Luxembourg News

Jemez wins Axis 2015 Technology Integration Partner of the Year at 10th annual connect & converge conference

Jemez received the award for integration of Eagle-i Edge software built upon the Axis Camera Application Platform Jemez Technology was named 2015 Technology Integration Partner of the Year by Axis Communications at its 10th annual Axis Connect & Converge Conference (ACCC). Axis, the global leader in network video, presented these annual awards to top channel, software and technology partners. Axis and Jemez collaboration Jemez Technology received this award for the innov...

Key control technology & guard tour systems enhancing security in healthcare organisations

Key control technology and guard tour systems provide a ready-made solution for healthcare organisations to enhance their security & asset management protocols Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key control systems, asset lockers and guard tour systems. The shift from manpower resources to technology as a main line of defence is having a significant impact on...

Justifying corporate security costs with benefits to business continuity

Security is becoming increasingly business-like, with corporate security departments having to justify their budgets and support business operations Persistent crime — both physical and logical — and the rise of terrorism around the world have led more and more corporations to expand their focus on security. In that effort, C-suite executives have added significantly to the responsibilities of corporate security departments. Security functions have grown far b...

Advanced biometric identity systems help tackle immigration & border security issues for screening large numbers of people

As we face 2016, identity management has become more critical to successful security operations. Recent acts of terrorism, border security issues, and the refugee crisis are just a few examples that remind us of the potential risks we face today. As a result, identity management is now firmly cemented into prospective security models across the public and private sectors.   In recent years, organisations and government bodies worldwide have begun to rely increasingly on biomet...

Big Data in the physical security market – an overlooked opportunity for end users

Access control and video systems have always yielded a lot of data, although historically much of it has been stored on hard disk drives and later overwritten and/or dumped. A new trend is to compile that data over time, organise it, analyse it and then use it to provide insights into how the enterprise operates. Analysing data from different sources and departments It’s part of a trend called Big Data, but so far its use in the physical security market has been limited. One company tha...

Physical security industry tips and best practices for recruiting and retaining top security officers

As the security industry continues to grow, recruiting must have more sophisticatedscreening and hiring processes, and a commitment to hiring quality personnel The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator correspondent, in an exclusive Q&A with Brent O’Bryan, Vice President of Training and Development for AlliedBarton Security Services, discuss the challenges that secur...

5 things to consider before moving your surveillance to cloud-based video storage

Determining how the cloud can best support your business depends on fivefactors: Bandwidth, storage, cost, security and accessibility Until about a decade ago, most enterprises used their video surveillance systems primarily to view live video or review security incidents after the fact. Today, many are taking advantage of intelligent video solutions to reduce losses from theft and fraud, monitor and improve customer service, track commercial conversion rates and performance t...

Electronic access control adoption rises as demands for mobile connectivity and building integration increase

Strong electronic access control (EAC) investments by the healthcare and education verticals were a highlight of a very strong 2015 for Allegion. The company saw double-digit growth in multiple categories for its electronics as well as continued strong growth in commercial markets, with further expansion of software provider integration of Allegion-connected devices.   Mobile connectivity & system integration nurture positive trends Demand for mobile connectivity and inte...

What is the value of edge-based video storage for IP surveillance systems?

One of the benefits of newer IP systems is the ability to store video inside the camera or in a nearby digital video recorder (DVR) at the edge of the network. Edge-based storage is unlikely to take the place of centralised storage, but it is complementary and provides some interesting new options related to system design. We asked this week’s Expert Panel Roundtable: What is the value of edge-based storage and in what specific applications?

How are biometrics companies expanding system functionalities for better security and identification?

Facial and body behavior analytics can identify people “without interferingwith the pace of life” Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to. SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems ca...

Growing demand for mobile phone door locks and custom user-friendly access control solutions

With increased demand for high-security door locks in all the vertical markets we serve, the last year has been very good for Securitech. Looking forward, we expect this across-the-board growth to continue, as we continue to listen and respond to customer demands and closely monitor industry trends.   In recent years, the security industry has witnessed a growing trend towards development of user-friendly access control solutions that enable customers to have complete control...

