Peru News

Smart phone access control shift expected for 2015?

The major trend ECKey has seen in 2014 is an increased demand for “accountable” access control that is both convenient and affordable  ECKey 2014/2015 Review and Forecast: The major trend we have seen in 2014 is an increased demand for “accountable” access control that is both convenient and affordable. Tight budgets are shining a light on the true cost of ownership of card reader and biometric systems. In many ways these systems are similar...

Extending the reach of video surveillance in 2015

Customers look to leverage video surveillance technologies to optimise and monitor operations within their business MicroPower 2014/2015 Review and Forecast: In 2015, we will continue to see customers look to leverage video surveillance technologies to optimise and monitor operations within their business. Solutions that enable organisations to shift from more situational awareness to situational assessment – for example, using images collected from the surveillanc...

Security market trends in video: hype or happening?

There is convergence of both the video and access control technologies, and of the companies themselves Milestone Systems 2014/2015 Review and Forecast: Milestone Systems is always in touch with our vast ecosystem of partners around the globe as we support them in their customer projects and needs. We partake in hundreds of industry events, road shows, and meetings, also holding our own partner conferences in every region to ensure face time with our stakeholders. We do...

How biometric cards improve security and extend the life of proximity systems

Biometric cards provides an easy way for to provide a biometric upgrade to access control systems using card readers More and more, security professionals using card-based front ends for their access control systems have been worried about the security of their proximity systems. They know, that for $200 or less, their proximity system can be violated. Kim Humborstad, CEO of Zwipe points out that proximity systems do not offer a challenge response; they only use passi...

NICE Systems receives award from Relatório Bancario for advanced technologies in financial services sector

This is the fifth consecutive year that NICE has been awarded by Relatório Bancario NICE Systems recently announced that it is the recipient of an award from Relatório Bancario (Banking Report) for its advanced technologies and contribution to innovation in the financial services sector. At the awards ceremony in Sao Paulo on December 1, NICE was commended for delivering multiple real-time solutions to address business challenges in this sector, such as risk and...

Targeted video analytics provide value throughout a retail business

Retailers can get more use from video surveillance data, ultimately targeting profitability As the holiday shopping season kicks into high gear, retail organisations have two primary concerns: making a profit on notoriously slim margins and shoring up potential areas of internal (employee) and external threats, including organised retail crime. According to the Global Retail Theft Barometer 2011, published by the Centre for Retail Research, total global shrink in 2011 cost r...

Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance system

Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analogue to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus on camera, NVR an...

How cloud-based services will transform the access control market

Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...

Getting crisis management and emergency planning requirements right

Think of crisis management and emergency planning as a  customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it?Developing and writing a corporate or organisational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...

Why workplace training is essential for business success

Good training is a best practice that applies across a broad range of industries and markets Owners and managers of security dealerships, both large and small, face unique challenges in running their companies, and while there is no magic formula for success, dealerships that invest in training for their staff typically do better than those who don’t.  In fact, good training is a best practice that applies across a broad range of industries and markets, but it is pa...

Security Technology: A house built on sand?

The security industry can be like a house built on sand if there's a lack of professional standards set in place Picture the scene: You’re suffering from a persistent pain and so decide to take a trip to your doctor to get it checked out. You step into the consulting room but, before you can speak, he looks you up and down, haw and hums, and then writes out a prescription. Would you be happy that drugs prescribed in this manner will cure your ailment when your doctor h...

Rethinking physical access control to operate in an IT-centric environment

Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilise the organisation’s full IT infrastructure, which...

Video walls provide the big picture for collaborative security

Video walls are growing in popularity in security applications, providing everyone in a control room access to the same current information at the same time. They are a perfect way to display the “big picture” – literally. Video walls are often used in situations where several people are working together to create a coordinated effort, whether related to security, emergency response, process control or other discipline. In the security sector, video walls are commonly used in...

The benefits of training in the access control market

Training and education are essential elements of success in the access control market for integrators and end users alike. Whether one is a seasoned veteran or still new to the industry, continued training and education are critical given that access control technologies continue to evolve at a rapid pace. System integrators who do not take advantage of manufacturers’ training seminars are short-changing themselves and their customers, contends Robert Laughlin, president of...

Measuring value of security systems - price versus benefits

Value isn't always just about monetary worth In any sales conversation, price will inevitably be one of the points of discussion. When it comes to large investments such as security systems, customers want to ensure that their money is well spent. Where price is concerned, systems and solutions providers would want to impart the worth of their products. At the end of the day, in the consumer world, customers want the best value for the least amount of money po...

Costs, usability, and support among access control challenges

Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillanceas it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...

Transitioning from legacy access control to newer technologies

A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base of legacy systems presents opportunities and obstacles for providers of newer access control systems. Most end users would prefer not to do a full rip-and-replace upgrade. Therefore, integrators (and manufacturers) have to find a smooth transition path. Access control customers eager to embrace the newest capabilities on the market are ofte...

