Mauritius News

CES 2017: Will consumer electronics transform the physical security industry?

Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they want their smart home systems to perform. We have heard the Internet of Things (IoT) buzzword in our market, and it is also a major force in the changing consumer electronics arena. Because consumer electronics are increasingly tied in with security, many in our industry keep a close eye on developments at the huge Consumer Electronics Show...

[Download] The most viable converged solution for video security and monitoring

A Converged Solution for Video Security, Monitoring and Storage: Today’s networked video systems have expanded their functionality beyond simply storing and retrieving video. Deploying the latest video systems depends more than ever on managing video data efficiently and effectively. New tools for managing video data include the use of virtual storage platforms, dynamic tiered storage, and video management system (VMS) software, all combined into a converged, standalone sol...

How to approach campus outdoor security

The locks, alarms and access control solutions used for buildings have little impact outdoors Large campuses – colleges and universities, hospitals and office parks – face difficult security challenges in protecting people and property across wide-open outdoor spaces. Outdoor security requires a different approach. The locks, alarms and access control solutions used for buildings have little impact outdoors. Outdoor security may include protecting a student on an...

Innovation and Internet of Things to influence 2017 security market

Continued consolidation and price pressures were factors in 2016 in the security market, which grew as expected.However, there is still interesting innovation being developed to further the market, such as the industry’s first PTZ with laser focus, says Fredrik Nilsson, VP, Americas, for Axis Communications. “While the video surveillance market is getting close to being 100% converged over to IP, there are many other IoT markets that are early in the cycle of convergence, such as int...

3 Reasons to switch to LED security lighting

Increasing the quality of illumination with LED can help deter crime and improve the accuracy of video analytics One of the greatest challenges that indoor and outdoor security surveillance solutions face is lack of light. However, obtaining the proper amount of illumination for security goes beyond merely flooding a specific area with light. Without an adequate lighting source, video cameras are ineffective. When capturing only dark, blurry images and video, they can quickl...

Video management systems evolve beyond traditional physical security

Over the course of 2016, we witnessed a continuation of the prevalent trend towards more integrated and intelligent networked systems using Video Management Systems (VMS) as the central control platform.   One of the drivers behind this is open platform solutions that support more advanced physical devices such as IP cameras with on-board analytics, which continues to shift emphasis from the physical aspects of video and access control systems to the collection and correlation...

Could Amazon Go eliminate shoplifters? Customers ‘Just walk out’

Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The so-called “just walk out” experience depends on “the world’s most advanced shopping technology.” Customers simply enter a retail store, choose the goods they want, and leave. The checkout process is automated: The selected goods are charged to the customer’s account automatically. Solving shoplifting Most of...

HID Global predicts top trends for 2017 in the identity technology industry

The forecast for 2017 is also based on a breakthrough in adoption of mobile identity technology in 2016 HID Global, a provider of trusted identity solutions, forecasts a shift in the use of identity technology that will lead to increased adoption of mobile devices and the latest smart card technology, a greater emphasis and reliance on the cloud, and a radical new way of thinking of trust in smart environments and Internet of Things (IoT). Ultimately, HID Global predicts the...

[Download] The Evolution of Cards and Credentials in Physical Access

Physical access control has been a key component of many organisations’ security strategies for several decades. Like any technology, access control has evolved over the years, and solutions now offer more security and convenience than ever before. From swipe technologies, such as the now antiquated magnetic stripe, to a variety of contactless technologies and mobile access credentials, businesses now have several choices when it comes to access control. Upgrading outd...

Video surveillance storage: What decision makers and integrators need to know

Video storage is the foundation for new video surveillance infrastructures. Depending on your platform, storage can enhance your surveillance system’s capabilities, or it can limit them. But one thing is certain: your storage decision can no longer be an afterthought. Tremendous growth in data storage Digital technology is transforming the surveillance industry. In fact, it’s estimated that 66 million network cameras and 28 million high-definition CCTV cameras will sh...

