Tajikistan News
Ping Identity, globally renowned provider of identity defined security solutions, has announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. Cloud identity, access management PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment. Enterprises can provide authentication for all users with a highly-configurable global authentication authority that...
EchoGuard receives FCC Equipment Authorisation allowing widespread deployment of the radar for security, surveillance, and airspace management applications. EchoGuard radar Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces that it has received approval from the FCC for widespread deployment of its EchoGuard radar for radiolocation and radionavigation in the United States. FCC Equipment Authorisation allows the radar to be used t...
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal...
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider thr...
The ban on U.S. government usage of Chinese-made video surveillance products was signed into law last year and was scheduled to take effect a year later – on August 13, 2019. With that deadline looming, there are questions about whether government agencies and departments will comply in time. A year ago, the U.S. Congress passed, and the President signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and D...
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promi...
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and serv...
BIRD Aerosystems, globally renowned developer of Airborne Missile Protection Systems (AMPS) and Special Mission Aircraft Solutions (ASIO), has received an order for additional AMPS systems from the UN Air Operations. Airborne Missile Protection Systems Under the contract, BIRD will provide its AMPS-MV solution, which includes the MACS sensor, and install it on the UN Mi-17 helicopters, that are operating in the most dangerous and complicated areas in Africa. The UN is already using BIRD's AMPS...
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilised. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Royal Boon Edam International is proud to announce that the Circlelock security locker is celebrating its 35th anniversary in 2019. Since entering the market in 1984, demand for this custom entry solution has continued to grow steadily in several important segments, including data centres, government and military, and commercial facilities. Principle of multi-factor authentication The Circlelock security booth owes its longevity to the principle of multi-factor authentication, whic...
Recognising the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, and Bosch, companies in access, secure connectivity and mobile/CE device solutions – announced the launch of the FiRa Consortium. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases fo...
"The safety of others has always been a matter close to my heart", says Hans Wetzlar, Managing Director of IHRE SICHERHEIT Security Service in Bielefeld. It was out of this motivation that he founded his security company ten years ago. Together with his team, he ensures, for example, that visitors to events and trade fairs can move around safely. Mobile ‘video guards’, using Dahua's powerful video surveillance technology, are now contributing to this. Video surveillance system Vid...
ExtraHop, global provider of cloud-first network detection and response solutions, has announced the appointment of experienced technology and software industry veteran Bill Ruckelshaus as its Chief Financial Officer (CFO). Ruckelshaus joins the company as it accelerates with more than 10x growth in cybersecurity and rapid expansion of its cloud product portfolio. He will hold a position on the ExtraHop executive leadership team, reporting to ExtraHop CEO Arif Kareem. Cybersecurity expert Ruc...
Yeastar, the provider of SME PBX system, and ImpacTech, a supplier of innovative Business Intelligence solutions based on AI and Big Data, announced a new ITSP partnership. This partnership sees ImpacTech’s SIP trunk service, Impact Trunk, certified for use with Yeastar Cloud PBX and S-Series VoIP PBX. Users of Yeastar’s innovative, high-performance business phone systems can now also benefit from the exceptional call value available by using Impact Trunk. Uncompromising call quali...
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command centre technologies, fusing critical data input from...
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed do...
Police in the United Kingdom have been testing the effectiveness of live facial recognition (LFR) for several years now, but future uses of the technology have been called into question. The Information Commissioner’s Office (ICO), an independent authority that seeks to uphold information rights in the public interest, has weighed in on issues of data privacy related to LFR, and Members of Parliament (MPs) have called for a moratorium on uses of the technology. The big question is whether...
The devil is in the details. The broader implications of the U.S. Government ban on Chinese video surveillance manufacturers are being clarified in the federal rule-making process, and a public hearing in July gave the industry a chance to speak up about the impact of the law. Ban on equipment The hearing centered on Section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019, specifically paragraph (a)(1)(B). The paragraph "prohibits agencies from entering into a con...
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and...
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks faci...
School shootings, especially in the United States, present an ongoing tragedy and a challenge to the security industry. We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effec...
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Physical security has been stuck in a forensic and siloed mindset for decades, while the rest of the enterprise has evolved and transformed into proactive, connected operations. A new security management platform based on artificial intelligence (AI) seeks to change that status quo by using modern tools for unification, analytics and controls. AI-based security management “Security teams are managing more moving parts than ever,” says Clayton Brown, Co-Founder of ReconaSense....
Ontic Technologies, the globally renowned provider of protective intelligence security software, delivers technology to empower security teams, in order to protect assets, employees and customers. In the modern world, organisations and their employees, clients, customers, and their physical assets may come under some kind of threat or attack, at any time. Protection that leverages deep analytics Investments in physical and other security systems have already been made, to protect these critica...
The Aratek Marshall 5, an all-in-one biometric handheld device that makes ‘identification-anywhere’ a reality, is expected to help immigration authorities implement tighter border control measures with its MRZ reading capability for ePassports and other travel documents. The powerful biometric handheld terminal allows immigration authorities to effect stricter border controls. Biometric handheld terminal Aratek’s flagship device features the Access-IS OCR310e miniature OCR r...
Smarter Security, the intelligent entrance controls company, has announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorised side-by-side entry through a turnstile. Layered security strategy Jeff Brown, Chief Executive Officer at Smarter Security, says “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available...
ShotSpotter, Inc., global provider of security solutions that help law enforcement officials identify, locate and deter gun violence and active shooter incidents, has announced an updated version of ShotSpotter Missions – an AI-driven crime forecasting and patrol management software tool. Acquired from HunchLab in late 2018, today’s product release represents ShotSpotter’s first set of enhancements as it extends its penetration into this emerging category. ShotSpotter Mi...
The Newsweek Best Business Tools list recognises the Symmetry access control system based on ratings in categories such as trust, service promise, reliability, security, and satisfaction. Symmetry platform AMAG’s Symmetry platform provides reliable, actionable data to help customers make better business decisions" “I am honoured and excited to have our Symmetry Access Control software recognised as a Best Business Tool by Newsweek,” said AMAG Technology President...
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education ma...
Browse security news
- By event
- Black Hat Middle East 2024
- Intersec 2025
- Data Centre & Cloud Innovation Summit 2025
- Inter Airport Southeast Asia (IASEA) 2025
- Global Table Games and Game Protection Conference 2024
- ISC East 2024
- SIA Honors 2024
- Dahej Industrial Expo 2024
- Suprema Global Partner Program (SGPP) 2024
- AUCSO European Region – Winter Conference 2024
- Inno Rail 2024
- View more
Featured products
Related videos
Enhanced security with S617 video door station
OPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download- Tajikistan Security companies
- Tajikistan Manufacturers
- Tajikistan Distributors
- Tajikistan Resellers / Dealers / Reps
- Tajikistan Installers
- Tajikistan Consultants
- Tajikistan Systems integrators
- Tajikistan Events / Training / Services
- Tajikistan Manned guarding
- Tajikistan Training organisations
- Tajikistan Associations / regulatory bodies
- Tajikistan Event organisers
- Tajikistan Media
- Tajikistan Recruitment / personnel
- Tajikistan Services