Armenia News

Honeywell IS335 Motion Detector

Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing customised IP video systems. Now available in eight or 16 channel models, the embedded NVRs are compatible with Honeywell’s equIP Series and Performance Series IP cameras, broadening options for IP-based surveillance systems. “Making the transition to IP cameras doesn’t have to be a big hassle – or a big burden on custome...

HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform

HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management and door opening experience via the robust KNOX 2.4 mobile platform that will be integrated into the new Samsung Galaxy S6 smart phone. Enterprises can now deploy HID Mobile Access® using Samsung’s advanced Android secure mobility platform in combination with Seos®, a secure, privacy-protecting mobile access platform. The Seos-po...

AXIS P39-R network camera series for outdoor use on vehicles

AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are all specially designed for onboard video surveillance in or on buses, trains, subway cars and emergency vehicles. Axis Communications, the global leader in network video surveillance, announces the outdoor-ready AXIS P3905-RE Network Camera as the latest addition to the AXIS P39-R Network Camera Series.  It is designed to be mounted on th...

Do security managers continue to be recruited from the military and law enforcement?

The retired police officer who takes a cushy job as a security director is almost a cultural cliché. Like any cliché, the idea has roots in the real world, where police departments have often been a rich source of the security industry’s leadership talent. Former military personnel often find their way to the security industry, too, and realise that the familiar elements of discipline and command structure translate well. We wondered about the impact of this historic trend an...

Is home automation driving a security renaissance?

According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal 22 percent or so. According to research firm IHS, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015. Perhaps this increase is due in part to the rise of interactive ser...

Security’s new job - Managing supply chain risks

Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at least mitigate those risks. This article explains the need to identify and respond to risks involved in a supply chain. Manufacturers should make efforts and develop strategies to enhance supply ch...

Combining thermal cameras with video analytics

Combining thermal imaging with analytics provides a robust system Prices are dropping for thermal cameras. Now they are much more affordable for non-military customers – and more likely to be used in combination with video analytics. Combining thermal imaging with analytics provides a robust system; the technologies work well together. Thermal cameras make it easier to detect motion because you are eliminating much of the detail and only emphasising temperature “c...

Key to IoT (Internet of Things) success: Scalable computing platforms

The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on data-centre resources and accumulating at a rate faster than anyone can process. Is the proliferation of sensory data simply evidence of an increasingly intrusive world, or can IoT be used for the improvement and development of intelligence-equipped cities? We believe that with the right steps the convergence of city operations with IoT...

Transportation end users embracing open video platform

Milestone Interconnect provides a cost-efficient and flexible way to have central surveillance operation across geographically dispersed sites The transportation vertical is embracing the open platform for video systems. In the past, manufacturers required transportation end users to purchase the camera, the recorders and the software all from one manufacturer. Now, with IP, organisations in the transportation vertical can use off-the-shelf cameras, servers (recorders) and sof...

Video analytics: On the server or at the edge?

Analytics at the edge provide the ability to process what is happening in a field of view and discern if a relevant alert is triggered There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For one thing, analytics at the edge provides the ability to process what is happening in a field of view and discern if a relevant alert is triggered. This can be faster and less expensive than the original video analytics model of using a separ...

Security training: How to improve among integrators and end users

The people element is a huge variable in the operation of any security system, and in any aspect of business for that matter. Training is a valuable tool to manage that variable, especially as it relates to newer, more complex networked physical security systems. Training can be a challenge throughout our market, which needs well-trained employees at the security front lines of our end users companies as well as competent, knowledgeable technicians handling installation and maintenance of securi...

Networking basics for security professionals: PoE standards are not so standard

Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will interact with each other regardless of manufacturer. For IP-powered PoE devices, we depend on standards such as 802.3af for devices requiring up to 15.4 watts and 802.3at for devices powered up to 30 watts. We depend on the devices generating the power to be able to be read by devices receiving the power. Our dependence is not al...

Video analytics applications in retail - beyond security

Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and “intelligence” about all aspects of the business. The retail vertical is leading the way in reaping the benefits of video analytics beyond the security function.   There are two reasons retailers have taken advantage of video analytics far more than other vertical markets. First, retailers generally face more theft than a...

HID Global UHF RFID tags for industrial environments

HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High Temperature Label portfolio of wafer-thin UHF RFID tags that endure harsh industrial environments. The company’s High Temperature Labels were originally designed for the automotive industry, where manufacturers use them to identify and track each vehicle both during assembly and throughout its life on the road. Lifetime traceability of...

Veterans in security: Military skills utilised to develop strategies

Veterans are able to use their skills from the military to help develop strategies Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role in frontline positions, but also their exposure to a diverse array of security challenges make them increasingly valuable in formulating security management strategies. At the same time, such companies also offer the veterans an alternative and re...

Custom-built IP cameras to boost transport security

The ability to clearly see facial features and other identifying characteristics on each passenger greatly enhances security Some of the video technology used in the transportation vertical is purpose-built, but the wide range of applications and environments is conducive to a variety of general-purpose technology, too. Leading IP camera makers like Axis, Sony and Panasonic have introduced new products to enhance safety and security of travel in  trains, buses or oth...

Video Analytics for forensics: Analytics-based forensic evidence collection

Intelligent searches of video archives provide investigators faster access to any needed video clip That video analytics can be immensely useful in forensics is relatively less known. However, forensic search capabilities offered by some modern video analytics solutions can not only save investigators significant amounts of time but also help them find results more accurately. These solutions leverage facial recognition and advanced object tracking, demographic analytics, lice...

