Azerbaijan News
Many companies are considering carefully the possible risks of business travel to the areas most impacted by the Zika virus, and others may have facilities located in affected areas. What is the Zika Scare? Transmitted by mosquito bite, the Zika virus can cause a fever that typically involves minor symptoms. There is an additional risk to pregnant women as Zika fever has been linked to incidences of microcephaly (a neurodevelopmental disorder) in newborn babies through mother-to-child transmi...
Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-growing border security challenges “More than one bil...
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Secur...
Proving ROI, setting proper customer expectations and training is imperative tothe success of biometric implementation End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “e...
We hear that everything is going to the cloud – or is it? Security end users can be understandably confused by conflicting claims in the market from proponents of cloud-based or server-based systems. A number of major security companies are offering cloud video surveillance solutions apart from the traditional server-based systems. At the end of the day, how do you choose? What factors should be considered? We asked this week’s Expert Panel Roundtable: What factors should a customer...
LILIN can equip all branches with the best-of-breed video surveillance security equipment and systems. Teller windows, processing rooms, ATM’s, parking lots, lobbies and common areas are all monitored by high-quality video cameras for the safety of customers, employees and staff. The company offers a large selection of IP cameras for use with bank location, and the surveillance video can be searched by date, time, camera location or any combination of these. Zone Entering technology is ab...
A more strategic approach to corporate security can better align departmentsin an organisation to achieve better results of shared goals The alignment of corporate security with the business strategy of an organisation is a topic that has been on the agenda of many senior security professionals. A corporate security department’s inability to demonstrate a clear thought process of how they arrived at proposing the strategic direction, or failing to make a compelling busin...
Successful entrants to Engineers of Tomorrow will be invited to pit their skills against each other in a live installation challenge at IFSEC 2016 The prestigious Engineers of Tomorrow annual competition is now open for the fire and security industry’s brightest young engineers to register their interest. Successful entrants will then be invited to pit their skills against each other in a live installation challenge at Europe’s largest security exhibition, IFSEC In...
More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...
Starlight camera technology is redefining low-light surveillance to new levels Starlight cameras are the latest products security companies are adding to their product line-ups, each camera boasting the most comprehensive ability to make darkness visible. While low-light surveillance capabilities have been around on the market for some time, starlight camera technology is redefining low-light surveillance to new levels. Sourcesecurity.com spoke to manufacturers to discuss this...
Ingram Micro will facilitate the internationalisation of the HNA Group, Tianjin Tianhai's largest stockholder. They will have access to business opportunities in emerging markets, which have higher growth rates & better profitability Ingram Micro Inc. and Tianjin Tianhai Investment Company, Ltd. today announced that they have entered into a definitive merger agreement under which Tianjin Tianhai will acquire Ingram Micro for $38.90 per share in an all-c...
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillanc...
2016 is shaping up to be the year of the billion-dollar merger in the security market. After last month's mammoth Tyco/Johnson Control merger, a second big merger has rocked the market, this one involving one of the most familiar names in the consumer market – ADT. The home and small business security company, which traces its history back to 1874, has agreed to be acquired by private equity firm Apollo Global Management, and will merge with competitor Protection 1, a subsidiary of Apollo-...
Many security manufacturers are working towards ISO 14001, an internationally-recognised standard for the environmental management of businesses How green are security industry manufacturers? As innovation (much of it driven from home video and mobile phones) continues, it’s likely that our sector’s carbon footprint will decrease since compact products use up fewer raw materials. Even casual observers will note that integrators are falling over themselves to gain e...
The merger agreement includes a “go-shop” period, during which ADT and its Board of Directors may actively solicit, receive, evaluate and potentially enter into negotiations with parties that offer alternative proposals ADT, a leading provider of monitored security, interactive home and business automation and related monitoring services in the United States and Canada, today announced that it has entered into a definitive agreement to be acquired by an affiliate o...
The enhanced Physical Perimeter Security Zone at IFSEC International 2016 will occupy over 1,000 square metres of dedicated floor space IFSEC International, Europe’s largest security exhibition, will enhance its dedicated Physical Perimeter Security Zone in 2016 with many leading suppliers within the sector already confirmed to participate. Taking place from 21-23 June 2016 at London’s ExCeL, IFSEC International continues to announce further exciting details and ne...
Done right, a good metric programme will help tell the story of the security department Knights of medieval times are known for impossible quests and challenging missions seeking rare religious items. The quest for the Holy Grail is perhaps the most notable. Today’s security professionals are often on their own quest, seeking what sometimes feels like the impossible – the search for perfect security metrics! What are metrics and are they really that hard to find?...
Improved alarm verification standards will help reduce the number of false dispatches of law enforcement officers The verification of alarms continues to progress with more affordable technology as well as an updated industry standard set for release as soon as the end of February 2016. The definition of alarm verification is getting a makeover in the standard, guided by a range of stakeholders including the security industry, law enforcement, associations and other intereste...
