Marshall Islands News

Mul-T-Lock’s electronic locking solutions help in countering the rapid rise of vehicle thefts in the United Kingdom

Last year saw vehicle thefts rise by a staggering 50% in the UK, and again by a further 20% so far this year, which is regarded to be the highest level in four years. With cases worsening during lockdown, motorists are now being warned that they face a greater risk of vehicle theft now that the nation is making fewer trips in their vehicles and spending more time at home. Countering the rise in vehicle thefts The cost of a lost or damaged vehicle can quickly mount up for any business owner, no...

BCD International hires Andrew Hubble to global team

Continuing to expand its global presence, BCD International announced the appointment of security industry veteran Andrew Hubble as Managing Director – APAC. Reporting and responsibilities Reporting directly to the Vice President of Sales, Hubble will be responsible for the management of APAC safety and security, computer vision and IoT customer relationships, and to drive BCD revenue through existing and new customer relationships. “As BCD has delivered infrastructure solutions a...

Pinnacle Imaging Systems launches Denali 3.0 Programmable Image Signal Processor IP

Pinnacle Imaging Systems, a globally renowned developer of Image Signal Processors (ISP) and High Dynamic Range (HDR) video solutions, has launched its new Denali 3.0 Programmable Image Signal Processor IP. Pinnacle Imaging’s camera-ready, end-to-end HDR ISP leverages its proprietary advanced algorithms to accurately tone map high contrast scenes for mission critical applications requiring data-rich, real-time imaging. Denali 3.0 Programmable Image Signal Processor IP With Denali 3.0, P...

Sonatype and Fugue partner to deliver Infrastructure-as-code solution that shifts cloud security left into the developer workflow

Sonatype, the globally renowned provider of innovation-friendly open source security tools, has announced entering into a strategic partnership with Fugue, the company putting engineers in command of cloud security, to deliver the first Infrastructure-as-code (IaC) solution that shifts cloud security left into the developer workflow. Sonatype and Fugue partnership The partnership further advances the missions of Sonatype and Fugue to empower software developers with best-in-class tools so they...

Safetrust supercharges HID readers with SABRE MODULE touchless mobile access solution

Safetrust, the globally renowned company in virtual credential solutions, has released touchless mobile access and WiFi options for the millions of HID iCLASS SE and multiCLASS SE readers deployed globally with their new SABRE MODULE. The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE touchless mobile access The SABRE MODULE enables hands-free authentication from a config...

Safetrust’s 4 ways to increase safety and security in the new workplace with touchless technology

The implications of COVID-19 have been profound, and the road to business recovery is evolving and fluid. Facility providers around the world are shifting priorities. The focus was once creating a workplace that promotes employee productivity and company values. Now, it’s ensuring that the workplace, and everyone who enters it, remain safe and healthy. With all the coronavirus uncertainty, it might feel strange to start working on how to open offices again. But no matter whether offices a...

Supermicro scalable liquid-cooled supercomputing cluster deployed at Lawrence Livermore National Laboratory for COVID-19 Research

Super Micro Computer, Inc., a global pioneer in enterprise computing, storage, networking solutions, and green computing technology announced that it has deployed an additional cluster at Lawrence Livermore National Laboratory (LLNL) to augment existing computing capabilities available for national security and to help discover therapeutics for SARS-CoV-2, the virus that causes COVID-19. Called the “Ruby” cluster, Supermicro’s TwinPro 2U 4 node servers leverage advanced 2nd Ge...

Leonardo sustains the transformation of key suppliers with the Lean Management Workshop

Leonardo, the title-holder in the Aerospace Defence & Security (AD&S) sector, has launched a new initiative dedicated to its key suppliers. It focuses on the issue of operational excellence to support companies in their lean journey through maximising competitiveness and customer satisfaction with a structured approach of continuous improvement, reducing excess and improving the quality and flexibility of products and services. Programme & workshop The project is part of the Leona...

Moving to sophisticated electric locking

In part one of this feature, we introduced the shotbolt – a solenoid actuator – as the workhorse at the heart of most straightforward electric locking systems. Shotbolts remain at the core of most sophisticated electric locking solutions as well. But they are supplemented by materials and technologies that provide characteristics suited to specialist security applications. Here we look at some more demanding electric locking applications and contemporary solutions. Preventing forced...

Codebase Technologies pushes for FinTech-led innovation with release of its Digibanc Digital Roshan solutions

Codebase Technologies has introduced a brand-new digital FinTech offering, Digibanc Digital Roshan, to empower conventional and Islamic banks in Pakistan to manage seamless, consistent, and engaging customer journeys across multiple customer touch-points and drive their digital transformations. Digibanc Digital Roshan solutions The comprehensive digital solution, Digibanc Digital Roshan aims to help banks to support overseas Pakistani customers to open their Roshan Digital Accounts effortlessl...

