Nicaragua News

Networking basics for security professionals: Considering 4k’s impact on networks

Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HDTV, which in some cases was defined in terms of its resolution of 1920 hor...

What are the cybersecurity vulnerabilities of IP based systems?

Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...

GJD to showcase latest innovations at IFSEC 2015

Featuring on GJD’s stand will be the recently launched D-TECT 2 IP detector GJD Manufacturing Limited, one of the world’s most innovative leaders in UK manufacturing, design and supply of professional external detector equipment and CCTV LED Illuminators, recently announced it will showcase its latest innovations at IFSEC International 2015, on stand F1160 at the Excel, London from June 16th to 18th. IFSEC International is the world's largest gathering of security...

How should manufacturers engage with end user customers?

If we didn’t have manufacturers, integrators wouldn’t have anything to sell. But what is the role of manufacturing companies when it comes to taking those products to market? Effectively managing the sales channel – helping resellers be successful without somehow undermining their efforts or (heaven forbid!) selling direct to an end user – is an ongoing and delicate challenge for manufacturers. They want to do everything in their power to ensure success of their products...

Networking basics for security professionals: Do you believe in specifications?

Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...

Addressing the unique security challenges of primary/secondary schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Protection & Management 2015: Sir Ranulph Fiennes confirmed for Inspirational Speaker Series

Sir Ranulph Fiennes will touch on how the ability to perform under extreme pressure determines success Sir Ranulph Fiennes Bt OBE has recently been revealed as the second high-profile speaker confirmed for the Inspirational Speaker Series at this year’s Protection & Management Series; he will take to the stage on Wednesday 17th June at 2.30pm at ExCeL London. The world’s greatest living explorer at Protection & Management 2015 Pushing the boundaries o...

Security camera manufacturers address commoditisation and lower pricing

Commoditisation of cameras and downward price pressure are big topics in the video surveillance market. There was an interesting discussion about pricing and its impact on the integrator community at last month’s MIPS 2015 (Milestone Integration Platform Symposium). Participants were several of the major camera manufacturers, who provided a variety of viewpoints. Prompting the discussion – but with no representative on the panel – were the emerging Chinese manufacturers, who a...

Sports security: Ensuring safety at sports venues a continuing challenge

Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across several countries during a week when UBM announced that Protection & Management 2015 (which includes the IFSEC International trade fair) will feature Karren Brady (Baroness Brady), a career soccer executive, as one of its inspirational keynote speakers. As I type, inquests are being held into the deaths of some of the 96 people who were kill...

Insights From More Than Two Decades of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Video surveillance storage suppliers gearing up to meet demand

According to a recent MarketsandMarkets report, video surveillance storage solutions and services are experiencing a rapid adoption in the industry, estimated to grow 16.3 percent each year until 2018, eventually reaching a market size of $10.41 billion. In addition to the specific image content of surveillance cameras, there are also huge amounts of data surrounding it – everything from the location to the time of day, the duration of the video, and more. And the amount of data in the ima...

Allegion on IoT: 5 questions with futurist Rob Martens

Rob Martens, Allegion's futurist and director of connectivity platforms, is a leading strategist on the Internet of Things (IoT). He will be a featured panelist at the IoT Global Innovation Forum in April. In the following interview, Martens unfolds more about Allegion's IoT position and strategy.  Question: There's a lot of buzz about the IoT. How is Allegion playing in this space? Rob Martens: Allegion is very active in the IoT space and is widely respected by many other peer organisatio...

How to avoid counterfeit security products?

“Buyer beware” is always good advice in the security marketplace – or in life for that matter. But the age-old warning is more timely than ever in our age of global commerce and given our fragmented market with thousands of products manufactured all over the world. Complicating the picture: our market is also inching toward commodisation and facing downward pricing that shrinks margins for manufacturers. So the question becomes: When is an item merely a good deal or somehow &ld...

Designing security systems: Project management techniques

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...

exacqVision 6.8 with VideoPush feature

Exacq Technologies, part of the Security Products business unit of Tyco, introduces faster camera discovery and VideoPush to mobile devices with exacqVision 6.8 and automatic backup of recorder configurations in Enterprise System Manager (ESM), a health monitoring program for use with exacqVision Enterprise network video recorders (NVRs). Improved connectivity with multiple IP cameras: The EasyConnect feature introduced last year has been enhanced in exacqVision 6.8. EasyConnect allows users t...

