Mauritius News

Download: Best practices for integrating mobile into the access control architecture

What's the White Paper about? The mobile industry is known as one of the most innovative and fast-paced and what we have seen in recent years has been nothing short of remarkable. This rapid growth is affecting the underlying technologies and standards in mobile devices as more people use their devices in their daily life and new applications are developed. This white paper from HID Global explores the essential elements in successfully implementing mobile access, fr...

MOBOTIX camera helps researchers monitor equipment at unmanned station in Antarctica during winter

Temperatures ranging between -40°C and -5°C, storm wind speeds of more than 100 km/h, constant daylight during summer and darkness during winter. This must be Antarctica. This is where the Belgian Princess Elisabeth Antarctic base is situated, the first "zero emission" polar research station which was designed, built and operated by the International Polar Foundation (IPF). Since the station went into service on February 15, 2009, it has been already hosting a multiple of scientific pro...

VMS and PSIM jargon distracts from tangible security solution benefits

Today, we find ourselves in a world where we all need to talk less about products and more about solutions The security industry has changed a lot in recent years. Many will remember a time not so long ago when it was about buying boxes/pieces of tin, opening them up and installing them. Today, we find ourselves in a world where we all need to talk less about products and more about solutions. Despite this, there is still an inclination to put everything in a ‘box’...

SALTO to showcase latest security products and BLE access control at ASIS 2016

SALTO’s BLE enabled access control increases efficiency and convenience for end users in any vertical SALTO Systems, a manufacturer of electronic access control solutions, will showcase its latest security innovations — including new BLE enabled products — at the annual ASIS International Conference to be held in Orlando, Sept. 12th-15th. Bluetooth Low Energy (BLE) technology “SALTO’s emphasis on incorporating mobile access Bluetooth Low Energy...

Qognify to demonstrate advanced video security portfolio at ASIS International 2016

Qognify will be demonstrating its multi-award winning solutions in booth 3451 at ASIS International 2016 Qognify, formerly NICE Security, will showcase its portfolio at ASIS International in Orlando Florida, September 12th-14th. With significant advancements to its security portfolio, Qognify will be demonstrating its multi-award winning solutions in booth 3451.   VisionHub VMS The new next-generation, web-based VisionHub is the winner of the Security Industry Associati...

IT & access control collaboration leads to functional, personnel and financial benefits

IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...

How is the role of distributors changing in the security market?

Distributors have traditionally played an important role in the physical security market, ensuring ready availability of products that systems integrators need to complete their projects. But a changing industry has had dramatic impact all along the supply chain of which distributors are a critical link. We asked this week’s Expert Panel Roundtable: How is the role of distributors changing in the market, and what is the impact?

Military and government data collection technologies for corporate and city security

Creating and accessing intelligence is increasingly part of the mission of corporate security departments, and of Safe Cities applications. Such capabilities were previously the domain of military and government applications, but the same approaches used to provide intelligence from military bases can also be applied to Safe Cities and corporate security projects. Edge360 is a six-year-old company with roots in the military and Department of Defence surveillance. Now, Edge360 is looking to app...

Smart home products help security companies engage customers

Dennis Sage Home Entertainment, Phoenix, is a best-in-breed audiovisual contracting services firm that gradually began expanding its offerings to security several years ago. After testing the waters, hiring experienced technicians and learning about the parallels with its current business, the company made a successful transition. Now, Dennis Sage, President and Chief Executive Officer (CEO), is also counting on heightened customer engagement and stickier clients as he moves into the role of t...

Weaponised robots? Military and police response uses for robots on the rise

(Image credit: Antonio Scorza / Shutterstock.com) The era of the “killer robot” hasn’t arrived, exactly, but it may not be far off. Police and the military have been using these machines for decades now to disarm bombs and provide reconnaissance in areas where it would be risky to send officers or soldiers. When Dallas Police equipped a robot with an explosive device and sent it in to take out a sniper who had killed five officers, it raised eyebrows and conjured images of a...

10 tips for using business intelligence tools to maximise ROI in retail

A lot has changed in the last 15 plus years in the security industry, including the ability to process and analyse Big Data. The growth rate of data has reached an astounding pace. Today, best estimates are that about 2.5 quintillion bytes of data are produced every day—that’s 2.5 followed by a staggering 18 zeros! The volume of data feeding into businesses is so vast, the only means available to leverage this data to drive decision making is to harness the power of a Business I...

Electronic locks prove a worthwhile investment for the security industry

  The security industry as a whole is migrating from the historical mechanical lock to the newest technology of electronic locks Mechanical locks and keys date back thousands of years and have undergone many changes, but the industry’s transition to electronic locks might be the most important, lasting, and surprisingly affordable security and safety change of all. The objective behind the creation of locks so long ago remains: to control a value on the other side...

Machine learning security systems address the limitations of traditional threat detection

The need for security convergence and shared threat intelligence is markedly increasing “Converged security” has been a buzz phrase for more than a decade, but the industry is just now starting to reap the rewards. Converged security recognises that truly comprehensive organisational risk management involves the integration of two distinct security functions that have largely been siloed in the past: information security (network operations centre or NOC) and physi...

