Luxembourg News

Technology contributes to holistic security approach at primary/secondary schools

Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting primary/secondary schools. Technology can contribute to a broader, holistic approach to security that is customised to meet the needs of each educational institution. Honeywell has helped many schools customise security systems to meet each school’s unique needs, says Bruce Montgomery,...

Clarifying misconceptions about video storage solutions

One key misconception is that solid-state drives (SSDs) are going to replace hard disk drives (HDDs) Like many areas of the security market, the field of digital video storage systems has its share of misconceptions and missed opportunities. We called on manufacturers of these systems to set the record straight. Hard disk drives (HDDs) will continue to rule One key misconception is that solid-state drives (SSDs) are going to replace hard disk drives (HDDs), says Henk Van Den...

Comelit to demonstrate Mini video door entry phone at IFSEC 2015

The design enhances user convenience & minimises delays for visitors Comelit has added to its market-leading access control range for apartment blocks and residential complexes with the ‘Mini’ video door entry phone, which the company will be demonstrating at this year’s IFSEC 2015 in June at London’s Excel Centre. The ‘Mini’ is an enhanced version of Comelit’s entry-level solution, which maximises security while remaining uno...

ASSA ABLOY to exhibit its latest solutions at IFSEC 2015 in London

Assa Abloy will reveal how its solutions enable customers the correct level of access across a wide range of end user markets ASSA ABLOY, the global leader in door opening solutions, will exhibit its unrivalled breadth of product choice on stand D1700 in Hall S17 at Excel, London, from 16-18 June. Access across a wide range of end user markets At the exhibition we will reveal how our future-proof solutions, enable customers the correct level of access across a wide range...

A wrinkle emerges in Canon’s acquisition of Axis Communications

Anyone thinking the Canon acquisition of Axis is a done deal should reconsider. Not so fast. A wrinkle has emerged as the Japanese imaging giant has been buying up shares of Axis in anticipation of acquiring the Swedish camera manufacturer. The wrinkle comes in the form of a hedge fund company called Elliott Management, which has reportedly bought 10.91 percent of Axis stock. Incomplete sale The number is significant because Canon needs to acquire 90 percent of Axis stock in order to force th...

Traka's seamless working integration technology to be showcased at IFSEC 2015

Traka will show visitors how it’s key and asset management products can integrate with other softwares Traka, the key and asset management specialist, will be attending IFSEC 2015 on stand D1700. The company will be demonstrating its advanced capabilities that enable Traka to work seamlessly with most access control systems in the security industry. At the show, Traka will show visitors firsthand how its key and asset management products can integrate with software...

IFSEC International 2015 - Highlights of Innovation Trail

The Innovation Trail will allow visitors to navigate all the newest products and services from across the security industry Innovation is the key theme at this year’s IFSEC International, taking place from 16-18 June at ExCeL London. The annual security gathering will host the Benchmark Innovation Awards along with the launch of the new Innovation Arena. In addition to this, the Innovation Trail returns for its second year. Innovation Trail - Latest products and ser...

Video surveillance trends driving increasing storage needs

End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also, small- and medium-sized enterprises (SMEs) are turning to networked video surveillance in larger numbers. And video is now finding many uses outside the security market, including business intelligence and customer service applications, among others. These familiar trends are directly impacting the choice of video storage solutions being used i...

ASSA ABLOY to showcase integrated security & access control technology at IFSEC 2015

ASSA ABLOY will feature Aperio wireless locking technology run on the new high speed V3 platform ASSA ABLOY, the global leader in door opening solutions, will be showcasing integrated security and access control technology from its leading brands at IFSEC 2015. Recently named by Forbes as one of the world’s 100 most innovative companies, ASSA ABLOY will exhibit its unrivalled breadth of product choice on stand D1700 in Hall S17 at Excel, London, from 16-18 June. AS...

IFSEC 2015: Bosch Security Systems’ latest innovations and technologies to be showcased

Bosch’s new FLEXIDOME IP panoramic camera family as well as AUTODOME IP 4000 and 5000 models will be shown at the event From 16th to 18th of June, Bosch Security Systems will showcase its innovations and award-winning technologies in the South hall on stand F700 during IFSEC International 2015 in London. Visitors are invited to come see and experience how Bosch’s portfolio of video, intrusion, communication and fire solutions can meet any security and safety need....

