Cook Islands News

Securing the U.S. electric grid presents multiple questions

The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal...

Intelligent technology propels advancements in airport security

Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider thr...

Compliance in question as deadline looms on Chinese ban

The ban on U.S. government usage of Chinese-made video surveillance products was signed into law last year and was scheduled to take effect a year later – on August 13, 2019. With that deadline looming, there are questions about whether government agencies and departments will comply in time. A year ago, the U.S. Congress passed, and the President signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and D...

GSX 2019 is coming to Chicago: elevating the event experience

Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promi...

Dahua Technology’s CCTV solution upgrades security at Landmark Amman Hotel in Jordan

Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and serv...

BIRD Aerosystems to offer high-tech Airborne Missile Protection Systems (AMPS) to the UN Air Operations

BIRD Aerosystems, globally renowned developer of Airborne Missile Protection Systems (AMPS) and Special Mission Aircraft Solutions (ASIO), has received an order for additional AMPS systems from the UN Air Operations. Airborne Missile Protection Systems Under the contract, BIRD will provide its AMPS-MV solution, which includes the MACS sensor, and install it on the UN Mi-17 helicopters, that are operating in the most dangerous and complicated areas in Africa. The UN is already using BIRD's AMPS...

How is the role of passwords changing in physical security?

Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilised. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?

Boon Edam's the Circlelock Security Cabin celebrates its 35th Anniversary

Royal Boon Edam International is proud to announce that the Circlelock security locker is celebrating its 35th anniversary in 2019.  Since entering the market in 1984, demand for this custom entry solution has continued to grow steadily in several important segments, including data centres, government and military, and commercial facilities. Principle of multi-factor authentication The Circlelock security booth owes its longevity to the principle of multi-factor authentication, whic...

ASSA ABLOY Group, NXP, Samsung, Bosch launch FiRa Consortium for Ultra-Wideband (UWB) interoperability

Recognising the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, and Bosch, companies in access, secure connectivity and mobile/CE device solutions –  announced the launch of the FiRa Consortium. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases fo...

Dahua provides mobile video guards for a security company in Germany to enhance visitor’s safety

"The safety of others has always been a matter close to my heart", says Hans Wetzlar, Managing Director of IHRE SICHERHEIT Security Service in Bielefeld. It was out of this motivation that he founded his security company ten years ago. Together with his team, he ensures, for example, that visitors to events and trade fairs can move around safely. Mobile ‘video guards’, using Dahua's powerful video surveillance technology, are now contributing to this. Video surveillance system Vid...

Cloud-based network detection and response firm, ExtraHop hires Bill Ruckelshaus as its new Chief Financial Officer (CFO)

ExtraHop, global provider of cloud-first network detection and response solutions, has announced the appointment of experienced technology and software industry veteran Bill Ruckelshaus as its Chief Financial Officer (CFO). Ruckelshaus joins the company as it accelerates with more than 10x growth in cybersecurity and rapid expansion of its cloud product portfolio. He will hold a position on the ExtraHop executive leadership team, reporting to ExtraHop CEO Arif Kareem. Cybersecurity expert Ruc...

ImpacTech SIP trunk get certified for Yeastar cloud-based and on-premises VoIP PBXs

Yeastar, the provider of SME PBX system, and ImpacTech, a supplier of innovative Business Intelligence solutions based on AI and Big Data, announced a new ITSP partnership. This partnership sees ImpacTech’s SIP trunk service, Impact Trunk, certified for use with Yeastar Cloud PBX and S-Series VoIP PBX. Users of Yeastar’s innovative, high-performance business phone systems can now also benefit from the exceptional call value available by using Impact Trunk. Uncompromising call quali...

Products targeting critical infrastructure include video and intelligent solutions

Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command centre technologies, fusing critical data input from...

Has price erosion ended (or slowed down) in security?

One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed do...

