Mauritius News

Canon to buy Axis Communications for $2.8 billion

Canon Inc. has made a public offer to the shareholders of Axis Communications to transfer all of their shares in Axis to Canon for a consideration of SEK 340 in cash per share in the Company. The total value of the offer is approximately $ 2.8 billion. If the offer is accepted this will be the Canon's biggest acquisition to date. Axis has released a statement of the Board of Directors in relation to the offer. Based on a financial short and mid-term perspective, the Board of Directors have conc...

Onboard surveillance offers high-quality video for transportation vertical

In-vehicle technology allows security officials to view live footage from the bus’ cameras during an emergency One of the biggest security opportunities in transportation is onboard surveillance for buses and trains. While most transit organisations have invested heavily in video security for facilities such as terminals and stations, far fewer have taken the next step and installed IP cameras on board vehicles, says John Recesso, strategic business development manager,...

Plenty of available money could foreshadow more security M&As

Given a readily available supply of investment money to the security industry, might we see even more mergers and acquisition (M&A) activity in the coming year? Such appeared to be one message as the Security Industry Association (SIA) Investment Trends Committee presented an update on security-related capital markets, M&A and investment information. In the “middle market loan market,” where all but the top several security industry companies might look for money, there are...

Boon Edam launches BoonAssist TQ manual revolving door

Boon Edam Inc. announces the launch of BoonAssist TQ, a new manual revolving door that provides an ease of use previously not available in manual revolving doors. BoonAssist TQ offers the unique combination of three features: “push and go” power assistance, speed control, and positioning, also known in the industry as quarter pointing. The new door was developed in response to customers asking for a revolving door that offers comfort, intuitive operation and safety, where an automat...

Vanderbilt preparing to finalise acquisition from Siemens

The sale of Siemens’ Security Products to Vanderbilt is expected to close by the end of March, and already the owner-to-be is making good progress to form a new stand-alone company. Notably, the pending transaction is not a sale of company shares but rather a sale of assets, in this case product lines in the access control, CCTV and intrusion categories. In effect, a company is being created to manage those assets, and Vanderbilt has been working for the last several months to create the...

Networking basics for security professionals: Network switch bandwidth limitations

Any part of a transmission infrastructure has a dramatic impact on system performance We often view network switches as transparent transmission products. What goes in comes out. In reality, nothing is further from the truth. In this article, Neil Heller - Vice President, Vigitron, Inc. highlights that any part of a transmission infrastructure has a dramatic impact on transmission and, therefore, on system performance. At the very least a network switch can be viewed as a piec...

Camera apps usher in a new era in surveillance system design

Of the many benefits offered by new and advanced IP video surveillance cameras, the ability to easily customise these devices with third party apps has the potential to change the landscape in video surveillance system design and implementation. By providing the ability to customise individual cameras with the specific functionality desired for every specific camera location, camera apps not only increase functionality where needed, they deliver tremendous savings on a system-wide...

What are the current limitations of cloud-based systems? How will the situation change over the next five years?

There’s a cloud hanging over the security market. Or rather, The Cloud is portending great change for our market (and other markets, too). But with all the talk about cloud-based systems, limitations still linger along the path to optimum implementation in the security market. We asked our panelists to reflect on those limitations and look ahead five years to how the situation is likely to change. From bandwidth and connectivity challenges, to geographic limitations and even a need to chan...

The Internet of Things: what does it mean to installers and integrators?

loT will assist installers and integrators to position themselves as total solution providers and professional connectivity consultants to consumers  The buzz over the Internet of Things (loT) isn’t likely to subside anytime soon, given recent developments over consumer adoption of network-connected technologies. According to the 2014 State of the Internet of Things Study from Accenture Interactive, 69 percent of consumers plan to buy an in-home device in the next...

Need help choosing an access control system?

Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, SourceSecurity.com asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market. AMAG: Easy migration, simple pricing model AMAG’s Symmetry platform includes access control, photo ID badging, visitor management and digital video server software, all standard in an integrated solution. The pricing model...

Challenges of convergence with fire systems

The obstacles preventing convergence with fire systems appear substantial The IT network began as a dedicated structure within a building or facility. From this starting point, we have seen telephones, HVAC, access control and increasingly CCTV/video residing on the same platform. If today’s facility managers were offered a new building with separate networks for each type of subsystem, they would react with incredulity. The exception is fire protection, where the life-...

US electric grid: Exposing complexities that make it vulnerable

The smarter the grid becomes, the more risks it will encounter Hollywood collided with couch-dwelling gamers this Christmas because of the hack on Sony’s computer system, allegedly committed by North Korea. Immediately, security experts began to wonder if a nation state or a terrorist group might try and hit the U.S. electric grid. The answer is likely yes, but it wouldn’t be the first time or the last, and the grid, smart or not, is extremely complex and interwove...

Arecont Vision camera captures robber’s face: Image "couldn’t be clearer"

“The quality couldn’t be clearer – something the police hope will help capture the criminal you are about to see.” The local news report then shows an image from the surveillance camera video of an ATM robbery in Arlington, Texas. The video depicts a black Kia automobile rolling up to a Wells Fargo ATM, and the 21-year-old female driver makes a withdrawal. The video then shows a robber sneaking around the ATM and surprising the victim. He’s holding a cell phone in...

BCDVideo releases SMARTcontrol Management Software for its video recorder and access control server platforms

BCDVideo announced the release of their SMARTcontrol Management Software (SMS). SMS is an evolution in health monitoring for physical security technology for both BCDVideo’s video recorder and access control server platforms. BCDVideo will be making this a standard no-charge feature on its entire Nova Series platform, effective in February. SMS is a comprehensive, easy-to-use program which serves as a mission-control centre inside the product. Its key feature is that it sends alerts based...

Cannabis and Security: The road ahead for the legalisation of recreational marijuana

The stigma of the cannabis industry still hangs in the balance Final installment of 4-part series: The legalisation of recreational marijuana use in Colorado and Washington, along with it medical use in about 23 other states, has created an industry made up mostly of small mom-and-pop operators. “While the revenues in this industry are big, the number of people involved is pretty small,” said one security industry insider. That’s about to change as Wall Stre...

Overcoming obstacles to implementing hosted video surveillance

Hosted video surveillance, or cloud video, has been utilised in small markets over the past few years and is just now really being pushed as a viable alternative to traditional onsite DVR’s.  Most of the major surveillance companies are marketing cloud products.  Some of these cloud products represent true hosted video surveillance and others are a play on word with ‘cloud access’ being the marketing ploy. True cloud or hosted video streams real-time vid...

How to succeed at security outsourcing

To succeed at outsourcing, the relationship between the organisation and the outsourcing company has to be an equal partnership Can you save money on security by outsourcing? Maybe, maybe not, according to William J. Powers III, CIPM II, CIPI. “Considering the way I approach outsourcing, I’m not sure if it saves money,” says Powers. As director of facilities at the Sterling and Francine Clark Art Institute in Williamstown, Mass., Powers oversees facilities,...

Eyes on the prize: Taking full advantage of continued revenue growth

The systems integration industry is abuzz. Access control is super-hot, and the product category continues to grow. IP video surveillance specifications are moving along at break-neck speed. New technology categories in the security market – energy management, home automation and interactive services – are helping savvy dealers and systems integrators grow their businesses. But do these companies really know how to take full advantage of all the possibilities for...

What is the most underutilised technology in the security marketplace and why?

We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximise the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilising existing technology capabilities are a waste of money, aren’t they?

