom App
AIPHONE Corporate Video
IX Series IP Network Intercom - Introductory Video Aiphone
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download