Armenia News

The power of uncoupling hardware and software

Uncoupling software from hardware allows manufacturers to respond faster to changes Nedap Security Management 2014/2015 Review and Forecast:Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. External factors such as these do provoke change in physic...

Users need more flexibility, security and longer-range solutions

End users continue to move to smart cards and smart readers, wanting the extra flexibilities they offer 2014 was very good year at Farpointe Data. Significantly, it became part of the DORMA group, which helps cement our standing as a global partner of premium RFID solutions, including proximity, smart card and long-range solutions, for access control professionals around the world. This is a good market as there has been sustained migration among end user customers of Farpoint...

Customers want more data analysis and auditing

2014 saw more organisations making data-driven decisions with insight or foresight provided by intelligent analysis of the data Morse Watchmans 2014/2015 Review and Forecast: 2014 saw a year of continued change in the security marketplace. A healthier economy triggered growth in new projects and helped loosen the purse strings for capital expenditures. From a technology standpoint, the industry evolution to a more network-centric environment created additional opportunitie...

Open standards in access control to increase end user choices in 2015

Open standards for access control and integration will offer end users far greater levels of choice ASSA ABLOY 2014/2015 Review and Forecast: Editor’s Note: This article is based on Mr. Bone’s answers to several questions about the 2014/2015 Review and Forecast posed by SourceSecurity.com.  We will continue to see a two-speed economy in general terms in Europe in the New Year, with the northern countries doing well and the southern countries continuing to be d...

BCDVideo certifies new Johnson Controls P2000 video management system

The P2000 VMS helps to navigate between various management systems BCDVideo has announced the certification of Johnson Controls’ newly released P2000 Video Management System (P2000 VMS) on their Nova Series line of enterprise-class storage solutions. This new VMS offers a single, open interface to intuitively navigate between video management, video analytics, system integration, and alarm management. Standard, Professional, and Enterprise editions of the software are cu...

Terrorist threats increase need to protect soft targets

With a growing threat from home-grown terrorists, there will be a greater need to protect soft targets as well as to use portable barriers Delta Scientific 2014/2015 Review & Forecast:In 2014, hard targets, such as government facilities, airports, refineries and similar installations continued to boost sales for Delta Scientific by protecting themselves from car- and truck bombers using crash-rated vehicle access control equipment including bollards, barriers, barricades a...

Multifocal sensor cameras opening up new markets

2015 will see Multifocal sensor cameras opening up new markets for Dallmeier Dallmeier 2014/2015 Review and Forecast:The resolution of megapixel cameras is always going to be higher. But people are starting to understand that resolution is not everything, nor does it solve the problem of the customer. In addition, many megapixels on a single chip have unpleasant side-effects related to things like light sensitivity, lens quality, image rate and bandwidth. What really interes...

Simplifying management of large, geographically complex sites

Developers have made huge strides in the effectiveness, convenience, and reliability of the technologies used in video surveillance AxxonSoft 2014/2015 Review and Forecast:Video technology began with simple CCTV systems, but these systems have gradually become more sophisticated, offering both scene analytics and forensic post-analysis. The payoff is found in today's smart security systems. Video analytics are in use today in real-world conditions – on motorways, underg...

Security market shifting from reactive to proactive solutions

Winning companies are those that continue to be proactive rather than reactive to the changing security environment Scallop 2014/2015 Review and Forecast: In the last few years, we have seen a number of developments in the security industry – including organisations taking a more proactive approach to security. As a result, the demand for surveillance solutions has continued to grow at a high rate and, in turn, the data being collected has hit record levels. As...

Smart phone access control shift expected for 2015?

The major trend ECKey has seen in 2014 is an increased demand for “accountable” access control that is both convenient and affordable  ECKey 2014/2015 Review and Forecast: The major trend we have seen in 2014 is an increased demand for “accountable” access control that is both convenient and affordable. Tight budgets are shining a light on the true cost of ownership of card reader and biometric systems. In many ways these systems are similar...

Extending the reach of video surveillance in 2015

Customers look to leverage video surveillance technologies to optimise and monitor operations within their business MicroPower 2014/2015 Review and Forecast: In 2015, we will continue to see customers look to leverage video surveillance technologies to optimise and monitor operations within their business. Solutions that enable organisations to shift from more situational awareness to situational assessment – for example, using images collected from the surveillanc...

Security market trends in video: hype or happening?

There is convergence of both the video and access control technologies, and of the companies themselves Milestone Systems 2014/2015 Review and Forecast: Milestone Systems is always in touch with our vast ecosystem of partners around the globe as we support them in their customer projects and needs. We partake in hundreds of industry events, road shows, and meetings, also holding our own partner conferences in every region to ensure face time with our stakeholders. We do...

How biometric cards improve security and extend the life of proximity systems

Biometric cards provides an easy way for to provide a biometric upgrade to access control systems using card readers More and more, security professionals using card-based front ends for their access control systems have been worried about the security of their proximity systems. They know, that for $200 or less, their proximity system can be violated. Kim Humborstad, CEO of Zwipe points out that proximity systems do not offer a challenge response; they only use passi...