Efficient hospital security prevents possible mass shooting

Good security basics enabled a security response before the shooting started  Mass shootings by emotionally disturbed individuals and terrorists have led authorities and security professionals to search for means of prevention. “Analysing an actual incident in which a potential shooter was stopped seconds before becoming active can illustrate how solid security basics can help prevent catastrophe,” says Drew Neckar, CPP, CHPA, regional director of security wi...

Access control keeps schools safe

Schools are beefing up their security, with access control their go-to technology Schools are back in session after the winter break, but security is a 24/7 matter any time of year. K-12 and upper education are on high alert, dealing with increased incidents of violence, crime and vandalism. Access control is often the chosen technology of this vertical market, pairing well with CCTV, emergency communications and lockdown. Integrators and dealers who understand the nuances of...

IP Solutions provide multiple layers of access control at transit hubs

Airports, metro systems and other transportation centres must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to match specific risk levels by incorporating PIN and biometric verification for higher security. HID Global’s IP-based networ...

Dealer/Integrators face obstacles in the transportation sector, but it’s worth it

The security landscape continues to evolve in new, complex ways for transportation customers Dealers looking to enter – or to expand their presence in – the transportation vertical must adapt to the unique needs of each transportation agency customer. Issues such as limited budgets/resources, aging technologies, operational challenges and safety issues must all be considered when designing a system to best meet an agency’s needs. Integrators should seek to i...

“Phoning In:” Smart phones using NFC can replace cards

NFC can strengthen security by turning smart phones into physical and logical access control credentials The trouble with access control cards is that people lose them, lend them to friends who use the cards, or lose them, or lend them to someone else. Losing a card is bad enough, but people that lose cards often make it worse: “When someone loses an access fob or card, he or she doesn’t always tell the security department right away,” says Paul Timm, pr...

Cloud-based monitoring services: redefining technology’s reach

A growing number of users look to add cloud-based functionality to their surveillance toolkits In today’s market, both end users and resellers seek new technologies to make security programs more effective, while also helping business and employees be more efficient. Cloud-based monitoring services are gaining a significant amount of attention as an emerging solution to meet these needs. Maria Cambria, Vice President, Technical Center of Excellence, DVTEL says that end u...

North Central Security Services provides access control solutions to HOPE Family Health

Leading Tennessee-based security firm helps TN Non-Profit Health Facility Keep Patients Safe & Secure North Central Security Services (NCSS), a leading provider of security and monitoring services, is pleased to announce that it has been selected as the security company providing access control technology for HOPE Family Health, a non-profit delivering quality and affordable medical and mental healthcare to Tennessee residents who are either uninsured or in vulnerable popu...

Avigilon acquires fundamental patents covering video analytics

ObjectVideo shook the industry a few years ago by launching a series of lawsuits against the industry’s big players, claiming infringement of ObjectVideo’s patents on the basic technologies of video analytics. Some of the targeted companies fought back, but in the end most opted to make the issue go away by signing a licensing agreement with ObjectVideo. The latest twist in the story is major video supplier Avigilon’s acquisition of those patents – and of the 19 related...

"New" PPM looking to unify software solutions for security

Klass Software’s acquisition of incident management software company PPM 2000 is the first step in an evolution to build a broad, unified software solution to manage multiple aspects of the security function. In buying PPM, Klass sought to obtain “a very good platform business and grow it with the existing team,” says Will Anderson, CEO of Klass Software (and now CEO of PPM). He sees expansion and enhancement of PPM as a “long-term project,” maybe 10 years. Klass S...

How can governments and other relevant authoritative bodies manage privacy objections from the public when installing new surveillance cameras?

Video surveillance, or CCTV, is becoming increasingly common in cities and other public places all over the world. The benefits of video surveillance cameras to prevent crime and aid police investigations have been well documented, and there have been several high-profile cases in which video was instrumental in solving a crime. Still, whenever video surveillance is proposed in a public place, there can be opposition, based on privacy concerns, from various interest groups and the general public...

Innovation at the reader disrupting the access control market

More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; on...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?