Access control market working to overcome tradition of proprietary systems

Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition from closed systems to more open integration provides benefits for integrators, and especially for end users looking to maximise their system return on investment. End users want greater flexibility, specifically in terms of hardware choice. As a result, more non-proprietary solutions are coming to market. For the integrator, offering more o...

How does commoditisation impact the security market? How should manufacturers and/or integrators differentiate themselves?

How do you stand out in a world of commoditisation? We live in a world of commoditised consumer goods. You probably own at least one item which would be considered "commoditised" by the majority of the population today, but you can probably also remember the days when it would have been described as "new" and "unique". Think about smart phones: most people you know are likely to own a smart phone. But remember when not everyone had a regular mobile phone? Now they're no...

Simplifying interoperability of access control with PLAI specification

Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access control across large companies or institutions, including those that span giant campuses or even multiple locations all over the world, is essential to optimum security. Too often, however, the effectiveness of a company’s access control system – or, more likely, of its multiple access systems that were installed in various locations o...

Genetec introduces new hybrid cloud archives service for Security Center

The archives allow organisations to easily scale the available storage capacity of their surveillance system Genetec™, a leading provider of unified IP security solutions recently announced its new Cloud Archives service for Security Center that will allow organisations to easily scale the available storage capacity of their surveillance system, and eliminate the need to invest in additional servers. With the ability to continue leveraging their existing on-premise s...

Identiv reports Q3 financial results for 2014

Identiv reaffirms revenue guidance for fiscal year 2014 of revenue between $80 million and $90 million Identiv, a global security technology company that provides trusted identity solutions for premises, information, and everyday items, reports its financial results for the third quarter (Q3) of 2014. "In Q3 2014, we saw continued growth in revenue and achieved positive adjusted EBITDA," said Jason Hart, Identiv CEO. "The steps taken to streamline our business have allowed us...

What trade-offs are required when accessing video on a smart phone or handheld device?

The ability to view surveillance footage on mobile devices adds greater flexibility to an organisation's security monitoring system. But of course, there are drawbacks. In the age of mobile devices, we are able to do more and more while "on the go" and are less limited by the need to be at a desktop computer with internet / network connectivity. We are seeing the proliferation of mobile apps designed to enable us to access our most important files and perform important tasks...

IFSEC International announces development plans for its leading global security event in June 2015

Safe Cities will be a central hub within IFSEC to shape future of urban security, civil welfare & disaster management IFSEC International, organised by UBM Live, is excited to announce development plans for the leading global security event in June 2015. Following the phenomenal success of the 2014 show, IFSEC International 2015 is in high demand with 92 per cent of the floor plan already sold out. Big name sign-ups and stand out new exhibitors include DELL, Mitsubishi El...

What role can technology play in keeping the security industry green?

"Going green" is not a new initiative, but rather, one that businesses and individuals are constantly aware of and continuously making a conscious effort to contribute to. The global population has become increasingly environmentally conscious over the years. Businesses and homeowners alike are investing more in green alternatives for their various needs. Many businesses adopt a green business ethic by ensuring that their products and ways of working are compliant with certa...

Remote video monitoring – the smarter way to enhance business security efforts

Remote monitoring offers a multiplying effect on security efforts The growth of IP-based networks has made it possible for security professionals to easily monitor surveillance activity from any internet-enabled PC, smartphone, or tablet anytime, anyplace. More and more, businesses are realising that remote monitoring can have a significant impact on their bottom line. Whether you’re a retail outlet, bank or hotel, remote monitoring offers a multiplying effect on securit...

MBX Systems: Working behind the scenes to optimise pairing of software and hardware

Sometimes companies want to buy their physical security software separate from the servers it runs on. Other times, companies prefer to buy an “appliance” – a purpose-built machine that is perfectly matched with the software it is running. The latter category is especially popular among small- and medium-sized business customers. For example, preconfigured video management appliances contribute an element of simplicity. That’s why you see video software companies –...

New iris recognition capabilities are a real eye-opener

Iris recognition has been used as a biometric for access control applications for many years, but we have heard a lot more lately about fingerprint scans. However, iris recognition has many advantages over fingerprints and other biometrics, and the technology has come a long way. Mark Clifton, vice president of the Products and Services Division of SRI International, calls the iris a “protected” biometric, typically not injured and unlikely to be contaminated as fingers or hands mig...

Strengthening Loss Prevention with Unified and Cloud-Based Security Solutions

Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organisations is sometimes still viewed as a necessary evil. But at a time when shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximise any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales...

Standardising global security to minimise risks and budget

Security standardisation reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...

Related videos

Enhanced security with S617 video door station

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

Quick poll
What is the most significant challenge facing smart building security today?