Safetrust teams-up with AlertEnterprise Inc. as the demand for touchless access to physical spaces rises

Safetrust, a pioneer in virtual credential solutions, and AlertEnterprise Inc., the foremost physical-logical security convergence software company, have entered into a strategic partnership to deliver next-generation digital access credentialing and controls, providing frictionless, safe and secure workspace access experience for employees, contingent workers and visitors. Benefits of collaboration The collaboration reinforces the new way businesses are defining smart and healthy workplaces,...

Safetrust introduces SABRE MODULE to upgrade HID iCLASS® Readers with MIFARE® DESFire® EV3 Security

Safetrust, a pioneer in virtual credential solutions, introduces the SABRE MODULE, a 30-second plug-in upgrade that adds DESFire EV3 and remote management capabilities to installed HID iCLASS readers. Supports Wi-Fi The module simplifies the transition from legacy prox, iCLASS or SEOS credentials to DESFire EV3 and supports Wi-Fi which allows customers to remotely manage and configure their readers, eliminating the need for onsite visits. Plug and play The fast, plug-and-play solution requir...

Overhead Door Brand unveils next generation of the OHD Anywhere App for remote garage doors access

Overhead Door Brand, a globally renowned manufacturer of residential and commercial door solutions, has launched the next generation of the OHD Anywhere app. The new version of OHD Anywhere includes enhanced features based on user feedback that improve everyday life and allow homeowners to monitor and operate their garage doors remotely from their smart device. Personalised garage door access “In this modern, digital age that is overflowing with advanced technology, a garage door opener...

Dell Technologies’ Data Protection and Cyber Security innovations aid enterprises safeguard critical applications

Dell Technologies has announced the release of their new Dell EMC PowerProtect DP series integrated appliances and PowerProtect Data Manager Software advancements to help businesses and customers protect, manage and recover data from traditional and modern applications, across core data centers, edge locations and public clouds. PowerProtect Cyber Recovery Dell, the industry renowned company in data protection appliances and software, also announces the release of PowerProtect Cyber Recovery,...

The future of property security: In-house processing units versus cloud-based video surveillance systems

Nowadays, everything seems easier in the matter of surveillance. Sophisticated technology safeguards our valuables for us without asking for anything in return. But what if it’s not true? What if it comes with a price? Video surveillance systems are a popular way to keep the property under constant control. It’s not rare that the technological sophistication of these systems puts us in awe. They make us feel, and be, safe. Yet, there are doubts when it comes to ensuring privacy. And...

Allied Universal honours and supports all military personnel by recruiting, employing, and retaining the nation’s veterans

Allied Universal, a renowned security and facility services company in North America, honours and supports all members of the military not just on Veterans Day this November but each and every day. "While many businesses talk the talk about why military veterans are important hires, the physical security sector actually walks the walk,” said Steve Jones, Chairman & CEO of Allied Universal. “We honour and appreciate the sacrifices made by our nations’ military and we consta...

Check Point Software gears to secure the ‘next normal’ with their cyber security predictions for 2021

Check Point Software Technologies Ltd., a renowned provider of cyber security solutions globally, has released its cyber security predictions for 2021; detailing the key security challenges that organisations will face over the next year. Check Point states that the effects of the changes introduced during the COVID-19 pandemic will continue to be a key focus for organisations’ IT and security teams. 81% of enterprises have adopted mass remote working for their employees, with 74% plannin...

Iris ID iCAM M300 biometric reader compatible with MozaicID smartcard software credential application

Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secu...

Hanwha Techwin security cameras deployed by Olymbec to secure its various properties and improve their rentability

Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, has announced that Olymbec, globally renowned privately owned industrial real estate holder on the US East Coast and Canada, has chosen Hanwha cameras to help secure its properties and improve rentability. Managing upwards of 300 properties in Quebec, Canada and 15 different states in the US, Olymbec owns more than 30 million square feet of property. Managing this much real estate means that Olymbec has t...

Evaluating and selecting AI video analytics solutions for your organisation

As the multi-billion-dollar market for artificial-intelligence-based video analytics continues to grow, so does the number of video analytics solution providers. In Q3 of 2018, Stockholm-based consulting company Memoori identified 128 active companies in the supply chain for AI video analytics [i]. This list is far from exhaustive, considering how analytics has been gaining interest and becoming mainstream in 2020, with users expecting more accurate alerts based on object detection instead of m...