Could perimeter intrusion detection benefit from USA economic uncertainty?

With the current state of economic uncertainty, there is a huge opportunity in 2017 for perimeter intrusion detection (PID) manufacturers to reach the commercial market. Petty crime rates, such as theft and vandalism, are on the rise and, as a result, small business owners are looking for new security options to enhance their current camera and alarm systems. Often thought of as complicated, expensive, and only for high-value applications, PID has a chance to change its perception in the years...

Will security industry consolidation stifle innovation?

The security industry will continue to see consolidation through acquisition in 2017. At the advent of IP camera adoption, we saw a great decline in large vertically integrated companies, which spurred a new era of innovation within smaller IP camera manufacturers, VMS providers and other hardware companies for storage and managed switches.   We are now living in a new era of consolidation that is taking us full-circle back to vertical integration. Ultimately, the industr...

Expert views on PSIM, analogue HD, video analytics and more

Some Expert Panel Roundtable topics are more challenging than others. Occasionally a question will “stump” the panel – i.e., no one will choose to answer it. Other times, only one or two panellists will step forward to answer a question. One comment does not a “panel” make. Taken together, however, these varied comments offer their own range of insights into the evolving physical security market. Let’s look at some of these assorted Expert Panel comments over...

Access control moves from siloed security solution to integrated approach

The year of 2016 ended with Vanderbilt finalising the acquisition of Access Control Technology Ltd., which strengthened the company’s product portfolio and introduced an entirely new market segment to partners and customers in Ireland and the United Kingdom. ACT brings an existing cloud-based access control solution to Vanderbilt, thereby complementing the existing product mix. This new technology adds significant value to our customers in Europe, and we plan to deliver it to our customer...

Ongoing network attacks encourage consolidation of physical and cybersecurity

Ongoing attacks on private networks drew attention in 2016. Most public were the Wikileaks and other privacy violations during the 2016 election cycle. Whether or not the information had a bearing on the election outcome will never truly be known, but one’s overall sense of privacy is shaken. In many ways, these attacks and other less publicised cybercrimes were the result of a perfect storm. Organisations struggled with the sheer volume and constantly changing threats from advanced malwa...

Physical security continues to support cybersecurity aims

At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend, and that certainly proved to be the case in 2016.   More and more organisations are seeing the value of the intelligence provided by diverse systems’ data. The number and variety of networked systems and devices – both security and non-security – continued to grow steadily in the last year, and the data these disparate sources create has proven highly...

Growing data security trends: Internet of Things and cyber security

As the whirlwind of 2016 quickly winds down, it is a good opportunity to look back at the significant trends from this year. As predicted, the industry experienced accelerated data growth, the continued convergence of security and IT, and the ever-expanding impact of the Internet of Things (IoT).Overall, 2016 was a good year. IT investments were strong and organisations rapidly adopted new data centre advancements such as hyper converged infrastructure (HCI) to help manage the huge influx of cri...

“Anti-surveillance clothing” creates a new wrinkle in facial detection

The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly common facial recognition technology It’s a...

Growth of cloud-based access control solutions

Predicting where or how security access trends would develop in 2016 was an educated guess at best. We did, however, forecast continued growth in the areas of wireless readers; smartphone usage as a credential; and more migration to web-based software/hardware solutions.In hindsight, we were not so far off the mark. Wireless security systems proved to be a growing option for extending an access control system and a practical solution for retrofits. Smart phone credentials gained popularity by fr...

Video Management Software advancements and future trends

Overall, 2016 has been a great year for AxxonSoft. We have seen great progress in the industry on an economic level as well as in development. Europe’s economy has been on the rise and particularly the United Kingdom. As a result, we have seen new technologies emerging in the market and a lot more opportunities. Benefits of cloud services and future trends From a software stance, we have noticed the benefits of cloud service, and requests are becoming more regular. In the UK, Brexit ha...