Targeted video analytics provide value throughout a retail business

Retailers can get more use from video surveillance data, ultimately targeting profitability As the holiday shopping season kicks into high gear, retail organisations have two primary concerns: making a profit on notoriously slim margins and shoring up potential areas of internal (employee) and external threats, including organised retail crime. According to the Global Retail Theft Barometer 2011, published by the Centre for Retail Research, total global shrink in 2011 cost r...

Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance system

Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analogue to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus on camera, NVR an...

How cloud-based services will transform the access control market

Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...

Getting crisis management and emergency planning requirements right

Think of crisis management and emergency planning as a  customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it?Developing and writing a corporate or organisational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...

Why workplace training is essential for business success

Good training is a best practice that applies across a broad range of industries and markets Owners and managers of security dealerships, both large and small, face unique challenges in running their companies, and while there is no magic formula for success, dealerships that invest in training for their staff typically do better than those who don’t.  In fact, good training is a best practice that applies across a broad range of industries and markets, but it is pa...

Security Technology: A house built on sand?

The security industry can be like a house built on sand if there's a lack of professional standards set in place Picture the scene: You’re suffering from a persistent pain and so decide to take a trip to your doctor to get it checked out. You step into the consulting room but, before you can speak, he looks you up and down, haw and hums, and then writes out a prescription. Would you be happy that drugs prescribed in this manner will cure your ailment when your doctor h...

Rethinking physical access control to operate in an IT-centric environment

Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilise the organisation’s full IT infrastructure, which...

Video walls provide the big picture for collaborative security

Video walls are growing in popularity in security applications, providing everyone in a control room access to the same current information at the same time. They are a perfect way to display the “big picture” – literally. Video walls are often used in situations where several people are working together to create a coordinated effort, whether related to security, emergency response, process control or other discipline. In the security sector, video walls are commonly used in...

The benefits of training in the access control market

Training and education are essential elements of success in the access control market for integrators and end users alike. Whether one is a seasoned veteran or still new to the industry, continued training and education are critical given that access control technologies continue to evolve at a rapid pace. System integrators who do not take advantage of manufacturers’ training seminars are short-changing themselves and their customers, contends Robert Laughlin, president of...

Measuring value of security systems - price versus benefits

Value isn't always just about monetary worth In any sales conversation, price will inevitably be one of the points of discussion. When it comes to large investments such as security systems, customers want to ensure that their money is well spent. Where price is concerned, systems and solutions providers would want to impart the worth of their products. At the end of the day, in the consumer world, customers want the best value for the least amount of money po...

Costs, usability, and support among access control challenges

Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillanceas it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...

Transitioning from legacy access control to newer technologies

A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base of legacy systems presents opportunities and obstacles for providers of newer access control systems. Most end users would prefer not to do a full rip-and-replace upgrade. Therefore, integrators (and manufacturers) have to find a smooth transition path. Access control customers eager to embrace the newest capabilities on the market are ofte...

Access control market working to overcome tradition of proprietary systems

Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition from closed systems to more open integration provides benefits for integrators, and especially for end users looking to maximise their system return on investment. End users want greater flexibility, specifically in terms of hardware choice. As a result, more non-proprietary solutions are coming to market. For the integrator, offering more o...

How does commoditisation impact the security market? How should manufacturers and/or integrators differentiate themselves?

How do you stand out in a world of commoditisation? We live in a world of commoditised consumer goods. You probably own at least one item which would be considered "commoditised" by the majority of the population today, but you can probably also remember the days when it would have been described as "new" and "unique". Think about smart phones: most people you know are likely to own a smart phone. But remember when not everyone had a regular mobile phone? Now they're no...

Simplifying interoperability of access control with PLAI specification

Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access control across large companies or institutions, including those that span giant campuses or even multiple locations all over the world, is essential to optimum security. Too often, however, the effectiveness of a company’s access control system – or, more likely, of its multiple access systems that were installed in various locations o...

Genetec introduces new hybrid cloud archives service for Security Center

The archives allow organisations to easily scale the available storage capacity of their surveillance system Genetec™, a leading provider of unified IP security solutions recently announced its new Cloud Archives service for Security Center that will allow organisations to easily scale the available storage capacity of their surveillance system, and eliminate the need to invest in additional servers. With the ability to continue leveraging their existing on-premise s...

Identiv reports Q3 financial results for 2014

Identiv reaffirms revenue guidance for fiscal year 2014 of revenue between $80 million and $90 million Identiv, a global security technology company that provides trusted identity solutions for premises, information, and everyday items, reports its financial results for the third quarter (Q3) of 2014. "In Q3 2014, we saw continued growth in revenue and achieved positive adjusted EBITDA," said Jason Hart, Identiv CEO. "The steps taken to streamline our business have allowed us...

Related videos

Enhanced security with S617 video door station

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

Quick poll
What is the most significant challenge facing smart building security today?




Latest Armenia companies