Mauritius News

Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance system

Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analogue to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus on camera, NVR an...

How cloud-based services will transform the access control market

Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...

Getting crisis management and emergency planning requirements right

Think of crisis management and emergency planning as a  customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it?Developing and writing a corporate or organisational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...

Why workplace training is essential for business success

Good training is a best practice that applies across a broad range of industries and markets Owners and managers of security dealerships, both large and small, face unique challenges in running their companies, and while there is no magic formula for success, dealerships that invest in training for their staff typically do better than those who don’t.  In fact, good training is a best practice that applies across a broad range of industries and markets, but it is pa...

Security Technology: A house built on sand?

The security industry can be like a house built on sand if there's a lack of professional standards set in place Picture the scene: You’re suffering from a persistent pain and so decide to take a trip to your doctor to get it checked out. You step into the consulting room but, before you can speak, he looks you up and down, haw and hums, and then writes out a prescription. Would you be happy that drugs prescribed in this manner will cure your ailment when your doctor h...

Rethinking physical access control to operate in an IT-centric environment

Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilise the organisation’s full IT infrastructure, which...

Integrated security solutions manufacturer TDSi holds Bake Off challenge to raise money for charity

TDSi's Bake Off is just one of the company's various activities to raise money for charity Staff at integrated security solutions manufacturer TDSi’s Poole headquarters emulated the hit TV programme by holding a Bake Off challenge of their own in aid of the Boo charity. Competing staff produced cakes and other sugary treats which were then judged by a panel of tasters from the company. With the remainder of staff making donations to taste the delicious Bake Off results,...

Video walls provide the big picture for collaborative security

Video walls are growing in popularity in security applications, providing everyone in a control room access to the same current information at the same time. They are a perfect way to display the “big picture” – literally. Video walls are often used in situations where several people are working together to create a coordinated effort, whether related to security, emergency response, process control or other discipline. In the security sector, video walls are commonly used in...

The benefits of training in the access control market

Training and education are essential elements of success in the access control market for integrators and end users alike. Whether one is a seasoned veteran or still new to the industry, continued training and education are critical given that access control technologies continue to evolve at a rapid pace. System integrators who do not take advantage of manufacturers’ training seminars are short-changing themselves and their customers, contends Robert Laughlin, president of...

Measuring value of security systems - price versus benefits

Value isn't always just about monetary worth In any sales conversation, price will inevitably be one of the points of discussion. When it comes to large investments such as security systems, customers want to ensure that their money is well spent. Where price is concerned, systems and solutions providers would want to impart the worth of their products. At the end of the day, in the consumer world, customers want the best value for the least amount of money po...

Costs, usability, and support among access control challenges

Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillanceas it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...

Transitioning from legacy access control to newer technologies

A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base of legacy systems presents opportunities and obstacles for providers of newer access control systems. Most end users would prefer not to do a full rip-and-replace upgrade. Therefore, integrators (and manufacturers) have to find a smooth transition path. Access control customers eager to embrace the newest capabilities on the market are ofte...

Access control market working to overcome tradition of proprietary systems

Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition from closed systems to more open integration provides benefits for integrators, and especially for end users looking to maximise their system return on investment. End users want greater flexibility, specifically in terms of hardware choice. As a result, more non-proprietary solutions are coming to market. For the integrator, offering more o...

How does commoditisation impact the security market? How should manufacturers and/or integrators differentiate themselves?

How do you stand out in a world of commoditisation? We live in a world of commoditised consumer goods. You probably own at least one item which would be considered "commoditised" by the majority of the population today, but you can probably also remember the days when it would have been described as "new" and "unique". Think about smart phones: most people you know are likely to own a smart phone. But remember when not everyone had a regular mobile phone? Now they're no...

Simplifying interoperability of access control with PLAI specification

Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access control across large companies or institutions, including those that span giant campuses or even multiple locations all over the world, is essential to optimum security. Too often, however, the effectiveness of a company’s access control system – or, more likely, of its multiple access systems that were installed in various locations o...

Genetec introduces new hybrid cloud archives service for Security Center

The archives allow organisations to easily scale the available storage capacity of their surveillance system Genetec™, a leading provider of unified IP security solutions recently announced its new Cloud Archives service for Security Center that will allow organisations to easily scale the available storage capacity of their surveillance system, and eliminate the need to invest in additional servers. With the ability to continue leveraging their existing on-premise s...

Identiv reports Q3 financial results for 2014

Identiv reaffirms revenue guidance for fiscal year 2014 of revenue between $80 million and $90 million Identiv, a global security technology company that provides trusted identity solutions for premises, information, and everyday items, reports its financial results for the third quarter (Q3) of 2014. "In Q3 2014, we saw continued growth in revenue and achieved positive adjusted EBITDA," said Jason Hart, Identiv CEO. "The steps taken to streamline our business have allowed us...

