Armenia News
Too often a valid assumption turns out to be the opposite in practical operation It’s easy to misinterpret product specifications of IP video transmission products to the detriment of system functionality. We have seen how this problem relates to port speed, power over Ethernet (PoE) and transmission media. Now let’s look at some additional aspects of product specifications – and how they can be misinterpreted. Importance Of Temperature Rating What about te...
Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the Illinois Electronic Security Association (IESA) to validate the reason for membership. Just last week IESA members and lobbyists travelled downstate to Springfield to show support and testify against two new bills, up for debate in a senate committee hearing, that would ultimately prove harmful and create a competitive disadvantage for license...
Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...
Milestone Systems is closing in on a year since their acquisition by Canon’s European subsidiary in June 2014. Throughout the ownership transition, Milestone has reiterated its commitment to open systems and continued to flourish, building its “ecosystem” alongside other industry partners. At the recent Milestone Integration Platform Symposium (MIPS 2015), I had a chance to chat with Lars Thinggaard, Milestone’s president and CEO, about industry trends and what’s ah...
School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (primary/secondary) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase in de...
Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HDTV, which in some cases was defined in terms of its resolution of 1920 hor...
Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...
Featuring on GJD’s stand will be the recently launched D-TECT 2 IP detector GJD Manufacturing Limited, one of the world’s most innovative leaders in UK manufacturing, design and supply of professional external detector equipment and CCTV LED Illuminators, recently announced it will showcase its latest innovations at IFSEC International 2015, on stand F1160 at the Excel, London from June 16th to 18th. IFSEC International is the world's largest gathering of security...
If we didn’t have manufacturers, integrators wouldn’t have anything to sell. But what is the role of manufacturing companies when it comes to taking those products to market? Effectively managing the sales channel – helping resellers be successful without somehow undermining their efforts or (heaven forbid!) selling direct to an end user – is an ongoing and delicate challenge for manufacturers. They want to do everything in their power to ensure success of their products...
Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...
Sir Ranulph Fiennes will touch on how the ability to perform under extreme pressure determines success Sir Ranulph Fiennes Bt OBE has recently been revealed as the second high-profile speaker confirmed for the Inspirational Speaker Series at this year’s Protection & Management Series; he will take to the stage on Wednesday 17th June at 2.30pm at ExCeL London. The world’s greatest living explorer at Protection & Management 2015 Pushing the boundaries o...
Commoditisation of cameras and downward price pressure are big topics in the video surveillance market. There was an interesting discussion about pricing and its impact on the integrator community at last month’s MIPS 2015 (Milestone Integration Platform Symposium). Participants were several of the major camera manufacturers, who provided a variety of viewpoints. Prompting the discussion – but with no representative on the panel – were the emerging Chinese manufacturers, who a...
Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across several countries during a week when UBM announced that Protection & Management 2015 (which includes the IFSEC International trade fair) will feature Karren Brady (Baroness Brady), a career soccer executive, as one of its inspirational keynote speakers. As I type, inquests are being held into the deaths of some of the 96 people who were kill...
Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...
According to a recent MarketsandMarkets report, video surveillance storage solutions and services are experiencing a rapid adoption in the industry, estimated to grow 16.3 percent each year until 2018, eventually reaching a market size of $10.41 billion. In addition to the specific image content of surveillance cameras, there are also huge amounts of data surrounding it – everything from the location to the time of day, the duration of the video, and more. And the amount of data in the ima...
Rob Martens, Allegion's futurist and director of connectivity platforms, is a leading strategist on the Internet of Things (IoT). He will be a featured panelist at the IoT Global Innovation Forum in April. In the following interview, Martens unfolds more about Allegion's IoT position and strategy. Question: There's a lot of buzz about the IoT. How is Allegion playing in this space? Rob Martens: Allegion is very active in the IoT space and is widely respected by many other peer organisatio...