Video analytics systems in real-world environments

Various vertical markets such as retail, airports, and transportation have benefited from video analytics Video analytics systems have progressed far beyond the theoretical and are now being used effectively in a range of applications. Let’s look at some of the real-world scenarios that have taken advantage of the latest video analytics systems. Video analytics aren’t just for security. For a traffic application, Agent Vi provides business intelligence on the ave...

High quality images maximise video analytics success

The better the sensors, the better the analytics Garbage in, garbage out. The familiar cliché is just as applicable to the area of video analytics as any other field of computing. You simply must have a high-quality image in order to achieve a high-functioning analytics system. The good news is that video cameras, which are the sensors in video analytics systems, are providing images that are better than ever, offering higher quality – and more data – for us...

Post Canon acquisition, Axis still committed to open security systems

In the wake of Canon’s acquisition of Axis Communications, the company faces a communication challenge in the market – to reiterate the camera manufacturer’s commitment to open systems- acknowledges Fredrik Nilsson, General Manager, North America of the Swedish IP camera vendor.    “We say nothing will change, and we will show it in our action as well as say it,” he comments. “There have been companies that have claimed openness, but then don&rsquo...

Does it matter where a security system component is manufactured?

We live in a global market, and goods can easily be manufactured anywhere in the world and then shipped anywhere else. For many years, companies have taken advantage of the consequent flexibility to save costs and increase profits by manufacturing products around the world, especially in low-cost areas such as China. Historically, goods made in China (and some other locales) have been characterised as somehow lower in quality, and yet many of the top companies (such as Apple, for example) have m...

Cybersecurity - Hackers target SCADA embedded systems

Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber Emergency Response Team, which is part of the U.S. Department of Homeland Security, reports responding to 198 cyber incidents in fiscal year 2012 across all critical infrastructure sectors. Forty-one percent of these incidents involved the energy sector, particularly electricity, according to a February 2014 report. Considering the enormity of the...

Networking basics for security professionals: How does PoE work?

The action of a voltage applied to a resistance element, draws power from the switch’s PoE port We often think about a power supply operating in a single format. A power source provides power to a device. You plug it into a wall outlet and that’s all that happens. PoE power is a far more complex. There is interaction between the source providing power and the device receiving power. This interaction is governed under the 802.3 AF and AT standards. These differences...

Still independent, Genetec emphasises innovation

Given the current trend toward consolidation, the industry has seen more camera manufacturers and software suppliers aligning under the same owner. Bucking the trend is software company Genetec.  “Staying independent will help us innovate,” says Georges Karam, who recently joined Genetec as chief commercial officer. “What’s important for the customer is the end-to-end solution, and our integrators can provide that.” Genetec positions itself at the centre of a...

Canon-Axis buy: Integrators respond

Recent news of Canon’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many could easily digest the move as more consolidation of the marketplace, especially the crowded video surveillance space. Systems integrators weighed in on what they expect and the long-term outlook for IP camera leader Axis and Canon, a Japanese firm predominate in broadcast, optics and consumer electronics. Joe Liguori, a partner at Access Co...

Importance of upgrading physical security systems

Regular upgrading ensures all systems communicate correctly  In the IT world, innovation moves quickly. New versions of software are launched every day to keep business processes running smoothly. So frequent upgrading isn’t even a choice anymore – it’s a must to avoid losing valuable time and data. In this article, Dirk Kappert, IT specialist and CEO of the German company ACEA, explains about the relevance of upgrade assurance and how it applies to phys...

Addressing business goals for transportation

Many purpose-focused stand-alone systemsaddress business goals aside from security Transportation gets passengers and goods to their destination safely and in a timely manner. Making transportation possible are purpose-focused stand-alone systems – many that address business goals and others that achieve safety/security goals. Some systems can impact both business and security goals. For example, access control can eliminate the expense and maintenance of locks and keys...

Canon & Axis Communications: Pre acquisition history of collaboration

A more than 20-year shared history between Canon and Axis Communications has been an underreported aspect of the recent announcement by the world’s largest camera company of plans to acquire the Swedish IP video camera company. The fact is, Canon and Axis have worked together for years, dating back to the time when Axis was focused on making printer servers (rather than IP cameras). In those days, Axis often worked with Canon to supply printer servers, which were bundled with Canon printe...

Hardware vs. software-based surveillance recorders: which is best for you?

Coming of age: storage devices have evolved to better record, manage and play back high-quality images Video surveillance and security technology continues to come of age. The sophistication of cameras that have moved to high-definition, high-resolution, megapixel imagery has transformed what users see on playback and greatly enhanced the usability of recorded video feeds. As the evolution continues, from the early days of grainy footage and barely recognisable images to HD, F...

Networking basics for security professionals: Transmission limitations

Transmission of video and PoE power for IP security cameras over infrastructures can be confusing. Network infrastructures are designed using twisted pair cabling that we refer to as CAT (short for Category) cable, also referred to as UTP (Unshielded Twisted Pair). Security systems, coming from an analogue environment, have historically transmitted over coax cable, and with the use adaptors can transmit over CAT cabling, which can be further broken down into single pair twist...

Related videos

Enhanced security with S617 video door station

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

Quick poll
What is the most significant challenge facing smart building security today?




Latest Armenia companies