Mauritius News

Pokemon Go: A lesson in physical and cyber convergence for the security market?

The new Pokemon Go video game, which has taken the world by storm, combines real-world landmarks and locations with virtual creatures in a smart phone video game that requires players to walk around in the real world to “find” the imaginary creatures. It’s a little like what the security industry has been trying to do for years: To achieve convergence of physical and cyber worlds. Pokemon Go security risks To be sure, the new game has presented its own set of security chall...

Arecont Vision provides local, state and national government surveillance solutions

Arecont Vision megapixel cameras enable city, county, state, and federal or national governments worldwide to deploy new, cost-effective applications for enhanced situational awareness and forensic viewing.With security concerns on the rise, video surveillance is often the first and sometime the only witness to incidents and the actions that led to them.Arecont Vision solutions increase surveillance coverage and quality, while reducing the number of cameras required and for less cost. Surveilla...

Open Options announces access control integration with Axis Communications

Open Options and Axis Communications have announced the integration of Open Options' DNA Fusion and AXIS A1001 Open Options, an open platform access control and software development company, and Axis Communications, the global leader in network video, announce the integration of Open Options' DNA Fusion™ with AXIS A1001 Network Door Controller. Open Options and Axis Communications are both proponents of the value of open architecture in access control software and hardw...

Web and social media intelligence transforms security and safety planning

Over the course of the last decade, we’ve seen a blurring of lines between cyber and physical security concerns. Whether it’s the hacking of corporate information or the use of social media for nefarious activities, it’s clear that these once-separate security disciplines are often tied together. As a result, various organisations seek ways in which they can collaborate and share information to gain greater situational awareness to react faster, smarter and more...

Shooting incidents highlight importance of hospital security

Hospital security always counts. Patients may arrive from a crime scene and someone has to make sure they weren’t followed by trouble. Doctors, nurses and other medical personnel may come under blame for the death of a loved one and need protection. Heightened security needs Think for a minute, though, about the elevated need for security when the victims of a massacre — such as the Orlando massacre — arrive at the hospital. On the heels of the shooting at the Pulse Nightclu...

Healthcare security systems: Funding remains biggest obstacle to installation

Part 5 of our Security in Healthcare series It’s difficult for hospital security directors to provide a quantified ROI in an updated security system Several forces are working in favour of greater adoption of hospital security and video surveillance technologies in the healthcare market. “Healthcare facilities and campuses are growing at a rapid rate to accommodate an aging population and the research and development of pharmacology and many different type...

User experience: How well does physical security measure up?

I’ve been hearing a lot of talk lately about the “user experience” or UX. UX is a techy term that refers broadly to how a customer uses a product, including both how the product operates and hundreds of other factors that can enhance – or conversely, can detract from – how a customer perceives and experiences a product. In SourceSecurity.com’s world of digital publishing, an optimum user experience is the Holy Grail. How a user experiences digital media, h...

13 tips for security and IT professionals to keep IP video surveillance networks secure

Keeping surveillance networks secure can be a daunting task but there are several methods that can greatly reduce risk, especially when used in conjunction with each other. Below are 13 tips security and IT professionals can follow in order to keep an IP video surveillance network secure. 1. The stronger the password the better Strong passwords are the most basic security measure, but unfortunately ignored by many users. Many surveillance systems are deployed in the field with...

What has caused disruption to the physical security market?

Big security trends are driving change in the physical security market. We see change happening around us every day, and much of it is disruptive to the status quo. We asked this week’s Expert Panel Roundtable: What has caused the greatest disruption to the physical security market in the last 12 months?

Biometrics prove best for preventing time & attendance fraud

Time and attendance has proven to be a successful use of biometric technology traditionally used for controlling access to highly sensitive areas Security technology is increasingly being used to help organisations tackle challenges going far beyond controlling access to office buildings and monitoring parking lot activity. Video, in particular, has become the darling of many markets. Retailers use live and recorded video to assess promotional sales efforts. Manufacturers con...

Do NVR-based systems put video surveillance data at risk?

