Ivory Coast News

Is the physical security industry doing enough to prevent school shootings?

School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimise the death toll)?  In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective ar...

Belden Inc. announces team for efficient cable and connectivity solutions in global hospitality market

Belden Inc., a global provider in signal transmission solutions for mission-critical applications, announces a new team dedicated to supporting the connectivity needs of the global hospitality market. This team, specialising in cable and connectivity infrastructures, is comprised of experts in each of Belden’s four hospitality sectors: hotels and resorts, casinos, cruise lines and theme parks. In the hospitality market, facilities are constantly innovating to keep guests satisfied. As tec...

Data security experts at Bosch and Genetec discuss impact of GDPR on video security

Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as this level of connectivity and collection of business-sensitive data becomes more widespread, the threat from cybercrime also rises. This is clearly an issue that affects everyone. After all, nobody is immune from cybercrime, not even the experts, which raises the question: What is the...

A brief report on happenings at ISC East 2018

Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminar...

How to choose the right wireless access control locks

The basic principles of access control are well established: only authorised people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the...

Salient Systems launches CompleteView 20/20 Video Management Solution

Salient Systems Corporation, a globally renowned innovator of unified security solutions, has announced the launch of its new CompleteView 20/20 Video Management Solution. With Salient’s robust and flexible User Interface (UI), users can manage and administer enterprise security solutions up to 30% faster. Superior command and control tools, seamless third-party integrations, and advanced analytics enable Salient’s comprehensive management solution, CompleteView 20/20 VMS to meet se...

Does “security technology” cover the broader application possibilities of today’s systems?

The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...

Why moving to a risk-based approach helps business

Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to the...

Why regional? Inside ADT's mergers and acquisitions of US security integrators

ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so.  Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commerc...

ASSA ABLOY’s CLIQ electronic locking system secures entrances for Creval bank in Italy

Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access contr...

Aratek unveils Marshall 5: Takes ‘Identify-Anywhere’ to new level

Aratek announces the launching of Marshall 5, an all-in-one biometric handheld device that promises to take identification-anywhere to the next level.‍ The Marshall 5 is a powerful and complete solution that seamlessly integrates with various FBI-certified fingerprint scanners such as FAP 20, FAP 30, or FAP 45, giving customers the utmost flexibility to perform identification and authentication for every requirement and from virtually any location. Biometric handheld device It integrates...

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

The term Internet of Things (IoT) has almost been beaten to death at this point, as more and more security integrators, manufacturers and customers take advantage of the ability to increase connectivity between devices (and therefore take on the dangers this introduces). But the methods by which we interact with the IoT and protect its devices are still catching up, which means security manufacturers must take part in shifting their focus toward safeguarding data, engaging in vulnerability test...

Why self-service kiosks are a target for cyber attacks

Today, customers are demanding immediacy, personalisation and seamless services from their providers and our desire for instant gratification means that those servicing the public need to provide easy, fast, smooth and continuous ways to meet customer expectations. This is where interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way. In recent years, kiosks have fast gained popularity, not only because they enhance customer satisfac...

Should ‘Made in China’ be seen as a negative in security systems and products?

In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A...

Userful Corporation deploys visual networking platform to Sigma Alimentos

Userful Corporation, a renowned provider of AV-over-IP solutions for enhanced video communication since 2015, announced that Sigma Alimentos, a popular global branded refrigerated food company, has deployed Userful video wall technology at its headquarters’ main control room. Sigma Alimentos is headquartered in Monterrey, Mexico and maintains operations in the U.S., Mexico, Latin America and Europe. The company’s 2017 revenues totaled more than 3 billion and it deploys a fleet of mo...

Anixter announces joining the Open Security and Safety Alliance to help develop a framework of common standards

The fragmented nature of the security and safety equipment market has brought manufacturers, integrators and other market players together to drive the need for integrated, interoperable systems. As a global distributor of Network and Security Solutions, Anixter Inc. has joined the Open Security & Safety Alliance, a new partnership of global security, safety and building automation organisations, to help develop a framework of common standards, best practices and specifications that address...

Which segments are under-served in the physical security industry?

Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s...

Mobile and cloud technologies sharpen organisations’ emergency response strategies

There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...

Virtual worlds disrupt building security & facility management

From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...

How can digitally creating a building help your video surveillance project?

Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understan...

What is the value of "free" video management systems?

They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level...

Intellectual honesty: the growth of Cobalt Robotics and robots in security

The best route to greater adoption of robotics in the field of physical security is intellectual honesty, says Travis Deyle, CEO and co-founder of Cobalt Robotics. “Robots are not a panacea, so we must be clear and honest about capabilities and use cases,” he says. “If you are dishonest, people will lose faith. We must have clear expectations about what’s feasible today and possible tomorrow.” The robotics tide is turning in the security market, which is notoriousl...

BITEL POS terminal powered by ARATEK fingerprint module

Provider of secure payments BITEL has recently launched a new point of sale (POS) terminal that features a fingerprint sensor manufactured by ARATEK, the pioneer in biometric authentication. Easy Integration ‍“We are pleased to introduce the IC7200 featuring ARATEK capacitive A400-M fingerprint sensor,” said Mark Chun, senior sales manager for BITEL. The new model IC7200 is designed to be implemented for mobile payment, retail and social welfare distribution in various countri...

What’s new in U.S. government procurement for security?

Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and...

Userful Corporation implements their Visual Networking Platform throughout Calgary’s library network

Userful Corporation, one of the world's pioneering developers of software for visual display solutions, announced that the Calgary Public Library has deployed 200 of Userful’s collaborative displays throughout its network of libraries, including the brand new 240,000 square foot central branch in the heart of downtown Calgary. The new library features a wide range of innovations and Userful Corporation is proud to be associated with the project. The company’s visual display solution...

Further acquisitions in the pipeline for parent company ACRE

One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new wit...

What is the most important function of a CCTV system?

In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a CCTV system and why?

State of counter-drone regulation for public safety and physical security

In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...

Unlocking profits for integrators in the ever-evolving world of access control

Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focu...

Aperio wireless access control system installed at the Centre Psychothérapique de Nancy in France

Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centres, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wire...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
Which AI-powered capability will dominate in the years ahead?