Future uncertain for live facial recognition in U.K. law enforcement

Police in the United Kingdom have been testing the effectiveness of live facial recognition (LFR) for several years now, but future uses of the technology have been called into question. The Information Commissioner’s Office (ICO), an independent authority that seeks to uphold information rights in the public interest, has weighed in on issues of data privacy related to LFR, and Members of Parliament (MPs) have called for a moratorium on uses of the technology. The big question is whether...

Seeking clarity, the industry speaks up about the NDAA ‘blacklist’ provision

The devil is in the details. The broader implications of the U.S. Government ban on Chinese video surveillance manufacturers are being clarified in the federal rule-making process, and a public hearing in July gave the industry a chance to speak up about the impact of the law. Ban on equipment The hearing centered on Section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019, specifically paragraph (a)(1)(B). The paragraph "prohibits agencies from entering into a con...

What security markets are likely to embrace AI?

Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?

Verkada sells simplicity: Cameras have edge processing and link to the cloud

Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and...

Critical infrastructure threats range from simple to complex

Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks faci...

Gunshots are the sound of tragedy in educational facilities

School shootings, especially in the United States, present an ongoing tragedy and a challenge to the security industry. We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effec...

How do software improvements drive physical security?

In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?  

ReconaSense provides adaptive physical security using artificial intelligence

Physical security has been stuck in a forensic and siloed mindset for decades, while the rest of the enterprise has evolved and transformed into proactive, connected operations. A new security management platform based on artificial intelligence (AI) seeks to change that status quo by using modern tools for unification, analytics and controls. AI-based security management  “Security teams are managing more moving parts than ever,” says Clayton Brown, Co-Founder of ReconaSense....

Ontic Technologies offer proactive protection that leverages deep analytics and intelligence to secure enterprises

Ontic Technologies, the globally renowned provider of protective intelligence security software, delivers technology to empower security teams, in order to protect assets, employees and customers. In the modern world, organisations and their employees, clients, customers, and their physical assets may come under some kind of threat or attack, at any time. Protection that leverages deep analytics Investments in physical and other security systems have already been made, to protect these critica...

Aratek Marshall 5 with ePassport-reading capability allows for tighter border control & better immigration security

The Aratek Marshall 5, an all-in-one biometric handheld device that makes ‘identification-anywhere’ a reality, is expected to help immigration authorities implement tighter border control measures with its MRZ reading capability for ePassports and other travel documents. The powerful biometric handheld terminal allows immigration authorities to effect stricter border controls. Biometric handheld terminal Aratek’s flagship device features the Access-IS OCR310e miniature OCR r...

Smarter Security unveils latest range of Fastlane intelligent optical turnstiles to tackle unauthorised access via “Sidegating”

Smarter Security, the intelligent entrance controls company, has announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorised side-by-side entry through a turnstile. Layered security strategy Jeff Brown, Chief Executive Officer at Smarter Security, says “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available...

ShotSpotter, Inc. releases updates to its ShotSpotter Missions - AI-driven crime forecasting and patrol management tool

ShotSpotter, Inc., global provider of security solutions that help law enforcement officials identify, locate and deter gun violence and active shooter incidents, has announced an updated version of ShotSpotter Missions – an AI-driven crime forecasting and patrol management software tool. Acquired from HunchLab in late 2018, today’s product release represents ShotSpotter’s first set of enhancements as it extends its penetration into this emerging category.  ShotSpotter Mi...

AMAG’S access control system named one of the best business tools of 2019

The Newsweek Best Business Tools list recognises the Symmetry access control system based on ratings in categories such as trust, service promise, reliability, security, and satisfaction.   Symmetry platform AMAG’s Symmetry platform provides reliable, actionable data to help customers make better business decisions" “I am honoured and excited to have our Symmetry Access Control software recognised as a Best Business Tool by Newsweek,” said AMAG Technology President...

Video systems are more valuable than ever at education facilities

Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education ma...

What are the security and surveillance challenges of the casino market?

When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?

Trackforce workforce management provides intelligence and data analytics

Workforce management systems gather and analyse information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?