Luxembourg News

Arecont Vision Technology Partner Program welcomes protective camera housings manufacturer Dotworkz

Dotworkz products are available in the Arecont Vision MegaLab as part of the agreement Arecont Vision®, the industry leader in IP-based megapixel camera technology, has announced that Dotworkz, a leading manufacturer of protective camera housings for extreme environments, has joined the Arecont Vision Technology Partner Program. Dotworkz products are available in the Arecont Vision MegaLab™ as part of the agreement. “Integrators and end customers will greatly...

The all-IP future of public transport surveillance networks shows a growing demand for video analytics for better incident management

The report says almost 50% of the public transport organisations are willingto broaden the type of video analytics used A detailed survey of public transport operators shows a growing demand for networked/IP systems and video analytics to help cope with the requirements of large surveillance systems. The report, Video Surveillance in Public Transport, published by the international public transport association UITP and Axis Communications, is based on 74 respondents across 30...

Oncam adds EVO-05 Outdoor and EVO-05 Recessed IP cameras to Evolution 05 Mini range

Oncam, the leading provider of 360-degree video capture and business intelligence technology, announced recently the addition of two new models to its Evolution 05 camera suite: the EVO-05 Mini Outdoor and the EVO-05 Mini Recessed cameras. Featuring the company’s patented 360-degree dewarping technology, Oncam’s EVO-05 Mini range packs a high-quality 5MP sensor and fisheye lens into an ultra-small and robust form factor with no moving parts. EVO-05 Mini Outdoor The EVO-05 Mini Outd...

Remote power management of networked systems offers uninterrupted security services & new business opportunities

By adding remote monitoring to service contracts, dealers and end users bothbenefit from substantial cost savings while reducing potential downtime Whether upgrading an existing surveillance and/or access system from analogue to IP, or installing a completely new system using structured cable, the ability to communicate, monitor and control IP devices delivers significant operational and economic benefits. The vast amounts of data these systems generate are useful in many ways...

Benefits and challenges of omnidirectional cameras in video surveillance market

As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...

Live finger detection technology reinforces future of advanced biometric authentication

Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...

How smartphone access control credentials strengthen security and minimise risk to organisations

PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...

Misguided trust leads to increase in security risks and potential attack from intruders

Stringent security policies are necessary in an organisation to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

Tyco Mobile Exhibition Unit to hold training events on latest security solutions throughout Western Europe

Along with educational sessions on latest security solutions, MEU will also exhibit at different trade shows, including IFSEC 2016 Tyco Security Products announces it will hold a series of technology training events and technology demonstrations throughout Western Europe using the company’s Mobile Exhibition Unit, a state of the art mobile classroom and training centre that houses the company’s full portfolio of solutions. The 2016 tour will include locations in Ir...

How can security integrators replace revenue in the age of commoditisation?

As more security equipment categories become commoditised, a previously rich source of income for integrators and installers – markup – is becoming harder to come by. Less expensive products with little to no perceptible value differentiation leave integrators with few options, not to mention the growth of pricing transparency that comes courtesy of the Internet. We asked this week’s Expert Panel Roundtable: Given the increase in commoditised hardware (i.e., lower profit margin...

CCTV budget cuts reduce video surveillance expenditures and camera counts across the UK, except in London

Nationally from 2012 - 2015, there has been a decrease in the money spent on theinstallation, monitoring and maintenance of CCTV compared to the period 2009-2012 The UK has often been referred to as the world’s most watched country in terms of the scale of CCTV surveillance. But a new report claims that UK local authorities have reduced spending on the installation, maintenance and monitoring of public space CCTV systems, while the number of cameras being used is also do...

Developing innovative aviation security technologies to prevent future terrorist attacks

What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police office...

What is an open system? Interoperability rises as a security trend, but lacks an exact definition

Recently at a conference, one of my media colleagues asked an interesting, and basic, question: What exactly is an open system? Many of us think we know what an open system is, but the ensuing discussion provided several different answers, many of them centred on what an open system is NOT (rather than what it is). An open system does not limit a customer’s options. An open system provides maximum flexibility as a system evolves over time. In other words, an open system doesn’t lo...

ISE emphasise need for improved hospital security programme to avoid attacks on specific targets

ISE’s research shows that healthcare facilities & hospitals security programmesto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security programme can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see...