Mul-T-Lock to present its digital security advances with ASSA ABLOY at IFSEC 2015

Visitors to Mul-T-Lock will be invited to experience ENTR, the first smart lock solution in the market Mul-T-Lock® will be at IFSEC 2015 with ASSA ABLOY to present its very latest revolutionary advances in digital security. The global brand will be highlighting its world-renowned ability to deliver incomparable functionality and build quality without compromising on security. A specialist integration hub The ASSA ABLOY stand (D1700 in Hall S17) will showcase how to &lsq...

Integrators should foster relationships to increase primary/secondary education sales

Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (primary/secondary) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience...

School security: Communication and controlling access

Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...

Networking basics for security professionals: What do layers really mean?

Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...

Oncam video surveillance solution boosts hospital security at various levels

According to the US Census Bureau 2012, the annual revenue total of the healthcare industry is $1.668 Trillion. There are 5,724 registered hospitals in the US (American Hospital Association). Each one is estimated to be worth between $100-500m in terms of total asset value (building, staff, and equipment). In the 2012 Hospital Security Summary, 25% of respondents reported an overall increase in attacks and assaults compared with more than 7% reporting a decrease; 34% reported an increase in pat...

Convergence of IT networks and physical security

Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...

Technology advancement requires well-educated, well-paid security officers

The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control centre. The post of security officer was a minimum wage job requiring little more than a high school diploma, if that. Educated and experienced security officers a prerequisite No more. “Today, when we read our requests for proposal (RFPs), we’re...

The Internet of Things presents new cyber-vulnerabilities

Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...

Online and offline locks: Leveraging the best of both options

Online wireless locks enable real-time online access control functionality Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customised system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...

Cyber-defence challenges cannot be ignored, says DVTEL

Cybersecurity has been getting much more attention lately in the physical security market. One company ready to address cybersecurity of IP video products is DVTEL. The Israeli company’s roots in IT and networking make it a logical choice to take a lead in cyber-defence of IP video systems. DVTEL’s core research and development (R&D) in Israel includes cyber-defence expertise. DVTEL’s cyber-defence plan In fact, DVTEL is moving fast to implement its cyber-defence plan &nd...

Networking basics for security professionals: Misinterpreting product specs – temperature, latency and more

Too often a valid assumption turns out to be the opposite in practical operation It’s easy to misinterpret product specifications of IP video transmission products to the detriment of system functionality. We have seen how this problem relates to port speed, power over Ethernet (PoE) and transmission media. Now let’s look at some additional aspects of product specifications – and how they can be misinterpreted. Importance Of Temperature Rating What about te...

Illinois Association works to quell proposed fire alarm legislation

Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the Illinois Electronic Security Association (IESA) to validate the reason for membership. Just last week IESA members and lobbyists travelled downstate to Springfield to show support and testify against two new bills, up for debate in a senate committee hearing, that would ultimately prove harmful and create a competitive disadvantage for license...

Deploying a high-performance computing environment to minimise processing costs

Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...

From consolidation to video services: Milestone’s Thinggaard talks coming trends

Milestone Systems is closing in on a year since their acquisition by Canon’s European subsidiary in June 2014. Throughout the ownership transition, Milestone has reiterated its commitment to open systems and continued to flourish, building its “ecosystem” alongside other industry partners. At the recent Milestone Integration Platform Symposium (MIPS 2015), I had a chance to chat with Lars Thinggaard, Milestone’s president and CEO, about industry trends and what’s ah...

Impact of school shootings on demand for security systems

School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (primary/secondary) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase in de...

Networking basics for security professionals: Considering 4k’s impact on networks

Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HDTV, which in some cases was defined in terms of its resolution of 1920 hor...

What are the cybersecurity vulnerabilities of IP based systems?

Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...

GJD to showcase latest innovations at IFSEC 2015

Featuring on GJD’s stand will be the recently launched D-TECT 2 IP detector GJD Manufacturing Limited, one of the world’s most innovative leaders in UK manufacturing, design and supply of professional external detector equipment and CCTV LED Illuminators, recently announced it will showcase its latest innovations at IFSEC International 2015, on stand F1160 at the Excel, London from June 16th to 18th. IFSEC International is the world's largest gathering of security...

How should manufacturers engage with end user customers?

If we didn’t have manufacturers, integrators wouldn’t have anything to sell. But what is the role of manufacturing companies when it comes to taking those products to market? Effectively managing the sales channel – helping resellers be successful without somehow undermining their efforts or (heaven forbid!) selling direct to an end user – is an ongoing and delicate challenge for manufacturers. They want to do everything in their power to ensure success of their products...

Networking basics for security professionals: Do you believe in specifications?

Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...

Related videos

Enhanced security with S617 video door station

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

Quick poll
What is the most significant challenge facing smart building security today?