Video surveillance plays a significant role in any comprehensive security plan, and the value derived from surveillance continues to expand Across the globe, organisations are challenged by a diverse risk landscape and a dynamic operational environment. The safety and security of people, assets and intellectual property are a No. 1 priority, and stakeholders look to gain continuous insight into what is happening at any given time. The ability to identify threats early and effi...

Body worn cameras increase amid current police concerns

   Body worn cameras are seen as improving accountability, and also can provide evidence in criminal trials Body worn cameras have realised a surge in demand across the United States in the current climate of concern about how police interact with citizens, especially when that interaction turns deadly. Embracing body worn cameras For example, Los Angeles has approved a $69.6 million plan to equip 7,000 Los Angeles patrol officers with body worn cameras by the end o...

Technology streamlines and improves visitor management at healthcare facilities

Part 4 of our Security in Healthcare series    Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-c...

Wireless access control moves closer to mainstream adoption, with more potential waiting to be tapped

Everything about wireless access control makes life easier for those who install and operate it A lot of market data crosses my desk at ASSA ABLOY. Sometimes it can be hard to spot patterns or pick out the trends. But not always. Some recent access control market research we commissioned pointed in one direction. Our conclusion? Slowly but surely, access control is becoming a wireless technology As the global leader in door opening solutions, we are able to survey a large,...

Wael Tanoukhi appointed IDIS Technical Manager to support growth in Middle East and North Africa

The appointment signals the growing Middle East demand for the IDIS Total Solution IDIS has appointed Wael Tanoukhi to the position of Technical Manager to support its growing customer base in the Middle East and North Africa (MENA). Based out of the IDIS MENA regional headquarters in Dubai, Wael will lead pre- and after sales technical support across the region. He will also oversee the IDIS training program for both installers and end-users as well as driving product-market...

How can software identify active shooter risks before they become threats?

As a society, we have been studying crime for years, with an eye to prevention. Now that mass shootings have seized our attention, experts have begun studying this particularly violent crime, again with an eye to prevention.   “Our view is that inside a large enterprise — a corporation or government agency — anyone can be the risk you may face someday,” says Bryan Ware, CEO of McLean, Virginia-based Haystax Technology, a business that identifies risks b...

Video surveillance advancements lead to data storage challenges

The LTO Program discusses how organisations are struggling to balance thebenefit of video surveillance with high costs and increasing legal parameters We live in a world where there is an increasing need for video surveillance for crime prevention and public security and safety. Video surveillance is being used in greater quantity and with higher quality expectations in airports, cities and workplaces around the globe. In fact, the average person is reportedly caught on a surv...

Video surveillance advancements increase hospital & healthcare security

Part 3 of our Security in Healthcare series Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities Video is a major component of most hospital and healthcare security systems. Among the big video trends are greater integration of video with other systems, and increased use of higher-megapixel cameras and 180-degree and 360-degree-view cameras to monitor larger areas. Variety of video...

IFSEC International 2016 celebrates huge visitor numbers

IFSEC 2016 attracted 27,052 attendees, in line with the 2015 attendance IFSEC International 2016, organised by UBM EMEA, has announced another hugely successful year for Europe’s largest security event, hosted from the 21st – 23rd June at ExCeL London.Volume of visitors IFSEC once again delivered an exceptional industry experience, attracting 27,052 attendees, in line with the 2015 attendance. The event saw a huge day one and two at IFSEC, with exhibitors overwhel...

Six important factors to look for in a professional systems integrator

What factors should an end user consider when looking for a professional systems solution provider? Andrew Schonzeit, President of IDESCO Corp., New York, knows what it takes to have an award-winning, top-in-its class systems integration company. For more than seven decades, the company has grown, morphed and continued to move into the world of value-add integrated solutions contracting. They’ve received numerous industry and business accolades and increased their statur...

Post-Brexit: What does this mean for UK security?

How will the UK's decision to leave the European Union affect security cooperation between its member countries and with European countries? 'Strength through unity' is the term being used by pro-European economists observing the fall-out from Brexit, but it's surely an even more pertinent phrase for the security sector and this is being underlined in the most unexpected quarters. Fifty-six percent of the referendum votes cast in Northern Ireland were for 'Remain' and even sta...

