Montenegro News

Vanderbilt announces adding ZKTeco biometric readers to its access control portfolio

Vanderbilt, globally renowned provider of state-of-the-art security systems, has announced the addition of three ZKTeco biometric readers into its access control portfolio. ZKTeco biometric readers The latest addition to the ever-growing access control portfolio comes off the back of the launch of the company’s Bluetooth Low Energy (BLE) readers, plus the inclusion of Akuvox’s IP Door Entry Phones into their collection of products. As with the BLE readers, the biometric readers int...

Dubai Health, Safety & Environment Forum 2019 set to highlight critical industry issues

The highly acclaimed Dubai Health, Safety & Environment Forum returns to Dubai from 24-25 November, with a stellar line-up of confirmed speakers from Ministry of Health & Prevention, UAE, Dubai Municipality, ADNOC, DEWA, Emirates Global Aluminium as well as senior executives from leading international and regional companies. On the agenda for this year’s forum are topical health, safety and environment issues. With a raft of infrastructure and construction developments underway in...

Ava Security announces general availability of Vaion vcore VMS with product demonstration at ISC East 2019 event

Ava Security (Vaion) is proud to announce the general availability of its innovative Vaion vcore video management system at the upcoming ISC East 2019 event in New York City, New York, USA. Designed with scalability in mind, Vaion vcore is a proactive solution that allows threats to be detected and addressed as incidents unfold. This is made possible through the use of a new neural network that mimics the human brain’s ability to recognise patterns and categorise images. Vaion vcore with...

Axis announces an affordable parking violation detection to help improve traffic flow and city safety

Axis Communications announces the launch of a parking violation solution to detect unauthorised or illegal parking on cities streets or private parking facilities. This high-scalable and affordable solution can be set up to cover a full avenue using multiple cameras to cover individual traffic lanes for distances up to 100m (109 yards) each. Automatically detecting violations AXIS Parking Violation Detection can automatically detect parking violations and sends an alert anytime a potential vio...

Alcatel-Lucent Enterprise and BCDVideo co-develop the BCDVideo Provisioning Assistant Application

ALE, operating under the Alcatel-Lucent Enterprise brand, introduced a smart-device application to help businesses simplify and automate the configuration and deployment of video surveillance networks worldwide. ALE, along with strategic technology partner BCDVideo, co-developed the BCDVideo Provisioning Assistant Application. BCDVideo, a trusted provider of innovative, purpose-built IP video storage solutions designed for security integrators, is working with ALE to deliver a more comprehensiv...

What’s old is new again: security industry trends that will continue into 2020

It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating.  Some of these trends have enhanced the efficacy of security systems, wh...

New technologies driving the smart home and security markets

Industry experts predict that sensors in the home will reach a level of sophistication never considered in early versions of Smart Home. These devices will know when the house is empty and be able to shut off heating and cooling systems. Smart phone with geolocation will then tell it when the owner is on their way back so it can start adjusting the temperature to a comfortable level. And, it won’t just be lights that turn on and off. Sensors in washing machines will know that clothes have...

ISC East session to cover penetration testing for physical security

Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also k...

What factor is most overlooked when installing security systems?

Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?

Technocover to demonstrate its access control solution at International Security Expo 2019

As an innovator in certified physical security for asset protection, Technocover will be demonstrating the depth and breadth of its LPCB approved steel systems for the hardening of every type of site against unauthorised access. The Mid Wales-based expert in turnkey high security, including UltraSecure doors, access covers, enclosures, access control and accessories, will be participating in LPCB’s highly anticipated Live Lab over the two days of the show. Visitors will be able to view th...

Q&A: Gallagher’s Richard Huison on innovation and challenges

Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most h...

Dahua Technology hosts annual summit “Dahua Heart of City” in Shenzhen, China

On October 27th, Dahua Technology, a pioneer in video-centric smart IoT solution and service provider, hosted its annual summit "Dahua Heart of City – Leading The Intelligent Twins Evolution" in Shenzhen, China. More than 400 industry representatives, industry experts, and mass media have witnessed the achievements of Dahua Heart of City (HOC) on empowering various industries and leading the smart applications in the era of "Intelligent Twins", as well as the release of cutting-edge techno...

Video redaction feature in AXIS Camera Station protects privacy

When exporting video, users may need to mask some objects to comply with privacy regulations. Video redaction, a new function in AXIS Camera Station, allows them to do just that – in a simple and intuitive way. Privacy protection Public awareness of privacy has recently been on the rise. Personal data protection legislation such as GDPR in Europe and FISMA in the US calls for companies to adapt many business operations, and video surveillance makes no exception. AXIS Camera Station vide...

Wireless Communications AS supplies Sepura’s SC20 and SC21 TETRA radios to GE Nett

Sepura partner, Wireless Communications AS are pleased to announce that they have supplied Gudbrandsdal Energy Nett AS (GE Nett) with next generation hand-portable SC20 and SC21 terminals, in a wide-ranging project to deliver significant communication advances over their previous analogue radio solution. As part of the Gudbrandsdal Energy Group, GE Nett owns and operates the electricity grid in a number of municipalities. With a network area of around 3,700 sq.km serving 20,000 customers across...

Omada announces the appointment of Michael Garrett as the new CEO

Omada A/S, a global pioneer of Identity Governance and Administration (“IGA”) software and cloud delivered IGA services, announced the appointment of Michael Garrett as CEO. IGA services improve compliance and IT security, manage secure access across all corporate systems, ensure employee access is compliant with access policies and help to automate IT processes for better efficiency. Michael joins Omada with extensive software and services experience and was most recently CEO at Wo...