As the security industry continues to evolve and come up with innovative technologies, it has also thrown open the doors for competition among manufacturers of security systems and products. Price wars are emerging in the physical security market, while manufacturers and integrators are looking for new ways to offer greater value and better service. It’s one thing to fight it out for a new customer, but nobody wants to lose an existing customer based on price, or any other factor for that...
A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings created by pop culture Contributing to the problem of understanding is the popular culture. “Popular mo...
Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signalling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programming, de...
Secure payment card technology at the point of sale and a strong authentication are effective defences against data security threats Data security is one of the top concerns to a retailer’s reputation and its customers’ privacy. The fall-out can be catastrophic, and organisations must understand the threat and take all necessary steps to protect their assets and customers. The challenge has become more complex with the explosive growth in mobile device usage throug...
Trump’s border wall proposal reflects a rising demand forgreater border security When GOP presidential candidate Donald Trump proposed building a wall along the length of the U.S.-Mexican border, some ridiculed the idea. Yet, it also struck a nerve among Americans deeply concerned about unchecked illegal immigration. "I would build a great wall, and nobody builds walls better than me, believe me, and I'll build them very inexpensively. I will build a great, great wall o...
Biometric solutions are replacing PINs at physical ATMs and providing a more fool-proof form of identification for banking security Biometrics is seeing especially rapid adoption rates throughout the worldwide banking infrastructure, particularly at the ATM and teller counter, says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. “There are also opportunities for biometrics to improve security by enabling transaction-based authentication for online and mobi...
On event days, representatives of emergency response & security agenciesare together and running sports venues as a unified group In the world of sports security, alliances are bringing together personnel and agencies that once only talked to each other during an emergency. Consider the recently announced agreement between the Security Industry Association (SIA) and the National Center for Spectator Sports Safety and Security (NCS4). This memorandum of understanding (MOU)...
I suspect that many people – especially travellers – associate the idea of “security” with what they see at the airport screening line. If that’s the case, our market’s image suffers from the association. I’m not sure what that is, that happens at airport screening gates, but I don’t think it’s security. Rather than actual security, the practice seems aimed more at making the travelling public feel safer (if that’s possible even as th...
There are between 4 and 6.8 million lone workers in the UK, and many of us arelone workers at some point in our working lives The Suzy Lamplugh Trust was set up to highlight the risk faced by lone workers and to offer information and advice to reduce the risk of violence and aggression for everyone. It was established following the disappearance in 1986 of 25-year-old estate agent, Suzy Lamplugh, after she had gone to meet an unknown client. This article is based on a present...
Citilog specialises in analytics tools & sensors for incident detection, traffic data collection & intersection control Axis Communications, the global leader in network video, announced the acquisition of Citilog, a provider of intelligent real-time video monitoring for traffic and transportation security and safety. The addition of their advanced surveillance technology and experienced personnel strengthens Axis’ best-of-breed solution and further expands its o...
FLIR SR-19 security camera is primarily designed for perimeter surveillance and asset protection Providing secure facilities, and keeping marinas a safe environment, should be a basic responsibility of marina management. Protection can be achieved through a combination of security policies, controlled access, observation and user awareness. Although it has not reached epidemic proportions yet, crime is a growing threat to recreational boating. Modern boats are equipped with st...
IFSEC International 2016 will be a strategically significant platform to present current technologies and research In 2016 IFSEC International, Europe’s largest security exhibition, will feature a dedicated Smart Zone, comprising a replica ‘smart home’ fitted out with the latest home automation innovations from top exhibitors including Y3K, Lilin and Control 4. Taking place at London’s ExCeL from 21-23 June, IFSEC International 2016 will be a strategica...
Browse security news
- By event
- Black Hat Middle East 2024
- Intersec 2025
- Data Centre & Cloud Innovation Summit 2025
- Inter Airport Southeast Asia (IASEA) 2025
- Global Table Games and Game Protection Conference 2024
- ISC East 2024
- SIA Honors 2024
- Dahej Industrial Expo 2024
- Suprema Global Partner Program (SGPP) 2024
- AUCSO European Region – Winter Conference 2024
- Inno Rail 2024
- View more
Featured products
Related videos
Enhanced security with S617 video door station
OPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download- Azerbaijan Security companies
- Azerbaijan Manufacturers
- Azerbaijan Distributors
- Azerbaijan Resellers / Dealers / Reps
- Azerbaijan Installers
- Azerbaijan Consultants
- Azerbaijan Systems integrators
- Azerbaijan Events / Training / Services
- Azerbaijan Manned guarding
- Azerbaijan Training organisations
- Azerbaijan Associations / regulatory bodies
- Azerbaijan Event organisers
- Azerbaijan Media
- Azerbaijan Services
- Azerbaijan Recruitment / personnel