Security concerns in run-up to U.S. Republican and Democratic National Conventions

A long and hard-fought primary season in the United States will culminate this month when the major political parties nominate their candidates officially at their national conventions in Cleveland and Philadelphia. The rancorous campaign has raised concerns about possible civil unrest associated with both conventions, but security planners say they have considered every eventuality. Beyond possible civil disturbances, there have been no credible threats made against either convention, authoriti...

What role can social media play in security?

Our society is engulfed in social media, from Facebook to Twitter to YouTube and all the rest. Among other benefits, social media provides an immediate and accessible form of communication. They say that social media is changing everything in our society, so we wondered what specific impact social media might have on the security marketplace. We asked this week’s Expert Panel Roundtable: What role can social media play in the security marketplace and/or as a tool to promote better security...

Matrix provides multi-location time-attendance solution to Tyco

Matrix products connected Tyco's locations with a central location for time-attendance Security solutions provider Tyco has been delivering the latest solutions to unique business challenges in the security domain. With their global reach and wide range of products and services, Tyco has helped customers achieve their safety, security and business requirements with the right solutions.    Time-Attendance challenge Tyco had an existing Time-Attendance system whi...

Nortek enters definitive merger agreement with Melrose Industries

Melrose Industries PLC will acquire Nortek, Inc. for $86 per share in cash Nortek, Inc., a provider of air management and technology-driven solutions for residential and commercial applications, recently announced that it has signed an agreement and plan of merger with Melrose Industries PLC, a UK listed public company and Nevada Corp., a newly created wholly owned subsidiary of Melrose, to be acquired by Melrose for $86.00 per share in cash -- an estimated total enterprise va...

IHS: Multi System Operators far from becoming a force in the Residential Alarm Industry

Just 0.4 percent of fixed-broadband subscribers in the US purchased a residential alarm system from an MSO in 2015 Although multi-system operators (MSOs) have made significant inroads into the residential alarm market; they still have a long way to go before they can claim to have truly conquered the traditional security provider’s stranglehold on demand. In fact, according to Jim Dearing, IHS Technology’s analyst, residential security, just 0.4 percent of fixed-br...

SANS Industrial Control Systems (ICS) security summit and training event to be held in London

The ICS event will be the only opportunity for students to take the SEC562:CyberCity Hands-on Kinetic Cyber Range Exercise SANS Institute will be running a dedicated Industrial Control Systems (ICS) security summit and training event including the innovative SANS SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise in London this September. Cybersecurity ICS London 2016 runs from 19th to 25th of September and kicks off with the ICS summit including presentations offering...

Empowering next generation smart buildings with data correlation

The market for smart buildings has expanded exponentially to greater benefits including life safety, security, and intelligence Much like the term “Internet of Things” or “IoT” the concept of “Smart Buildings” brings to mind many different ideas -- from programmable thermostats to touchless faucets to other green-building initiatives, with a focus on environmentally-friendly and energy efficient designs.  While the early days of smart b...

TDSi GARDiS solution brings increased visitors at IFSEC International 2016

TDSi enjoyed a 21% increase in new visitors and a 38% increase in export markets visitors at IFSEC 2016 Integrated security manufacturer TDSi enjoyed a 21% increase (compared to 2015) in new visitors at the recent IFSEC International 2016 event at the ExCeL London, which the company partially attributes to the unveiling of its new GARDiS online security solution. Increase in visitors Reflecting upon the success of the event, TDSi’s Managing Director, John Davies commen...

ASSA ABLOY impresses with digital solutions at IFSEC 2016

ASSA ABLOY demonstrated its journey from mechanical to digital security at IFSEC 2016 ASSA ABLOY generated a ‘buzz’ at IFSEC 2016 through exhibiting its journey from mechanical to digital security. Range of brands ASSA ABLOY’s stand was the busiest to date, with its leading brands, including, Yale, ASSA ABLOY, Abloy and Traka, showcasing their product breadth that comes from years of expertise in the industry. The group’s pioneering, innovative and d...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?