Luxembourg News
IDIS, a leading global security company that designs, develops, manufactures, and delivers IP surveillance solutions, announces that it is integrating a range of its market-leading high definition (HD) cameras with world-class video management software (VMS) from Genetec Inc. (Genetec™). Simplifies management of security operations and situational awareness The development – which builds on an established relationship – brings to market a powerful combination of IDIS network...
Women in Security will be a focus at this year's ISC West in Las Vegas, including targeted conference sessions and the Women in Security Forum Breakfast on Friday, April 12. As a preview of the upcoming events, let's revisit an Expert Panel Roundtable on this subject. We asked: How is the role of women in the physical security market changing and expanding?
The video storage boom shows no signs of slowing down. The talk is not typically how much storage; but where and how to store. Locally-housed (on-premises) storage continues to be the most cost-effective, along with providing the most control over your data. However, prior to considering the storage, it is important to look at the robustness of the network, as it is a key factor in making the right decision for storage architecture. It is necessary to know if there is enough...
Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...
Barriers certified by the US Department of State can be trusted to withstand specified weights and speeds This time of year, in the early spring, there pops up a plethora of trade shows in which security vendors can present their newest marvels to potential customers. Not to be outdone are the barriers manufacturers. Their products will range from a large metal planter to be placed in an area where no traffic is allowed to movable barriers which lower to let a car drive over...
Temperature, dusty and dirty conditions, along with limited access to networkingmakes remote location video surveillance extremely challenging Properly conducting video surveillance for any organisation comes with several challenges. Not the least of which is how to architect a system that finds the right balance between quality, cost and bandwidth impact. This becomes even more challenging in non-traditional, demanding environments that are uncontrolled or highly dispersed, w...
Organisations need to protect their properties and people by securing entranceswith security systems and policies Most criminals gain access to a business or organisation the same way honest people do – they walk through a door. That door may be left unlocked. It may be propped open. Poor locks may be easily defeated or the door may be inadequately constructed and offer little resistance when attacked. Focus on multiple-layered security It seems obvious the path to...
Heightened security is the watchword throughout Europe and around the world after the recent dual terror attacks in Brussels. Two explosions at Brussels’ Zaventem airport were followed an hour later with a third bomb at the Maelbeek Metro station, just 100 metres (about 300 feet) from the headquarters of the European Union. In all, 35 people died (including three suicide bombers), and more than 300 others were injured, 62 critically. Raised security levels worldwide In Belgium, flights w...
Headlining the programme of 300+ speakers will be keynote addresses from Colonel Tim Collins OBE, Kate Adie OBE and James Cracknell OBE IFSEC International and FIREX International, organised by UBM EMEA, have recently unveiled the speaker line-up for the Protection and Management Series 2016, Europe’s leading events for security, fire, safety, facilities and service management, taking place at London’s ExCel from 21-23 June 2016. Headlining a programme of more tha...
It’s common knowledge today that sitting all day is bad for your health. Researchers have found that the negative impact of excessive sitting can even outweigh the benefit we get from exercise. Many of us have seen the long list of negative health effects of sitting at work. But what about all those security control room operators, perpetually vigilant, and perpetually tied to their stations? New sit-stand workstations are providing a solution, and the new stations are more popular than...
According to Merit LILIN, the UAE will be a thriving new and potential market in 2016since Europe’s economy is still sluggish The global Chinese community recently welcomed the year of the Fire Monkey with a two-week celebration, concluding with the lantern festival at the end of February. According to Chinese astrology, we are now in the year of the Fire Monkey. What’s in store for businesses around the world? Global economic growth is predicted for the ye...
Festivals bring together a huge number of people, often to large open areas andvenues, which requires a high level of security and protection fromthe organisers Festivals might be all about fun, but the fact that festival goers are out for a good time is an extra reason why the responsibility for safety and security lies predominantly with the organisers. Security during festivals plays an important role in ensuring safety of citizens. Since festivals witness congregation of...
One of the things all security systems have in common is that they depend on human operators, to one extent or another. But how often is the human factor overlooked in product design? Sometimes, more focus is aimed at increasing the functionality of a system, even at the expense of usability. That’s how we get systems that have more capabilities, although accessing that functionality may be hopelessly complex. Creating effective graphical user interfaces (GUIs) is an ongoing challenge for...
Thermal cameras with video analytics detect with great accuracy in bright sun,fog, rain and other conditions Smart thermal cameras are rapidly becoming the intruder detection solution of choice for securing outdoor assets. Whether for smaller-range applications like protecting entranceways or gates, or securing large perimeters around energy, utility, chemical, or transportation assets, thermal cameras paired with video analytics offer an accurate detection solution that provi...
It can be taken as proven that the trends in urbanisation, the mobility of the population and the demographics, have had and will continue to have tremendous impact on our daily lives. These impacts were and are supported by disruptive technology changes (such as the evolution of the internet and mobile communication) and result in higher dependencies of almost all economic and social processes. Compared with former generations, we are spending most of our time in buildings or closed mobile con...