What trade-offs are required when accessing video on a smart phone or handheld device?

The ability to view surveillance footage on mobile devices adds greater flexibility to an organisation's security monitoring system. But of course, there are drawbacks. In the age of mobile devices, we are able to do more and more while "on the go" and are less limited by the need to be at a desktop computer with internet / network connectivity. We are seeing the proliferation of mobile apps designed to enable us to access our most important files and perform important tasks...

IFSEC International announces development plans for its leading global security event in June 2015

Safe Cities will be a central hub within IFSEC to shape future of urban security, civil welfare & disaster management IFSEC International, organised by UBM Live, is excited to announce development plans for the leading global security event in June 2015. Following the phenomenal success of the 2014 show, IFSEC International 2015 is in high demand with 92 per cent of the floor plan already sold out. Big name sign-ups and stand out new exhibitors include DELL, Mitsubishi El...

What role can technology play in keeping the security industry green?

"Going green" is not a new initiative, but rather, one that businesses and individuals are constantly aware of and continuously making a conscious effort to contribute to. The global population has become increasingly environmentally conscious over the years. Businesses and homeowners alike are investing more in green alternatives for their various needs. Many businesses adopt a green business ethic by ensuring that their products and ways of working are compliant with certa...

Remote video monitoring – the smarter way to enhance business security efforts

Remote monitoring offers a multiplying effect on security efforts The growth of IP-based networks has made it possible for security professionals to easily monitor surveillance activity from any internet-enabled PC, smartphone, or tablet anytime, anyplace. More and more, businesses are realising that remote monitoring can have a significant impact on their bottom line. Whether you’re a retail outlet, bank or hotel, remote monitoring offers a multiplying effect on securit...

MBX Systems: Working behind the scenes to optimise pairing of software and hardware

Sometimes companies want to buy their physical security software separate from the servers it runs on. Other times, companies prefer to buy an “appliance” – a purpose-built machine that is perfectly matched with the software it is running. The latter category is especially popular among small- and medium-sized business customers. For example, preconfigured video management appliances contribute an element of simplicity. That’s why you see video software companies –...

New iris recognition capabilities are a real eye-opener

Iris recognition has been used as a biometric for access control applications for many years, but we have heard a lot more lately about fingerprint scans. However, iris recognition has many advantages over fingerprints and other biometrics, and the technology has come a long way. Mark Clifton, vice president of the Products and Services Division of SRI International, calls the iris a “protected” biometric, typically not injured and unlikely to be contaminated as fingers or hands mig...

Strengthening Loss Prevention with Unified and Cloud-Based Security Solutions

Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organisations is sometimes still viewed as a necessary evil. But at a time when shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximise any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales...

Standardising global security to minimise risks and budget

Security standardisation reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...

How cybersecurity impacts the physical security world

Cybersecurity is a critically important aspect in today’s increasingly IP-driven world of physical security The physical security market tends to dismiss issues of cybersecurity as outside its area of expertise, but cyber-threats are a problem that has been ignored for too long. The fact is, cybersecurity is a critically important aspect of the systems our industry provides in the increasingly IP-driven world of physical security. And the risk isn’t just reserved...

What is an acceptable life cycle for a physical security or video system? Are you seeing a trend toward systems being replaced more or less often?

Just like many things, security systems have their own life cycles.  Most end users would say that a "good" system should last a certain amount of time. Each system or device has a generally established and expected life span, and anything that falls short of its life expectancy is generally deemed as "poor quality." We asked some of our panellists to reflect on the life cycles of security systems. We wanted to get their insights on trends they have observed i...

DVTEL names Jack Meltzer as Senior Director for Global A&E Program

The program helps engineers and consultants develop expertise with DVTEL’s video surveillance technologies DVTEL, INC., the video surveillance solutions provider, recently announced that it has named Jack Meltzer as Senior Director, Global A&E Program. The program helps network architects, engineers and consultants to develop expertise with DVTEL’s intelligent, open video surveillance technologies and to specify projects that incorporate DVTEL solutions. Mr. M...

Accessing social media as a tool for physical security with Geofeedia

Especially for younger individuals, sharing on social media is almost an automatic reflex. Bystanders at any event are likely to constantly be tweeting and/or posting real-time words, pictures and video using their smart phones. Accessing a culmination of that data can provide real-time intelligence of what’s happening on the ground at any event or location before emergency responders or police even get on the scene.  There are multiple ways security can benefit from an affordable so...

IndigoVision video security technology enhances mining safety for Rio Tinto

IndigoVision's video technology allows Rio Tinto to control over 200 driverless trucks to move 130 million tons of material When it comes to safety, mining is still seen as one the riskiest industries in the world. Mining giant Rio Tinto recently made the news with its innovative technology approach, making mining safer and more efficient. Using IndigoVision’s video technology, Rio Tinto can now control over 200 driverless trucks to move 130 million tons of material, th...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?