Nedap AOES provides global security access solution for Unilever

Nedap provided Unilever with a new security solution for physical access to its sites across the world Unilever wanted to enhance user experience, in the long run increase security and reduce costs, and chose AEOS as the solution to this challenge. AEOS will secure 20,000 doors across more than 800 Unilever sites, as well as providing video surveillance and a range of other access management services. Ian Dunning, Unilever’s Global Facilities Director, and Jeroen Gielin...

Vanderbilt Security Management System improves Sheriff's Office access control

Vanderbilt SMS helps make sure that all personal information at the Sheriff's office is protected Home to 30,000 residents, Bradford County is a rural community located 45 miles Southwest of Jacksonville, Florida. The Bradford County Sheriff’s Office is mandated to protect its citizens and at the same time, safeguard sensitive criminal justice information, such as fingerprints and backgrounds from unauthorised exposure. Bradford County started out using security technol...

Robotics are trending in the security solutions sector

The emergence of smart technology into the security sector is changing risk management economics and strategy in unique ways. Such technology leverages information management at its core for a more effective security program. Case in point is the burgeoning role of autonomous data machines (ADMs or robots) that are purposely built for security. Will the advent of robots eliminate physical security officers at a site? Not any time soon, but robots are a real force multiplier by adding effec...

Global security market focused on organisational collaboration in 2016

In the past year, we have continued to see that the global security market is both dynamic and evolving. The term “security” no longer means simply protecting the perimeter of a building; it also involves securing corporate networks and sensitive data. In 2016, this trend was driven by a change in organisational threats. Businesses as a whole are much more focused on cyber-threats, a growing paradigm that challenges business and security leaders to stay one step ahead of crime and fr...

Access management becomes ‘mobilised', pervasive and personalised

After two decades of advances from simple visual ID badges to smart cards, standards-based access control systems and mobile ID solutions, the industry began entering its next new chapter in 2016. We began “mobilising” security to make it more pervasive and personalised, with a better user experience. We entered a new era of secure connected identities will not only make us safer but fuel innovation in how we work, shop and play. The industry began paying much closer attention to p...

SourceSecurity.com's top 10 expert panel roundtable discussions in 2016

SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions. The very most-clicked-on Roundtable discussion in 2016 was about how to choose between a cloud-based system and a server-based system. Other hot topics that made the Top-10 list of Roundtable discussions included edge-based video storage, the challenges of commoditisation, and mistakes customers make when buying and installing security systems. Here is...

SourceSecurity.com’s 10 most clicked articles posted in 2016

Again in 2016, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 articles we posted in 2016 that generated the most page views. They are listed in order here with the author&r...

Wireless access control sees major growth in 2016

The shift from wired to wireless access control was expected to gather pace in 2016—and that has happened. This year we at Assa Abloy surveyed a large cross-section of security professionals, seeking their insight into the changing market. Comparing our data with research we did in 2014 showed a clear trend towards wireless access control.   Wireless access data Our 2014 survey found 23% of commercial properties using a wireless or hybrid wired/wireless access control s...

3 ways technology will change access control in 2017

The winds of change have swept into the access control market in 2016. The hardware is transitioning away from being solely panel-based, software is rapidly moving to the cloud, and credentials are going mobile. It seems that the security access control world is finally waking up from its technological slumber, and 2017 will be an exciting time. These three major trends are feeding off one another and are driving the growth all around. IP and edge based systemsIn 2016, hardware companies like...

Top 10 security industry mergers & acquisitions in 2016

Merger and acquisition activity has become a familiar topic in the physical security market. In 2016, SourceSecurity.com covered M&A news involving some of the industry’s largest companies, including high-profile names such as Tyco, Honeywell, Hikvision, ADT, and Ingram Micro. Here’s a look at the top 10 M&A stories in 2016, as covered by SourceSecurity.com:   1. Johnson Control and Tyco merge Johnson Controls and Tyco announced their merger into one comp...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE