Sri Lanka News
Hang Nadim International Airport (Indonesia) has demonstrated considerable growth ambitions in recent years, as the airport is becoming a major hub for both domestic and international connections. But the airport’s growth also coincides with increased safety requirements, and a continuous effort to prevent accidents, fatalities, injuries or significant damage. To be ready for future growth and to offer its passengers more security, Hang Nadim International Airport recently invested in adva...
If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...
The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...
Hikvision has been in the news in the United Kingdom recently, including a front page news story in The Times. SourceSecurity.com offered Keen Yao, Vice President at Hikvision’s International Business Centre, a chance to set the record straight regarding concerns expressed about hacking of cameras, the company’s ties to the Chinese state, and its role as the biggest video surveillance equipment manufacturer in the world. Hikvision has come a long way in the past few ye...
We in the physical security market tend to watch closely how the buying decision is made. If anything, the buying process has become more complex in recent years. We have seen the impact of security systems extending beyond the core security department, and with greater impact come more stakeholders. “Buying by committee” is more the rule than the exception, and the committee is getting rather large in some situations. We asked this week’s Expert Panel Roundtable: Who should be...
IP/PoE systems eliminate the need for local power, thus saving installation costs Cost considerations are an important reason to use existing installed cable as part of a new system infrastructure. Extenders in the form of media converters can help. For almost three decades, video surveillance systems existed in the form of analogue systems. Video coaxial cable was the primary method of transmission with a limited distance of about 750 feet. Analogue systems required separate...
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow d...
Perimeter security has evolved in recent years from an emphasis on fences and low-cost sensors to a broader systems approach that incorporates a variety of technologies. Protech is among the companies leading the transition and positioning itself as a one-stop systems provider at the perimeter. Mergers and acquisitions In 2014, U.S.-based Protech merged with Sorhea, a French manufacturer of perimeter security systems. The combination expanded Protech’s business from one product to the a...
When a manufacturer states a specific PoE power for a camera, always count on the maximum class power source Power over Ethernet (PoE) is an important consideration in IP video security infrastructures, and many people believe Institute of Electrical and Electronics Engineers (IEEE) standards are the last word. However, when it comes to PoE, there is a wide range of both voltages and wattages that can qualify as being within an individual IEEE power class. This applies to both...
More cameras today are providing more video than ever, but how much of the video is available when and how it is needed? The question often comes up when law enforcement entities are seeking to access video from private systems to help solve a crime. There are many more private video systems than public systems, but is the video available when needed? And what about privacy: In what situations is it acceptable to share private video for the public good? We took these questions to this week&rsquo...
Designed for applications at height, at sea and on ports, piers and bridges, the camera’s active sense technology responds to external conditions to continually capture the highest quality imagery in the harshest of conditions Panasonic has announced the availability of its new robust PTZ security camera, designed for the most severe weather conditions and mission critical applications. Available from October 2016, the Aero PTZ (WV-SUD638) provides Full HD 60fps imagery...
Critical Infrastructure in transportation Transportation is a complex world. City streets, bridges, highways, tunnels, seaports, airports, and rail systems all offer different challenges to the security professional seeking to protect people, cargo, commodities, and critical infrastructure. Customers around the world rely on Arecont Vision as a key part of that protection. Arecont Vision megapixel camera benefits Made in USA quality, advanced technology, and field upgradable fea...
Protecting the world’s critical infrastructure is a complex mission. Managing security for these facilities involves addressing a broad range of possible threats and vulnerabilities, from the intentional contamination of water supplies to the theft of equipment vital to electricity distribution.Vandalism, theft or deliberate sabotage — by terrorists or other criminals — are ever-present threats. The consequences of any security breach can be dire,...
Features such as height-adjustable tabletops and adjustable monitor options can fine-tune the workstation The security market is one of the most demanding AV applications. Each environment in the security field presents its own unique set of challenges and requirements that revolve around advanced AV systems and the operators that utilise them. For monitoring and control room operators, that means continuous vigilance with little to no downtime away from their stations. Becau...
If you want to cultivate new ideas among your employees, it is important to let them know that they are allowed to challenge the status quo The Americans asked for horses – Henry Ford gave them cars. In the beginning of the 20th century, he disrupted the transportation industry. He created a new market outmatching established leading companies, products and alliances. And he got the idea himself. Many of us want to disrupt our industries with new innovations that...
The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types of cables In general, there are four major types of cable. First is coaxial cab...
When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate...
The critical area of security has been addressed throughout the 17 specifications of Release 2 The full potential of the Internet of Things (IoT) advanced significantly as oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT, published a new landmark set of specifications, Release 2.Based on contributions from more than 200 member companies, Release 2 builds on oneM2M’s initial set of official specifications, which enable basic...
Part 11 of our Security in Healthcare series The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system improvements at healthcare facilities. An independent, not-for-profit organisation, The Joint Commission accredits and certifies nearly 21...
The e-government and healthcare identification market is very much driven by individual projects Shipments of electronic government (e-government) credentials—including e-passports, e-identity cards, e-health cards and e-driving licenses, and others—are projected to reach 1 billion units in 2020, nearly doubling 2015 volume.Project-driven marketThe e-government and healthcare identification market is very much driven by individual projects. Whether these projects c...
The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide soluti...
Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this...
Better-performing video systems provide better security. Today’s end users demand systems with optimum performance, providing smooth video streams, higher resolutions, efficient storage, better analysis and quick access to stored images. Here are several technologies driving greater video surveillance capabilities: Innovations in image processing to boost system performance Higher resolutions are a challenge for video management systems, but new tools are mee...
48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...
The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...
For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable intelligence. Today, its real-world specifications provide an in-depth analysis of video and integrated physical security data, deepening the gathering of intelligence and lessening risk at the protected premises. The entire realm of situational awareness continues to transition as intelligence is gleaned from new points, with this trend only...
CSR applies to the security industry in many different ways and can be practised by small or large businesses What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different companies – Axis Communications and FGH Security – each put CSR at the heart of their operations. Corporate Social Responsibility means different things to different people, and is often used as a catchall for one...
A perceived benefit of buying direct is to save money as opposed to paying a middleman Security companies have multiple options to purchase security products today – online, manufacturer direct, or from the vast array of security products and electrical supply networks dotting the landscape. Because there are numerous options, and costs may not vary drastically, the final decision on where to purchase ultimately boils down to service and additional support these channels...
Secutech Vietnam has been renowned as an effective mix of world-class brands and innovative product launches The ninth edition of Secutech Vietnam has opened its doors and makes its debut at Friendship Cultural Palace, Hanoi until 24 September 2016. The relocation to Hanoi from Ho Chi Minh City is expected to introduce international suppliers into the safety and security market in Northern Vietnam, where user demand for integrated solutions for homeland security, fire & sa...
The new Pro series PTZ camera brings a new range of performance and efficiency features for demanding video surveillance Dahua Technology, a manufacturer and supplier of video surveillance products headquartered in Hangzhou, China introduces its new Pro series PTZ camera. With Starlight performance, 25x Optical zoom, auto tracking and face detection capabilities, Dahua’s the new Pro series PTZ camera brings a new range of performance and efficiency features for demandin...
Browse security news
- By event
- 11th National Conference On CFIUS
- RSA Conference 2025
- RSAC USA 2025
- 19th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- G2E Asia + Asian IR Expo 2025
- Airport Show 2025
- Secutech Taipei 2025
- 6th European Forum on Global FDI Reviews
- Infosecurity Europe 2025
- Security LeadHER 2025
- 16th Advanced Forum on DCAA & DCMA Cost, Pricing, Compliance & Audits
- View more
Featured products
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download- Sri Lanka Security companies
- Sri Lanka Manufacturers
- Sri Lanka Distributors
- Sri Lanka Resellers / Dealers / Reps
- Sri Lanka Installers
- Sri Lanka Consultants
- Sri Lanka Systems integrators
- Sri Lanka Events / Training / Services
- Sri Lanka Manned guarding
- Sri Lanka Training organisations
- Sri Lanka Associations / regulatory bodies
- Sri Lanka Event organisers
- Sri Lanka Media
- Sri Lanka Recruitment / personnel
- Sri Lanka Services