Video analytics and 4K cameras for outdoor city surveillance present opportunities for manufacturers, security resellers and integrators

An improving economy has resulted in additional spending on new and existing security initiatives in 2015, a solid year for the security industry. In addition, industry consolidation continued with the announcement of a few important mergers and acquisitions, which is further evidence of a vibrant and exciting time for our industry. As we move into 2016, we expect to see increased momentum for megapixel and 4K security products. The benefits of 4K are being realised by end users in outdoor cit...

Key and asset management are vital parts of security strategy, but more integration is needed

2015 has been a huge success for key and asset management company Traka. The manufacturer is predicting growth between 20 and 30 percent. It attributes a large part of its success to the extensive work completed in previous years in the U.S. markets, as the foundations set are now coming to fruition.   However, Traka has also encountered a real culture shift within the industry. Where previously key management systems and intelligent lockers for asset management were seen as a...

Security integrators push connectivity with IoT technology and global customer service in 2016

In today’s connected world, our customers are focused on streamlining operations and garnering actionable insights to help drive success across the business. Modern security systems enable security integrators to offer remote access capabilities which in turn helps businesses to improve their performance. For example, security integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, secu...

Security goes mobile: Identity and access management solutions on devices to improve user experience

HID Global is looking forward to a long term investment in a complete range of secure identity solutions. Also, focusing on its global partnership program will be on the agenda. An increasingly global market for identity and access management is undergoing very rapid development due to technological advances, particularly in communications, where digital mobile solutions are experiencing strong demand. The year 2015 was a good one for HID Global, which has a strong global position and is invest...

Siklu’s millimetre wave wireless technology supports video surveillance networks with improved capacity

Siklu further expanded its presence in the video surveillance market in 2015. The company released the world’s smallest outdoor Gbps radio to address the issue of densified coverage, which results in the need for high capacity connectivity in surveillance networks – a trend that has snowballed in past years.  Growing video surveillance networks demand greater bandwidth capacity Developments in video analytics and resolutions, requiring high-quality video at the surveillance ne...

Concerns over card security systems raise customer interest in long-range and durable contactless access control readers

Farpointe Data started 2015 in newly relocated offices featuring a larger, more proficient layout that added new manufacturing equipment and increased its production and inventory capabilities. Shortly into the year, Farpointe introduced new WRR-22 and WRR-44 433 MHz receivers that use either 2-button or 4-button transmitters to open two or four different doors from ranges up to 200 feet (61 m). Each button outputs transmitter data over separate Wiegand outputs, yet the receiver installs just...

Enterprise command software integrates data sources to analyse security, business and risk profiles

The role of today’s security leader continues to evolve as they are faced with an ever-expanding risk environment that includes active shooters, crime, natural disasters, liabilities and cyber threats. Most recently, the terrorist attacks in Paris and the active shooter violence in California once again served as reminders of the threats organisations face on a daily basis.   Intelligent technologies for proactive security management Over the past year, the increased fo...

ID cards as preventative solution for shooters and emergencies in schools, despite budget constraints

Budget becomes a major constraint for any school and organisation while addressing safety of their students and staff. IDSecurityOnline, the leading provider of photo identification services will provide customers its innovative ID card solutions irrespective of their budget. The development of cloud-based services and mobile platforms has offered more options to organisations all around the United States in 2015. In the meantime, scare tactics have been the go-to marketing strategy for many se...

Falling prices and open security systems see increased competition amongst security providers

Ups and downs tested the staying power of security system providers in 2015, which was a dynamic year for the security market. A key development in the security industry has been the acquisition of VMS leader Seetec by OnSSI, which has enabled it to serve customers globally. The security market in 2015 also witnessed a growing trend towards supporting diverse security systems from different manufacturers. Falling prices and increased competition On the bright side, while the economy has not ye...

Increased understanding and focus on data analysis allows for widespread predictive security and identity management

2015 was a notable year for Quantum Secure, culminating with the company becoming part of HID Global. Growth was seen in several sectors for us, led by the adoption of our SAFE software solutions in the finance and aviation markets, among others. For the industry in general as it relates to Quantum Secure, predictive security became a more prevalent theme as organisations were tasked with not only providing more data but making sense of the data for use in improving security operations. Another...