Check Point announces the launch of Check Point R81 cyber security platform with autonomous threat prevention

Check Point has introduced its next-generation unified cyber security platform, Check Point R81. The new platform is one of industry’s first to deliver autonomous threat prevention designed for the entire distributed enterprise, enabling IT staff to manage the most complex and dynamic network environments easily and efficiently. Enterprises have accelerated their digital transformation programmes and changed IT priorities in response to the COVID-19 pandemic, which has increased their cyb...

Parliament Street reports show Open University being bombarded by over 1 million email attacks in 2020

The Open University, which is based in London, has been bombarded by 1,191,312 malicious email attacks over the past nine months, from January 2020 to September 2020. This is according to official data obtained by a Parliament Street think tank via a Freedom of Information act request. Fortunately, all malicious messages, which included spam, malware and phishing attacks, were blocked by the University’s servers. Distance learning courses In its response to Parliament Street researchers,...

PACE Security adds Alcatraz Rock autonomous access control platform to its solutions portfolio

PACE Security, a Southern California-based security integration and systems design firm, has announced that it has added the Alcatraz Rock autonomous access control platform to its solutions portfolio. “We are excited to have PACE embrace the Alcatraz Rock and its ability to deliver access control via facial authentication,” said Alcatraz Chief Revenue Officer, Tina D’Agostin. Alcatraz Rock added to portfolio Tina adds, “PACE has already successfully delivered autonomo...

VIVOTEK collaborates with Existo to deliver a comprehensive surveillance solution for Michigan cannabis cultivation facility

In the fast-growing legalised cannabis industry, extensive security measures are a necessity. VIVOTEK, the pioneering IP surveillance provider has collaborated with Existo, a collective of cannabis industry professionals, to establish an IP surveillance solution for a cannabis cultivation facility in Northern Michigan, the United States. The results not only exceeded the state of Michigan’s expectations to allow for licensing at the state level but are also user friendly and add a level o...

Altronix offers pre-configured Trove™ Access and Power Integration Kits to support Hartmann Controls

Altronix, the recognised front-runner in power and data transmission products for the professional security industry, is further expanding its Trove™ series with an access and power integration solution exclusively designed to support Hartmann Controls. The pre-configured kits will accommodate up to 8 or 16 doors each and are scalable for large systems. Authorities comments “These new Trove solutions provide authorised Hartmann Controls dealers with added features and benefits tha...

Ntirety explains the importance of zero trust

The technology industry has long assumed that it would eventually get rid of the concept of implicit digital trust. With the worldwide happenings in 2020, users have all been put into a virtual time machine and are living in a projected world of “Zero Trust.” Running back through to zero Digital transformations became more than a vague goal in 2020 as priorities and business demands shifted radically in March 2020. Waves of workers became partially or completely remote, and along...

V.I.P. Auctions introduces UVeye's industry-first auto-inspection technology

V.I.P. Auctions will be one of the first vehicle auction companies in the world to use automated vehicle-inspection systems to evaluate tires and critical underbody components for the inspection of used vehicles. Jim Smith, founder and CEO of V.I.P. Auctions, said the company’s new camera-based artificial-intelligence technology will save time, reduce costs, document vehicle conditions and also set new inspection standards for the automotive remarketing industry. Developed by UVeye, the...

Abnormal Security assists in detecting IRS impersonation payment fraud

In this attack, scammers impersonate the IRS to collect a fraudulent payment from their target. Summary of the attack target Platform: Office 365 Bypassed Email Gateway: Proofpoint Mailboxes: 50,000 to 70,000 Payload: Text Technique: Spoofing / Impersonation What was the attack? 1)Setup: The IRS has long been a popular target for impersonation by attackers. This email highlights a more sophisticated IRS impersonation, where a targeted attack is sent from a spoofed sender domain...

AMAG Technology welcomes Vice President Global Sales

John Becker has joined AMAG Technology as Vice President Global Sales. John joins AMAG with extensive sales leadership experience and has built strong relationships with end-users, systems integrators and dealers. Experience Prior to joining AMAG, John was Senior Vice President, Sales & Marketing, at Discount Labels. There, he was responsible for the sales and marketing for the label division with more than 25,000 distributor partners/customers. Prior to that, John spent 13+ years at Tyc...

Axis Communications leads collaborative effort with system integrators to ensure high levels of surveillance system cyber security

Cyber security concerns regularly top the list of things that keep business leaders up at night. The threat landscape is constantly shifting and evolving, as determined malicious actors launch new attacks and exploit vulnerabilities. Defending against threats and protecting company data can feel like a never-ending game where it’s impossible to stay one step ahead. To counteract this, Axis Communications (Axis) leads a collaborative effort with system integrators, security experts and end...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?