Smart thermal cameras protect perimeters in transportation applications

Thermal cameras can often be used to cover larger areas than standard visible light cameras Smart thermal cameras use on-board video analytics and a high degree of video processing to detect people very accurately in complete darkness, bright sun, and bad weather over the typically large perimeters associated with transportation applications. Combining manpower and smart thermal technology makes security for transportation assets more effective. At the end of the day, it takes...

When should a video system be part of the corporate network?

This week’s Expert Panel revisits a classic question that has been around since the advent of IP video: Should an enterprise’s video system have its own network, or should it share the corporate network? Our panellists' responses reflect new IT trends, technology changes and shifting priorities that are impacting how the question is approached. Rising concerns about cyber-security (such as fears that video might provide a hacker entry into the enterprise system) are one new aspect. N...

Utilising intelligence analysts to improve business

If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged to a group promoting the unification of North and South Korea and that South Korean President Park Geun-hye called the event an attack on the South Korea-U.S. alliance. You would want to know where in Seoul the attack occurred as well as many...

Networking basics for security professionals: What network switches don’t do

Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors immediately turn to two favourites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by i...

Cloud-based systems: Current challenges and future technology

There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the rewards. New opportunities for integrator companies, especially related to recurring monthly revenue (RMR), are among the benefits of new cloud-based systems. For insights into those opportunities, we spoke with Robert Hile, currently director of strategic accounts for SureView Systems and a strong proponent of cloud-based systems, whose backgroun...

Networking basics for security professionals: The 60 Watt dilemma

Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power. Many of these involve pan-tilt-zoom (PTZ) domes and heaters and blowers that require additional power. This development created two areas of confusion which is highlighted in this article by N...

MIPS 2015: Largest-ever Milestone symposium keeps focus on partners

This year’s 10th anniversary Milestone Integration Platform Symposium (MIPS) was the largest ever, with 463 participants, including manufacturers, integrators and thought leaders from throughout the industry. Emphasizing Milestone’s “open platform” approach to the market, the 2015 event highlighted successful Milestone end users, new integrations with a variety of manufacturer partners, and a theme of “winning together.” Keeping Mum on the Canon-Axis acquisti...

Key management essential for transportation environment

Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and an automated key control system is a valuable tool. Key management systems offer multi-site transportation facilities increased security and control to help prevent authorised key access as well as reducing the number of lost or misplaced keys. As an example, road repair is often done at night and requires equipment, vehicles, lights, gene...

Addressing false alarms in video analytics

Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated – concerns about false alarms. Companies providing video analytics systems say the question isn’t whether false alarms can be eliminated, but rather how they can be managed. “We’re still very far away fro...

Learning to use visitor management technology in schools

It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools.  However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...

Honeywell IS335 Motion Detector

Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing customised IP video systems. Now available in eight or 16 channel models, the embedded NVRs are compatible with Honeywell’s equIP Series and Performance Series IP cameras, broadening options for IP-based surveillance systems. “Making the transition to IP cameras doesn’t have to be a big hassle – or a big burden on custome...

HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform

HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management and door opening experience via the robust KNOX 2.4 mobile platform that will be integrated into the new Samsung Galaxy S6 smart phone. Enterprises can now deploy HID Mobile Access® using Samsung’s advanced Android secure mobility platform in combination with Seos®, a secure, privacy-protecting mobile access platform. The Seos-po...

AXIS P39-R network camera series for outdoor use on vehicles

AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are all specially designed for onboard video surveillance in or on buses, trains, subway cars and emergency vehicles. Axis Communications, the global leader in network video surveillance, announces the outdoor-ready AXIS P3905-RE Network Camera as the latest addition to the AXIS P39-R Network Camera Series.  It is designed to be mounted on th...

Do security managers continue to be recruited from the military and law enforcement?

The retired police officer who takes a cushy job as a security director is almost a cultural cliché. Like any cliché, the idea has roots in the real world, where police departments have often been a rich source of the security industry’s leadership talent. Former military personnel often find their way to the security industry, too, and realise that the familiar elements of discipline and command structure translate well. We wondered about the impact of this historic trend an...

Is home automation driving a security renaissance?

According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal 22 percent or so. According to research firm IHS, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015. Perhaps this increase is due in part to the rise of interactive ser...

Related videos

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

What Alcatel-Lucent OmniVista Network Advisor can do for network infrastructure

Quick poll
What is the most significant challenge facing smart building security today?