“Buyer beware” is always good advice in the security marketplace – or in life for that matter. But the age-old warning is more timely than ever in our age of global commerce and given our fragmented market with thousands of products manufactured all over the world. Complicating the picture: our market is also inching toward commodisation and facing downward pricing that shrinks margins for manufacturers. So the question becomes: When is an item merely a good deal or somehow &ld...
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...
Exacq Technologies, part of the Security Products business unit of Tyco, introduces faster camera discovery and VideoPush to mobile devices with exacqVision 6.8 and automatic backup of recorder configurations in Enterprise System Manager (ESM), a health monitoring program for use with exacqVision Enterprise network video recorders (NVRs). Improved connectivity with multiple IP cameras: The EasyConnect feature introduced last year has been enhanced in exacqVision 6.8. EasyConnect allows users t...
Thermal cameras can often be used to cover larger areas than standard visible light cameras Smart thermal cameras use on-board video analytics and a high degree of video processing to detect people very accurately in complete darkness, bright sun, and bad weather over the typically large perimeters associated with transportation applications. Combining manpower and smart thermal technology makes security for transportation assets more effective. At the end of the day, it takes...
This week’s Expert Panel revisits a classic question that has been around since the advent of IP video: Should an enterprise’s video system have its own network, or should it share the corporate network? Our panellists' responses reflect new IT trends, technology changes and shifting priorities that are impacting how the question is approached. Rising concerns about cyber-security (such as fears that video might provide a hacker entry into the enterprise system) are one new aspect. N...
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged to a group promoting the unification of North and South Korea and that South Korean President Park Geun-hye called the event an attack on the South Korea-U.S. alliance. You would want to know where in Seoul the attack occurred as well as many...
Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors immediately turn to two favourites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by i...
There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the rewards. New opportunities for integrator companies, especially related to recurring monthly revenue (RMR), are among the benefits of new cloud-based systems. For insights into those opportunities, we spoke with Robert Hile, currently director of strategic accounts for SureView Systems and a strong proponent of cloud-based systems, whose backgroun...
Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power. Many of these involve pan-tilt-zoom (PTZ) domes and heaters and blowers that require additional power. This development created two areas of confusion which is highlighted in this article by N...
This year’s 10th anniversary Milestone Integration Platform Symposium (MIPS) was the largest ever, with 463 participants, including manufacturers, integrators and thought leaders from throughout the industry. Emphasizing Milestone’s “open platform” approach to the market, the 2015 event highlighted successful Milestone end users, new integrations with a variety of manufacturer partners, and a theme of “winning together.” Keeping Mum on the Canon-Axis acquisti...
Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and an automated key control system is a valuable tool. Key management systems offer multi-site transportation facilities increased security and control to help prevent authorised key access as well as reducing the number of lost or misplaced keys. As an example, road repair is often done at night and requires equipment, vehicles, lights, gene...
Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated – concerns about false alarms. Companies providing video analytics systems say the question isn’t whether false alarms can be eliminated, but rather how they can be managed. “We’re still very far away fro...
It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools. However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...
Browse security news
- By event
- Black Hat Middle East 2024
- Intersec 2025
- Data Centre & Cloud Innovation Summit 2025
- Inter Airport Southeast Asia (IASEA) 2025
- Global Table Games and Game Protection Conference 2024
- ISC East 2024
- SIA Honors 2024
- Dahej Industrial Expo 2024
- Suprema Global Partner Program (SGPP) 2024
- AUCSO European Region – Winter Conference 2024
- Inno Rail 2024
- View more
Featured products
Related videos
Enhanced security with S617 video door station
OPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download- Armenia Security companies
- Armenia Manufacturers
- Armenia Distributors
- Armenia Resellers / Dealers / Reps
- Armenia Installers
- Armenia Consultants
- Armenia Systems integrators
- Armenia Events / Training / Services
- Armenia Manned guarding
- Armenia Training organisations
- Armenia Associations / regulatory bodies
- Armenia Event organisers
- Armenia Media
- Armenia Recruitment / personnel
- Armenia Services