Customer-centric business practices more important than following popular security market trends

It is better to create new markets than to struggle to maintain a presence in the bitterly contested existing markets. The security market in 2015 has been faced with many ups and downs, and in such a scenario innovating new products gave companies the necessary boost to take on competitors and capture new markets. That’s the viewpoint of Dallmeier as an eventful year draws to a close; a year in which we won and completed many new projects all over the world. Despite, or perhaps because o...

Situational awareness and emergency response solutions strengthen security infrastructure

The security environment is unsettling and continues to require focus and continuing vigilance to increase security measures. Sensors in active technology systems play an important role in situational awareness, which helps in identifying and responding to emergency situations.   As of October 2015, there were 45 school shootings in the United States. There continues to be grave concern about potential “lone wolf”-type events for individuals and businesses. Situati...

Security projects capital spending grew in 2015 amidst larger adoption of thermal cameras and analytics

Capital spending continues to open up in 2015, providing funding for security projects that may have been delayed from prior years. Overall, it was a solid year for the security industry. From a SightLogix perspective, we have seen an increased rate of repeat business as existing customers expand the number of assets they need to secure.      Smart thermal cameras provide ideal outdoor intrusion detection 2015 saw an accelerated adoption of thermal cameras with video analytics...

Pure IP access control to gain significant strength in 2016

In April of 1775, Paul Revere rode fearlessly through the streets of New England warning the town of Lexington that “The Red Coats are Coming!” It was both a warning and an announcement that a powerful force was upon them. If Paul Revere were alive today and in the security and access control world, he would probably be tweeting, posting, and blogging that “IP access control is coming, and it’s coming faster than you’d expect!” Just as in 1775, it is both a...

IoT-based key management systems with access control strengthens risk management strategies

Although 2015 seemed like the year of data breaches, it was also the year that the Internet of Things (IoT) achieved real traction. Key management systems and most other advanced security solutions can now be integrated with the networked security system (i.e. identity management, access control, IP video surveillance, intrusion and other systems) to strengthen risk management strategies. Specifically, Morse Watchmans’ KeyWatcher Touch can now be integrated with Lenel’s OnGuard Acce...

ASIS 2015 President Dave Tyson sees more M&As and futuristic trends impacting the security market

From my vantage point, it would appear that the acquisition of goods and services related to security controls and measures remains healthy at the end of 2015. Although the time associated with evaluations and overall procurement processes, I am told, has become a bit lengthier.   Mergers and acquisitions of both security industry providers and the merger of national and international companies are the biggest unexpected things to have an impact this year. Forbes reported that...

SeeTec physical security solutions secure oil and gas industry

SeeTec video technology helps to detect situations at an early stage and thus assists in avoiding consequences Despite of the development of alternative and renewable energies, oil and gas still represent the engine of the world economy. Exploration takes place under increasingly challenging conditions often in remote locations. Security requirements, already high, continue to rise. This is not surprising as incidents during up-, mid- and downstream processing can cause immens...

Security and video opportunities to bloom amidst global threats and migrant crisis

As the world faces new threats and challenges at the end of 2015, the security market looks more and more attractive for companies and employees around the world. Digital technology increasingly is replacing a traditional physical security approach, upgrading old-school analogue alarms and CCTV. Attractive security projects From AxxonSoft’s point of view, security projects seem very attractive because they normally can bring up to 30% profit for a standard security system installation....

3xLOGIC on the value of “dark data” collection from video, access control, intrusion and biometrics

2015 was one of the more stable of the last five years. We’re seeing a fundamental increase in confidence that is freeing up capital spend. There’s a good bit of pent-up demand, and larger projects are being funded. We’re seeing more M&A deals, not an explosive change, but a marked increase and more quality deals. These deals reflect an interest and demand for services and solutions. The commoditisation of cameras and NVR/DVRs is putting pressure on long-term players as we...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?