Genetec joins forces with partners to showcase its unified safe city solutions at Smart City World Congress 2019

Genetec Inc. (“Genetec”), a popular technology provider of unified security, public safety, operations, and business intelligence solutions, announced its plans for Smart City Expo World Congress 2019, taking place at Gran Via Venue, Barcelona, from 19-21 November 2019 (Stands 161, 211 and 567). Genetec will be exhibiting in three separate locations around the show floor, alongside its technology partners Axis Communications, Microsoft and Schréder. There will Genetec represe...

UVeye launches UV Inspect, deep learning-powered vehicle undercarriage threat detection solution

UVeye, global provider of top-tier solutions for automated external inspection of vehicles, has officially launched its UV Inspect threat detection technology. Developed to instantly detect threats – such as bombs, weapons, and drugs – stowed in the undercarriage of vehicles, UV Inspect is powered by deep learning computer vision technologies. UV Inspect threat detection UV Inspect meets the challenge of automating threat detection for new and unfamiliar vehicles. The pioneering UV...

360 Advanced assists Johnson & Quin to achieve SOC 2 compliance

Johnson & Quin, a full-service provider of direct mail production and mailing services, announced the successful completion of their 2019 SOC 2 Type 2 examination. The company initially completed its SOC 2 Type 1 examination in 2018. “Completing the examination verifies that our security processes are consistent, ongoing and sustainable,” explained Manish Haria, VP, CISO and CIO for Johnson & Quin. “Putting a compliance framework in place and having it audited by indep...

How to build an insider threat programme

Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emot...

Embracing the do-it-yourself approach for smart home security

The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home de...

IDIS provides video solution for Men’s Shed Group to support ‘Create a Better World’ campaign

IDIS has teamed up with integration partner ISD Tech to support the Men’s Shed community group in Church Crookham and Fleet with the donation of a state-of-the-art video monitoring solution. The donation is part of the IDIS ‘Create a Better World” campaign that has run on company’s social media channels since the start of the year to support a global commitment to enhance safety and security for social welfare projects and non-profit community organisations. The system,...

Deanne Criswell and Angela Stubblefield to be SIA-organised ISC East 2019 keynote speakers

ISC Security Events and the Security Industry Association (SIA) are pleased to announce that security and public safety leaders Deanne Criswell and Angela Stubblefield will headline the 2019 SIA Education@ISC East Keynote Series. These keynote sessions are open to all attendees at ISC East – the Northeast’s largest security trade show – taking place Nov. 20-21 at the Jacob K. Javits Convention Center in New York City. Criswell will share her insights on emergency preparedness,...

Acuity's STREAM supports FAIR risk assessments

The FAIR (Factor Analysis of Information Risk) is a quantitative framework for cybersecurity and operational risk which has been adopted as an international standard by the Open Group.  Open FAIR™ is generating much interest and the non-profit FAIR Institute has 6,900 members, representing 30% of Fortune 1,000 organisations and 17 local chapters around the world. Acuity has licensed Open FAIR™ allowing users of Acuity’s STREAM Integrated Risk Manager solution to...

AXIS Camera Station video management software information available on help centre

A new portal on axis.com brings together information associated with the AXIS Camera Station end-to-end video surveillance solution such as handy how-to guides and the latest news. Users of the AXIS Camera Station video management software can now access all they need to know about the software in one single spot on axis.com. Within AXIS Camera Station help centre, they can filter the information for specific operator or system integrator needs, browse for Axis product information and get updat...

Securing New Ground considers impact of technologies and a holistic approach

Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cyb...

CNL honoured with 2019 Technology Partner of the Year award by Edge360

CNL, global provider of Physical Security Information Management (PSIM) software and solutions, is pleased to announce that it has been awarded the 2019 Technology Partner of the Year by Edge360, internationally renowned designer, developer, manufacturer and integrator of intelligence-based public safety technologies and solutions for federal, state and local governments, as well as commercial and private organisations. The award recognises CNL’s excellence in innovation and implementatio...

Traka ensures compliant key holding services for Guarding UK

Traka is the key management solution of choice for leading multi-sector business protection management company, Guarding UK, ensuring compliant key holding services and integrated audit control capability. Guarding UK manages nearly 1,500 sites across the UK, protecting in the region of £40bn worth of assets at commercial, corporate and residential sites across industry sectors including central London premier sites, retailers, property owners and management agents, together with airports...

Codelocks Americas announces partnership with Tether Technologies to provide comprehensive key management solution

Codelocks Inc., an access control company that designs and distributes innovative, standalone keyless door locks and access products, announces a strategic partnership with Tether Technologies, a developer and manufacturer of digital tethering solutions for master keys and access cards. The challenge in the industry is to prevent keys from being lost while on the job, Tether Technologies’ focuses on ways to address and resolve human error associated with master key loss. In 2015 Tether Te...

Device Authority and Venafi introduce KeyScaler, developed by Machine Identity Protection Development Fund’s sponsorship

Device Authority, a pioneer in Identity and Access Management (IAM) for the Internet of Things (IoT), announced it has been accepted into the Venafi Machine Identity Protection Development Fund. For decades, code signing has been used to verify the integrity of software, and nearly every organisation relies on it to confirm their code has not been corrupted with malware. Code signing keys and certificates are used in a wide range of products, including firmware, operating systems, mobile applica...

Honeywell is enhancing its product line, working towards proactive security

Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational...

Related videos

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

What Alcatel-Lucent OmniVista Network Advisor can do for network infrastructure

Quick poll
What's the primary benefit of integrating access control with video surveillance?