Access control evolution allows multiple options for healthcare security

Part 8 of our healthcare series Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. Hospitals are challenging environments. A hospital requires ov...

Home automation: A growth area for the security industry?

It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of bli...

What if a customer expects more than a security system can deliver?

Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater...

Evolution of security robots responds to market needs

Part 2 of our robots in security series Companies realised they could improve security by mounting laser sensors and cameras on a mobile platform such as Knightscope's Autonomous Data Machines Security and safety robotics, unlike any other industry, is driven by customer and market demand. Once buyers acquire robots, they often find new things they want them to do. Manufacturers are then called upon to respond to those demands, and they often do. Enhancing security...

TDSi to showcase new GARDiS solution at IFSEC Southeast Asia 2016

TDSi will be giving visitors a chance to see its new range of GARDiS software and hardware solutions Integrated security manufacturer TDSi will be giving visitors a chance to see its new range of GARDiS software and hardware solutions at IFSEC Southeast Asia 2016, which is being held in Kuala Lumpur from 7th-9th September. The show follows this year’s highly successful IFSEC International in London, which saw increased stand visitor numbers and considerable interest in t...

Data mining for insider threats: Another convergence of physical and cyber security

For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety of surveys across the IT security industry. Companies are becoming increasingly worried about insider threats.  From the cyber security perspective, insider threat is primarily focused on malicious threats to the company either by, or to, information technology assets. Whether it is fraud, intellectual property theft, or ev...

Shedding light on integrated cameras and independent illuminators

Lighting, or the absence of it, is one issue that significantly affects a camera’s video quality Video surveillance has rapidly advanced over the last two decades. Today, integrators can purchase IP cameras offering complete network control, megapixel cameras with HD imaging, and PTZ cameras with remote directional control. Although these features are impressive, they don't solve all the challenges that surveillance solutions face. Importance of lighting for camera per...

Rio 2016 security: The role of technology and personnel

A force of 85,000 police and military will patrol the Olympic grounds and environs to provide security A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the various Olympic venues located around Rio De Janeiro. The security plan called for 3,400 screeners. The security firm had only found 500. What happened? Today, prospective security officers must undergo background checks that do...

Location-based alerting technologies to secure employees in emergency situations

Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situat...

Video surveillance as evidence: Does human bias undermine reliability?

The power of video as evidence in a court of law is often seen as a function of specific variables: How clear is the video? What exactly does it show? Can it be authenticated? Possibly lost in the discussion is the fact that the value of video as evidence is decided almost completely by people, specifically by a small group of people; that is, the jury. Is there a gap between what the video “shows” and what people “see?” Are there psychological or even physiological vari...

Healthcare facilities’ diverse security requirements provide opportunities for systems integrators

Part 7 of our healthcare series Integrators can sell a breadth of possible equipment into the healthcare market One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in s...

How to choose between an NVR and VMS running on an off-the-shelf server

Software drives video solutions in the IP environment, but often that software is a pre-installed component of a purpose-built network video recorder (NVR). In other cases, software solutions are sold separately and then installed (usually by the integrator) on a commercial off-the-shelf (COTS) server. But how can an integrator or end user decide which approach is best for them? We asked this week’s Expert Panel Roundtable: What are the advantages and disadvantages of using a pre-configure...

PROMISE Technology NVRs help Vos Logistics upgrade warehouse video surveillance

Vos Logistics deployed Vess A2000 NVR storage appliances and Vess R2000 external storage solutions Logistics services Vos Logistics, founded in 1944, is an independent European logistics service provider, delivering a wide range of transport and customer specific logistics services. With 24 locations, Vos Logistics is active throughout Europe and ranks among the largest road haulers in the region. With just under 1,900 employees, the company operates a modern fleet of 1,200...

Access control technologies manage emergency hospital lockdowns

Part 6 of our Security in Healthcare series Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities Hospitals and healthcare institutions increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. When these types of conflicts arise, there is an urgent need to lock the facility down quickly. Security professionals and their teams need...

Robotics: Redefining crime prevention, public safety and security

Robots such as those designed by SMP Robotics can handle a variety of tasks ranging from perimeter fence monitoring to snow removal Robots come in all shapes and sizes from small tracked vehicles to large upright cylinders and cart-like devices on wheels. They fly through the air and glide underwater. They’re becoming familiar sights and will become more so. The future of robots in the military, public safety and security is expanding for some very good reasons. The new...

Pokemon Go: A lesson in physical and cyber convergence for the security market?

The new Pokemon Go video game, which has taken the world by storm, combines real-world landmarks and locations with virtual creatures in a smart phone video game that requires players to walk around in the real world to “find” the imaginary creatures. It’s a little like what the security industry has been trying to do for years: To achieve convergence of physical and cyber worlds. Pokemon Go security risks To be sure, the new game has presented its own set of security chall...

Arecont Vision provides local, state and national government surveillance solutions

Arecont Vision megapixel cameras enable city, county, state, and federal or national governments worldwide to deploy new, cost-effective applications for enhanced situational awareness and forensic viewing.With security concerns on the rise, video surveillance is often the first and sometime the only witness to incidents and the actions that led to them.Arecont Vision solutions increase surveillance coverage and quality, while reducing the number of cameras required and for less cost. Surveilla...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE