Sri Lanka News
In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer...
Kim Loy is the Director of Marketing for Vanderbilt Industries. She was previously a member of the ONVIF Steering Committee and has also served as the Vice President of Global Marketing - Video Line of Business at Pelco by Schneider Electric. Kim has more than 20 years of marketing and management success within the security and surveillance industry, and has worked in the capacity of VP of Global Marketing as well as General Manager of the Security Business Unit for Xtralis. She has also he...
Milestone Systems, the open platform community in networked video management software (VMS), not only retained the number one global position but also holds the number one spot in both Europe/Middle East/Africa (EMEA) and Asia/Pacific (APAC) and ranks number three in Americas. “Milestone continues its growth with an increase in net revenue of 18 % in 2016 over the year before and has significantly exceeded the overall market growth. Our continued focus on co-creation of revenue and innova...
Airports, harbours, ports, railways, pipelines, highways, and bridges make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the infrastructure for the transshipment of people, freight, and cargo. Overall and targeted situational awareness These facilities require increasing levels of security and leverage Arecont Vision megapixel camera technology to deliver both over...
According to the FBI’s most recent data, there were almost eight million property crime offences in the United States in 2015, while the Occupational Health and Safety Administration (OSHA) estimates roughly two million employees per year are affected by some form of workplace violence. Don’t let your business become part of these statistics. June is National Safety Month, so it’s the perfect time to reassess your facility security measures and look for improved and effic...
Colleges and universities have been targeted in the last several weeks with a series of bomb threats received via campus printers and fax machines. Targeted institutions included Vanderbilt University, the University of Southern California, the University of Virginia and the University of Detroit Mercy, among others. Businesses were also among the targets. Around 100 organisations in all received print-outs, faxes or emails demanding that a $25,000 ransom be paid to a Brazilian citizen to avoi...
Security control rooms should be functional and durable, and their aesthetics should incorporate matching colours that are conducive to a 24/7 operating environment—not too much contrast and easy on the eyes. Another factor driving aesthetics is an enterprise’s desire to create a ‘showpiece’ to demonstrate a commitment to security for shareholders and other stakeholders. “Everyone wants to have a good-looking control room and a cost-effective design,” says Ma...
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need...
Technology is changing the look and function of today’s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company’s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. Need for inte...
Technology is changing at a break-neck pace, and the security marketplace is currently being bombarded by a wealth of new capabilities and innovations. But what will be the impact? Which of the currently-hyped new innovations will have a major impact, and which will fade over time? And even acknowledging the long-term significance of various technologies, what can we expect to be the more immediate effect? We asked this week’s Expert Panel Roundtable: What new security technology is poised...
Manufacturers depend on consultants to get their technologies specified in customer projects. Consultants often depend on manufacturers to provide them current information about the technologies that are the building blocks of their projects. It’s a symbiotic relationship, but not always a perfect one. We recently gathered three consultants to discuss what they want from manufacturers, and a representative of HID Global to add a manufacturer’s perspective. Manufacturers also look to...
Did you hear the one about the bear that nearly caused a nuclear catastrophe? It was around midnight on October 25 1962, in the midst of the Cuban Missile Crisis. A guard at Volk US Air Force Base – home to a number of armed nuclear bombers – spotted a shadowy figure apparently attempting to scale the fence. The supposed Soviet saboteur tripped the alarm, which was fatefully miswired. As a result, the klaxon was accidentally sounded, triggering a manoeuvre to scramble US inter...
Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis. Every second of every day, sensors are digitising the real world, creating information and transporting it across multiple networks and interfaces to a broadening audience. While there is obvious utility being gleaned from this process, from our vantage point here in the physical security space, information sharing and tra...
Just when you think you have seen the worst that cyber criminals have to throw at you, they are back with more sophisticated, and in some cases, more severe threats. Understanding emerging and evolving cyber threats is the first step in helping to protect your organisation. The next, and most important, step is shoring up your defence technologies with the proper training, education and deployment. To help prepare for what may be coming next, let’s take a look at what are already shaping u...
Mobile access is probably the largest emerging trend in the security marketplace, but it is only one of several that are changing the face of the access control market. Another factor showing potential to change the market is the emergence of location systems and positioning systems, as reflected by HID Global’s recent acquisition of Bluvision, a provider of real-time location tracking system for assets and employees, and building information modeling (BIM) is impacting how consultants do...
Tom Langer is the Vice President of Security for BAE Systems. Prior to his current position, Tom served in a number of roles within the security function of BAE Systems and its precursor companies. He received his Bachelors of Science degree in Criminal Justice from St. Anselm College in Manchester, New Hampshire. Tom has served in a number of leadership roles in professional security associations, and is currently the President of ASIS International. SourceSecurity.com Editor Larry Anderson cau...
The role of storage in video surveillance systems has evolved, from a means of preserving evidence to an evidence search tool, and soon as the main data repository for predictive analytics. Old analogue systems are now being replaced with massive multi-camera IT systems. Necessary storage volumes keep growing as video resolutions increase. 1K, 4K, and 8K megapixel cameras require such gigantic storage space that network video recorders (NVRs) can hardly handle more than a handful of the...
Some end users and integrators are daunted by the idea of designing control rooms, but they shouldn’t be. “It’s not difficult to design because we will help,” says Randy Smith, President of Winsted. “We will walk you through the entire process.” Some control rooms still need storage areas for consoles underneath the workspace; however, when hardware is relocated to a server room, Winsted has modern, streamlined and simplified designs with no doors or storage...
Security consultants are on the front lines of trends such as “smart buildings” and the increasing demand for green technologies. We recently gathered together several consultants to reflect on what’s new in these areas, joined by a representative of HID Global. Participants were Chris Grniet of Guidepost Solutions, Brandon Frazier of Elert & Associates, Terry Harless of Burns & McDonnell, and Harm Radstaak, HID Global’s Vice President and Managing Director, Phy...
The transition from analogue to IP technologies has had a large impact on the ways intercoms are used in the security industry. The analogue-to-IP transition has generated a lot of attention in the camera market, and the transition is also taking place for intercoms. Twenty years ago, Axis Communications (2N’s parent company) led the industry in converting from analogue cameras and video to IP. Integrated IP system The conversion took 15 years to achieve, but the same conversion in inter...
When people think of control rooms, images from James Bond movies or intense action stories come to mind. What they fail to realise is the incredible level of ergonomics, technology, precision and craftsmanship required to create a top-notch command and control room. “These are rooms of complex functionalities, where hundreds of elements must be integrated and function in sync,” says Jim Coleman, National Sales Manager, AFC Industries. Professional teams from several different indus...
On 19th December, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 people and injured more than 50 others. Less than a month before, the US State Department had warned about such attacks in public places throughout Europe, saying that extremist groups including the Islamic State and Al Qaeda were planning to focus on such locales during the Holiday Season. Two types of vehicle access point To stop these attacks, security pr...
Consolidation is a reality in the security and video surveillance market. In the last several years, we have seen a variety of mergers and acquisitions (M&As) involving scores of companies of all sizes. But what is the impact of M&A activity on the companies involved, on their customers, and on the industry as a whole? We posed this question to our Expert Panel Roundtable: Do mergers and acquisitions have a net positive or net negative impact on the security market (and why)?
Thomas Cook has been active in the security industry for 35 years. He has been Hanwha Techwin’s Senior Vice President of Sales for North America since March 2017, and held the position of Vice President of Sales for North America for 5 years. He has led the Hanwha Techwin America Company to be one of the premier video companies in North America. Previously he ran sales in North America for Vicon and Panasonic Video. Cook started in the security industry as a software design engineer and ha...
Ergonomics are a critical, but often misunderstood aspect of designing control rooms for security. Ergonomics have a deep impact on the integrity of an operation, and the issue goes beyond the control room furniture. Matko Papic, Chief Technology Officer of Evans Consoles, divides ergonomics into three areas: physical (reach zones, touch points, monitors); cognitive (the individual’s ability to process information without overlooking a critical element) and organisation...
Today's threat landscape is bigger and more broad than ever before, with an increasing number of emerging risks falling on the shoulders of security professionals in a variety of markets. Many of these leaders face the growing concerns of finding efficient, integrated solutions that provide protection from threats, but also can be used in everyday communications to streamline operations, provide access control, and automate workflow. One way today's enterprise organisations, citie...
Star India deployed 2,500 Mobile IDs and has procured mobile-enabled iCLASS SE® R10 contactless readers Staff access control Star India is the country’s largest multimedia entertainment company. Founded in 1991 as STAR India with headquarters in Mumbai, the media conglomerate creates more than 20,000 hours of content annually for over 50 channels in its network. Star India caters to a diverse audience, producing programs in eight different languages that are broadc...
Integrating RFID with GPS & GSM/GPRS technology, the solution delivered highly mobile security for Perot Systems’ employees Mobile employee protection In recent years, outsourcing to India has meant an exponential increase in job opportunities in the country. This expansion has spurred the creation of corporate regulations to address the demands of Information Technology (IT) industry security. Due to special work schedules needed to serve global businesses, emp...
Project registration programmes are a benefit manufacturers provide to systems integrators and security dealers who are bidding on an upcoming installation project. In effect, the integrator registers a project he or she is bidding on with a manufacturer, which offers pricing discounts to that integrator for that specific project. Such a programme seeks to encourage an integrator to specify a manufacturer's products, while making it more difficult for a competing integrator to bid lower on a pro...
The International Organization for Standardization (ISO) describes standards as guidelines or characteristics for activities or for their results, aimed at achieving the optimum degree of order. They might include product standards, test methods, codes of practice, guideline standards, and management systems standards. In the security marketplace, there are many standards currently used, including those from organisations such as ONVIF, PSIA and ASIS International. Might the value of standardisa...
Browse security news
- By event
- 11th National Conference On CFIUS
- RSA Conference 2025
- RSAC USA 2025
- 19th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- G2E Asia + Asian IR Expo 2025
- Airport Show 2025
- Secutech Taipei 2025
- 6th European Forum on Global FDI Reviews
- Infosecurity Europe 2025
- Security LeadHER 2025
- 16th Advanced Forum on DCAA & DCMA Cost, Pricing, Compliance & Audits
- View more
Featured products
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download- Sri Lanka Security companies
- Sri Lanka Manufacturers
- Sri Lanka Distributors
- Sri Lanka Resellers / Dealers / Reps
- Sri Lanka Installers
- Sri Lanka Consultants
- Sri Lanka Systems integrators
- Sri Lanka Events / Training / Services
- Sri Lanka Manned guarding
- Sri Lanka Training organisations
- Sri Lanka Associations / regulatory bodies
- Sri Lanka Event organisers
- Sri Lanka Media
- Sri Lanka Recruitment / personnel
- Sri Lanka Services