Government and Public Service From national governments and the largest metropolitan areas in the world to the most rural communities, government agencies, and departments, all face the challenge of protecting citizens, staff, property, infrastructure, and resources within limited resources. Arecont Vision IP megapixel cameras have been proven around the world to meet the needs of city surveillance, traffic enforcement, police and law enforcement, corrections, military,...
Lower-cost thermal cameras are becoming attractive for more applications every day. Thermal cameras have long been known for their ability to “see in the dark” by sensing temperatures of objects and displaying a video image of temperature variations, but previously their high costs limited their appeal to mostly high-end or military applications. Now lower costs are expanding the possibilities. In particular, combining thermal cameras with video analytics drastically lowers the num...
Important biometric capabilities include multispectral imaging, superior liveness detection, and tamper resistance Technology developments are enabling a range of new functionality for biometrics in the security market. Early biometrics solutions had poor performance (high failures during enrolment or acquisition that meant significant percentages of users could not use biometrics), says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. Early solutions were not able...
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-w...
The development of PSIM security systems and the move towards smart buildings and cities holds huge potential for environmental performance in the security industry Is the drive to give clients improved CCTV, perimeter protection, intruder alarms and access control making our industry any greener? Is technological innovation consistent with reducing security industry’s carbon footprint? In any case, green operating practices are more a side effect of current developments...
Employers are increasingly concerned about the risks associated with employees, temporary workers, independent contractors, and others who have the ability to wreak havoc on an organisation from the inside. This is often referred to as “insider threat.” There are numerous types of insider and post-hire threats that range from embezzlement, theft of trade secrets, workplace violence or active shooters, and everything else in between. Potential insider threats are...
Samsung Techwin is changing its name to Hanwha Techwin. The move comes a little more than a year after Korean conglomerate Hanwha Holdings acquired the largest share of the company from Samsung Holdings in late 2014. However, use of the Samsung brand on the company’s cameras and other products will continue for now. “Eventually we want to make it our own brand,” said Tom Cook, vice president of North American sales. “Samsung carries some weight in the user mentality....
A biometrics-embedded tablet can tag a guard upon entering the building & feed videoof what’s happening beyond secure doors as he/she moves through the facility The best way to make the case for biometrics is to consider a physical and logical access control scenario, according to biometrics vendor SRI Identity, a program from SRI International, one biometrics company. With advances in security technology, access control systems have come to play a bigger role in org...
In a year of mega-deals impacting the security marketplace, one of the big news stories recently was a deal that did not happen – between giants Honeywell and United Technologies (UTC). Financial news pages have been full of the back-and-forth between these two companies. It seems Honeywell wanted to merge with UTC, but UTC declined because of “insurmountable regulatory obstacles and strong customer opposition.” So the deal is off, at least for now. Impact on the security mark...
Many companies are considering carefully the possible risks of business travel to the areas most impacted by the Zika virus, and others may have facilities located in affected areas. What is the Zika Scare? Transmitted by mosquito bite, the Zika virus can cause a fever that typically involves minor symptoms. There is an additional risk to pregnant women as Zika fever has been linked to incidences of microcephaly (a neurodevelopmental disorder) in newborn babies through mother-to-child transmi...
Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-growing border security challenges “More than one bil...
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Secur...
Proving ROI, setting proper customer expectations and training is imperative tothe success of biometric implementation End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “e...
We hear that everything is going to the cloud – or is it? Security end users can be understandably confused by conflicting claims in the market from proponents of cloud-based or server-based systems. A number of major security companies are offering cloud video surveillance solutions apart from the traditional server-based systems. At the end of the day, how do you choose? What factors should be considered? We asked this week’s Expert Panel Roundtable: What factors should a customer...
LILIN can equip all branches with the best-of-breed video surveillance security equipment and systems. Teller windows, processing rooms, ATM’s, parking lots, lobbies and common areas are all monitored by high-quality video cameras for the safety of customers, employees and staff. The company offers a large selection of IP cameras for use with bank location, and the surveillance video can be searched by date, time, camera location or any combination of these. Zone Entering technology is ab...
Browse security news
- By event
- Black Hat Middle East 2024
- Intersec 2025
- Data Centre & Cloud Innovation Summit 2025
- Inter Airport Southeast Asia (IASEA) 2025
- Global Table Games and Game Protection Conference 2024
- ISC East 2024
- SIA Honors 2024
- Dahej Industrial Expo 2024
- Suprema Global Partner Program (SGPP) 2024
- AUCSO European Region – Winter Conference 2024
- Inno Rail 2024
- View more
Featured products
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download- Luxembourg Security companies
- Luxembourg Manufacturers
- Luxembourg Distributors
- Luxembourg Resellers / Dealers / Reps
- Luxembourg Installers
- Luxembourg Consultants
- Luxembourg Systems integrators
- Luxembourg Events / Training / Services
- Luxembourg Manned guarding
- Luxembourg Training organisations
- Luxembourg Associations / regulatory bodies
- Luxembourg Event organisers
- Luxembourg Media
- Luxembourg Recruitment / personnel
- Luxembourg Services