ASIS concludes 15th European Security Conference and Exhibition with over 650 security professionals in attendance

The educational programme covered security management topics such as the terrorism risk outlook & IoT Over 650 security professionals gathered for the ASIS 15th European Security Conference and Exhibition at the Business Design Centre in London from 6 to 8 April. Education program of over 50 sessions The educational programme provided more than 50 sessions across 5 tracks, covering the full spectrum of security management topics such as the terrorism risk outlook, intern...

New technologies empower visitor management systems to improve physical security efficiency and cost-effectiveness

Access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical sec...

IFSEC 2016: Engineers of Tomorrow annual competition for fire & security apprentice engineers now fully-booked

64 of fire and security industry’s young engineers will head to IFSEC 2016 to put their skills against each other in live installation challenge IFSEC International, organised by UBM EMEA, have recently announced that all places on the prestigious Engineers of Tomorrow annual competition are now filled. 64 of the fire and security industry’s brightest young engineers will head to IFSEC International over the 21-23 June 2016 to put their skills against each other in...

2016 IFSEC and FIREX International launch inaugural ARC Village for UK’s alarm receiving centres

The ARC Village, brought in association with CSL Dualcom, comprises of 8 exhibition booths surrounding a central networking area Europe’s leading security and fire industry events, IFSEC and FIREX International have recently launched the first ever ARC Village at 2016 shows located at London’s ExCeL on 21st to 23rd June. Providing an incisive platform for the UK’s alarm receiving centres to showcase their technical expertise and services, the ARC Village will...

Top 4 indicators that an access control vendor is customer-service-centric

Customer service is a vital part of any vendor’s business approach – from theplanning stages, to installation to maintenance of the access control system In today’s highly competitive and technology-rich security marketplace, an organisation’s customer service is as important as the product solution they offer. Let’s face it, you will always remember if the customer service was terrible – or if it was great. Do they go the extra mile or do t...

High-security portable crash barriers offer security integrators and dealers new expansion opportunities

Portable crash barriers & traffic access control systems allow security integrators to expand their deployments for municipal surveillance and critical infrastructure The Pope does it. The Democratic and Republican National Conventions do it. Leading universities and police departments do it. Just what does this diverse list of people and organisations have in common? They have all used high-security portable barriers at their events with good success. According to manufa...

Access control challenges in a changing world - from managing nurse servers in hospitals to securing sterile facilities

ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...

New access control technologies offer flexible locking solutions for enterprise security

End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15...

Hanwha Techwin launches high capacity storage solution in partnership with Veracity

The combined solution consists of Hanwha Techwin’s cameras, SSM video management software and COLDSTORE storage Hanwha Techwin, (formerly Samsung Techwin), the globally renowned manufacturer of video surveillance is introducing a low power, high capacity storage solution in partnership with Veracity, the market leader in IP transmission and surveillance storage. The combined solution, encompassing the latest generation of high definition Hanwha Techwin’s camera...

ISONAS Global VP of Sales Robert Lydic highlights importance of IP open platforms for access control

IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends in access control technology SourceSec...

ISC West 2016: Physical security industry focuses on incorporating audio, video and other safeguards in an integrated approach

Access control now includes a strong focus on the data integration side ofthe business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...

Top 4 trends shaping the future of Physical Security Information Management (PSIM)

Many transformations have occurred that have caused PSIM’s true definition to be misunderstood and miscategorised The evolution of Physical Security Information Management (PSIM) over the past ten years has been rapid and transformative. In fact, according to a recent report from marketsandmarkets.com, the global physical security market, estimated to be $65.41 billion in 2015, is expected to reach $105.26 billion by the year 2020. At the forefront of this movement...

Impact of the UK’s ‘Brexit’ EU referendum on European border control and other security measures

UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks o...

What are the physical security challenges of “safe cities”?

Cities are increasingly connected using information and communication technologies, a trend often referred to as “smart cities.” In much the same way, “safe cities” initiatives are uniting businesses, city officials, law enforcement and other stakeholders in an effort to maximise the safety of businesses and citizens and to minimise theft and crime. Safe cities programmes seek to leverage a variety of resources, including public-private partnerships, to make urban communi...

Milestone XProtect and Axis cameras ensure animal welfare at Dublin Zoo

Axis infrared cameras were integrated with Milestone XProtect Corporate video management software Contrary to popular belief, ostriches do not bury their heads in sand when threatened. They ‘hide’ by lying flat on the ground … or run away! But when they are asleep at night, it’s another story. The zookeepers at Dublin Zoo were very concerned about overnight attacks by wild animals on their flamingos and stealing ostrich eggs. The zoo was keen to explo...

Why employing a software system is a smart way to enhance data accuracy and business profitability

Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labour costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?