Kuwait News

Questioning the wisdom of the U.S. ban on Hikvision & Dahua

I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese camera manufacturers Reality check: the government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use camer...

How to move from crisis response to crisis management

Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms...

What are the obstacles to adoption of mobile credentials for access control?

Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Exper...

Why security customers should buy products and services from SMBs

In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're like...

What's next for Hikvision and Dahua post U.S. congressional ban?

Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developme...

How artificial intelligence (AI) is changing video surveillance today

There’s a lot of excitement around artificial intelligence (AI) today – and rightly so. AI is shifting the modern landscape of security and surveillance and dramatically changing the way users interact with their security systems. But with all the talk of AI’s potential, you might be wondering: what problems does AI help solve today? The need for AI The fact is, today there are too many cameras and too much recorded video for security operators to keep pace with. On top of...

Security Essen 2018 promises modernised trade show experience for attendees

Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen w...

Steps to develop an integrated retail security strategy

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that ca...

GSX 2018 continues 63-year tradition as an integrated trade show

GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organisations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. b...

Fidano announces successful completion of annual SOC 1 Type 2 examination to reaffirm dedication to security compliance

Fidano, a software and business solutions provider for the payment processing industry, has successfully completed a rigorous fifth annual examination of its policies and procedures, under the System and Organization Controls (SOC) 1 Type 2 standards, demonstrating its ongoing commitment to data security at all levels of its operations. SOC 1 Type 2 standards examination The demanding third-party examinations that led to the achievement were administered by the professional IT assurance and co...

KnowBe4 completes rigorous SOC 2 Type 2 data security exam under 360 Advanced

KnowBe4, a provider of security awareness training and simulated phishing, has completed a rigorous third-party audit of its data security procedures and processes under the System and Organisation Controls 2 (SOC 2) Type 2 standards. KnowBe4 completed the SOC 2 Type 1 examination in April, and immediately initiated action to achieve a SOC 2 Type 2 status. The examination that led to compliance with the demanding SOC 2 Type 2 data security standards was administered by the professional IT compl...

Five cyber security threats your enterprise must address

By now your organisation should know the drill. To keep your enterprise safe from unauthorised access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vu...

What is driving the growth of cloud systems in physical security?

The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?

What is the value of physical security data?

We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Pa...

Developing Solutions provides dsTest v5.1 to all current customers with active support agreements

Developing Solutions, Inc. dsTest v5.1 is available to all current customers with active support agreements. It is available for downloading from the Developing Solutions secure support website. All features available in v5.0 are carried forward into v5.1. In addition to the continued support and development for 3G and 4G core network testing, dsTest v5.1 will include the initial releases of 5G core services for the N2, N8, N10, N13, N12, N11, and N4 reference points. Implementing automated te...

Arecont Vision Costar delivers megapixel camera solutions for banking and financial services

Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about...

Arecont Vision Costar leadership plans for growth

It has been an eventful few months for Arecont Vision, which has gone through Chapter 11 bankruptcy and, ultimately, was acquired by Costar Technologies Inc. What emerged is a new company, Arecont Vision Costar, poised for future growth unfettered by previous debt. For insights into what’s next for the newly minted company, we posed several questions to Jim Pritchett, CEO, Costar Technologies Inc., and Raul Calderon, President, Arecont Vision Costar. Q. Please relate how Costar came to...

ASIS International develops active assailant best practices for security professionals

When an active assailant strikes, it’s over fast, and most of the damage happens before help arrives. Responding appropriately can save lives, and it takes training and practice to know what to do as a tragedy unfolds: Where can I hide? Can I get out? Where do I run? If you hear shots or see someone with a knife, your training empowers the best response, and thorough and repetitive training avoids being paralysed by panic. Standards on workplace violence ASIS International is a member of...

The evolution of facial recognition: from body-cams to video surveillance

Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies arou...

Wireless electronic locks: opportunities for security integrators

Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realised in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labour costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportu...

Which security vertical markets are impacted by seasonal changes in demand?

The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?

How to choose the right storage card for video surveillance systems

With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data...

What’s new “on the edge” of security and video surveillance systems?

By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...

Preventing workplace violence: considering the instigator's perspective

A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their...

ForeSight Medical, LLC attains HITRUST CSF Certification to manage risk, enhance security posture and meet compliance requirements

ForeSight Medical, LLC, a renowned provider of surgical and implant cost-containment services, has announced that their ForeSight and Encompass applications have earned certified status for information security by HITRUST. HITRUST CSF Certified status HITRUST CSF Certified status demonstrates that the organisation’s ForeSight and Encompass applications have met key regulations and industry-defined requirements and is appropriately managing risk. This achievement places ForeSight Medical,...

Six reasons security integrators should adopt cloud technology today

As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...

360 Advanced, Inc. assist Silvervine achieve compliance with SOC 1 data security standards

Silvervine, Inc. has demonstrated its continued commitment to data security and privacy by completing a meticulous outside audit of its System and Organization Controls 1 (SOC 1) Type 2 standards. The detailed examination that led to the achievement was administered by the IT assurance and compliance staff at 360 Advanced, a respected national Qualified Security Assessor, HITRUST CSF Assessor and CPA firm based in St. Petersburg, Fla. Assurance and operational visibility Companies that comple...

360 Advanced helps Hosting complete series of 5 rigorous data security exams

Hosting, a pioneer in cloud computing and database services since 1997, has achieved an extraordinary status in its industry by completing a series of five data security examinations, including the Service Organisation Controls (SOC) 1 and 2, HITRUST for healthcare, Payment Card Industry (PCI) standard of compliance, and penetration testing. The rigorous third-party examinations that led to compliance with the demanding series of data security standards were administered by...

Userful Corporation announces the launch of version 9.10 of their renowned video wall solution

Userful Corporation, a renowned provider of display controller software, announced the new version 9.10 of its award-winning video wall solution that strengthens cloud features to give administrators more control of remote locations plus improved capabilities for users. Some of the new features include: Backup and Restore Server Settings via Userful Cloud - where administrators now can remotely backup and restore server settings from a central location. Upload content directly on the Signage...

GSX to address employees' right to store firearms in vehicles

One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable em...

Related videos

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

What Alcatel-Lucent OmniVista Network Advisor can do for network infrastructure

Quick poll
What's the primary benefit of integrating access control with video surveillance?