Ivory Coast News
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for...
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 article...
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in Februar...
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “...
In the wake of 9/11, the Federal Government’s secure-the-fort, big idea was to create an identity credential for all federal employees and contractors. Homeland Security Presidential Directive (HSPD)-12 set it all in motion. Today, we know the smartcard-based credential that arose from HSPD-12 as the Personal Identity Verification (PIV) card. The PIV card is meant to give employees/contractors physical access to federal facilities and logical access to federal information systems. While u...
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shif...
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numer...
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security al...
As buildings become more complex and smarter, the age-old traditional maintenance methods that are based mostly on hands-on human monitoring are becoming more and more inadequate. Instead, the world is fast adopting building automation as a key component of smarter and more proactive maintenance strategies. The aim is to free up maintenance staff and give them time to focus on other tasks while machines monitor the different systems that work together to make the facility functional. Specific...
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as poss...
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimise the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective ar...
Belden Inc., a global provider in signal transmission solutions for mission-critical applications, announces a new team dedicated to supporting the connectivity needs of the global hospitality market. This team, specialising in cable and connectivity infrastructures, is comprised of experts in each of Belden’s four hospitality sectors: hotels and resorts, casinos, cruise lines and theme parks. In the hospitality market, facilities are constantly innovating to keep guests satisfied. As tec...
Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as this level of connectivity and collection of business-sensitive data becomes more widespread, the threat from cybercrime also rises. This is clearly an issue that affects everyone. After all, nobody is immune from cybercrime, not even the experts, which raises the question: What is the...
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminar...
The basic principles of access control are well established: only authorised people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the...
Salient Systems Corporation, a globally renowned innovator of unified security solutions, has announced the launch of its new CompleteView 20/20 Video Management Solution. With Salient’s robust and flexible User Interface (UI), users can manage and administer enterprise security solutions up to 30% faster. Superior command and control tools, seamless third-party integrations, and advanced analytics enable Salient’s comprehensive management solution, CompleteView 20/20 VMS to meet se...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to the...
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commerc...
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access contr...
Aratek announces the launching of Marshall 5, an all-in-one biometric handheld device that promises to take identification-anywhere to the next level. The Marshall 5 is a powerful and complete solution that seamlessly integrates with various FBI-certified fingerprint scanners such as FAP 20, FAP 30, or FAP 45, giving customers the utmost flexibility to perform identification and authentication for every requirement and from virtually any location. Biometric handheld device It integrates...
The term Internet of Things (IoT) has almost been beaten to death at this point, as more and more security integrators, manufacturers and customers take advantage of the ability to increase connectivity between devices (and therefore take on the dangers this introduces). But the methods by which we interact with the IoT and protect its devices are still catching up, which means security manufacturers must take part in shifting their focus toward safeguarding data, engaging in vulnerability test...
Today, customers are demanding immediacy, personalisation and seamless services from their providers and our desire for instant gratification means that those servicing the public need to provide easy, fast, smooth and continuous ways to meet customer expectations. This is where interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way. In recent years, kiosks have fast gained popularity, not only because they enhance customer satisfac...
In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A...
Userful Corporation, a renowned provider of AV-over-IP solutions for enhanced video communication since 2015, announced that Sigma Alimentos, a popular global branded refrigerated food company, has deployed Userful video wall technology at its headquarters’ main control room. Sigma Alimentos is headquartered in Monterrey, Mexico and maintains operations in the U.S., Mexico, Latin America and Europe. The company’s 2017 revenues totaled more than 3 billion and it deploys a fleet of mo...
The fragmented nature of the security and safety equipment market has brought manufacturers, integrators and other market players together to drive the need for integrated, interoperable systems. As a global distributor of Network and Security Solutions, Anixter Inc. has joined the Open Security & Safety Alliance, a new partnership of global security, safety and building automation organisations, to help develop a framework of common standards, best practices and specifications that address...
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understan...
Browse security news
- By event
- Black Hat Middle East 2024
- Intersec 2025
- Data Centre & Cloud Innovation Summit 2025
- Inter Airport Southeast Asia (IASEA) 2025
- Global Table Games and Game Protection Conference 2024
- ISC East 2024
- SIA Honors 2024
- Dahej Industrial Expo 2024
- Suprema Global Partner Program (SGPP) 2024
- AUCSO European Region – Winter Conference 2024
- Inno Rail 2024
- View more
Featured products
Related videos
Enhanced security with S617 video door station
OPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download- Ivory Coast Security companies
- Ivory Coast Manufacturers
- Ivory Coast Distributors
- Ivory Coast Resellers / Dealers / Reps
- Ivory Coast Installers
- Ivory Coast Consultants
- Ivory Coast Systems integrators
- Ivory Coast Events / Training / Services
- Ivory Coast Manned guarding
- Ivory Coast Training organisations
- Ivory Coast Associations / regulatory bodies
- Ivory Coast Event organisers
- Ivory Coast Media
- Ivory Coast Recruitment / personnel
- Ivory Coast Services