Tonga News
"The safety of others has always been a matter close to my heart", says Hans Wetzlar, Managing Director of IHRE SICHERHEIT Security Service in Bielefeld. It was out of this motivation that he founded his security company ten years ago. Together with his team, he ensures, for example, that visitors to events and trade fairs can move around safely. Mobile ‘video guards’, using Dahua's powerful video surveillance technology, are now contributing to this. Video surveillance system Vid...
ExtraHop, global provider of cloud-first network detection and response solutions, has announced the appointment of experienced technology and software industry veteran Bill Ruckelshaus as its Chief Financial Officer (CFO). Ruckelshaus joins the company as it accelerates with more than 10x growth in cybersecurity and rapid expansion of its cloud product portfolio. He will hold a position on the ExtraHop executive leadership team, reporting to ExtraHop CEO Arif Kareem. Cybersecurity expert Ruc...
Yeastar, the provider of SME PBX system, and ImpacTech, a supplier of innovative Business Intelligence solutions based on AI and Big Data, announced a new ITSP partnership. This partnership sees ImpacTech’s SIP trunk service, Impact Trunk, certified for use with Yeastar Cloud PBX and S-Series VoIP PBX. Users of Yeastar’s innovative, high-performance business phone systems can now also benefit from the exceptional call value available by using Impact Trunk. Uncompromising call quali...
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command centre technologies, fusing critical data input from...
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed do...
Police in the United Kingdom have been testing the effectiveness of live facial recognition (LFR) for several years now, but future uses of the technology have been called into question. The Information Commissioner’s Office (ICO), an independent authority that seeks to uphold information rights in the public interest, has weighed in on issues of data privacy related to LFR, and Members of Parliament (MPs) have called for a moratorium on uses of the technology. The big question is whether...
The devil is in the details. The broader implications of the U.S. Government ban on Chinese video surveillance manufacturers are being clarified in the federal rule-making process, and a public hearing in July gave the industry a chance to speak up about the impact of the law. Ban on equipment The hearing centered on Section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019, specifically paragraph (a)(1)(B). The paragraph "prohibits agencies from entering into a con...
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and...
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks faci...
School shootings, especially in the United States, present an ongoing tragedy and a challenge to the security industry. We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effec...
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Physical security has been stuck in a forensic and siloed mindset for decades, while the rest of the enterprise has evolved and transformed into proactive, connected operations. A new security management platform based on artificial intelligence (AI) seeks to change that status quo by using modern tools for unification, analytics and controls. AI-based security management “Security teams are managing more moving parts than ever,” says Clayton Brown, Co-Founder of ReconaSense....
Ontic Technologies, the globally renowned provider of protective intelligence security software, delivers technology to empower security teams, in order to protect assets, employees and customers. In the modern world, organisations and their employees, clients, customers, and their physical assets may come under some kind of threat or attack, at any time. Protection that leverages deep analytics Investments in physical and other security systems have already been made, to protect these critica...
The Aratek Marshall 5, an all-in-one biometric handheld device that makes ‘identification-anywhere’ a reality, is expected to help immigration authorities implement tighter border control measures with its MRZ reading capability for ePassports and other travel documents. The powerful biometric handheld terminal allows immigration authorities to effect stricter border controls. Biometric handheld terminal Aratek’s flagship device features the Access-IS OCR310e miniature OCR r...
Smarter Security, the intelligent entrance controls company, has announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorised side-by-side entry through a turnstile. Layered security strategy Jeff Brown, Chief Executive Officer at Smarter Security, says “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available...
ShotSpotter, Inc., global provider of security solutions that help law enforcement officials identify, locate and deter gun violence and active shooter incidents, has announced an updated version of ShotSpotter Missions – an AI-driven crime forecasting and patrol management software tool. Acquired from HunchLab in late 2018, today’s product release represents ShotSpotter’s first set of enhancements as it extends its penetration into this emerging category. ShotSpotter Mi...
The Newsweek Best Business Tools list recognises the Symmetry access control system based on ratings in categories such as trust, service promise, reliability, security, and satisfaction. Symmetry platform AMAG’s Symmetry platform provides reliable, actionable data to help customers make better business decisions" “I am honoured and excited to have our Symmetry Access Control software recognised as a Best Business Tool by Newsweek,” said AMAG Technology President...
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education ma...
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
Workforce management systems gather and analyse information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its...
Salient Systems is pleased to announce the appointment of Mr. Keith R. Aubele, CPP, LPP as a Senior Advisor to the Leadership Team responsible for the company’s expansion in the security and loss prevention vertical. Mr. Aubele will provide comprehensive national sales support and will work with the leadership team as a consultant for product line improvement, sales methods, and voice of the customer acquisition to help guide strategic planning. Loss prevention expert At The Home Depot,...
Columbia Bank, a Northwest community bank headquartered in Tacoma, Washington, sought to upgrade their video surveillance solution to improve image quality and retention time. They also wanted to maximise field of view to deliver a more forceful and expansive – yet, less intrusive – solution. Working with Cook Security Group, Inc., Ross Armstrong, vice president of physical security at Columbia Bank, chose to overhaul video surveillance in their 150-plus branches across the Northwes...
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air...
Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyse real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and pa...
Sargent and Greenleaf, Inc. (S&G), a global manufacturer of high-security locks and locking systems for safes, vaults and high-security cabinets, has appointed Mark LeMire to Chief Executive Officer. LeMire comes to Sargent and Greenleaf with over 25 years of experience in executive management, new product development and engineering. Most recently, LeMire held leadership positions at Loma Systems and Buehler, both divisions of Illinois Tool Works (ITW). As a Global Director of Marketing a...
One French town just north of Paris faced familiar key management challenges. Each person in their Municipal Technical Centre had to carry approximately forty physical keys. If a single key was lost or stolen, for even one door, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too — at great expense. Key duplication costs were mounting. “One lost key cost from €3,000 to €4,000 for changing cylinders and replacing...
ProSource, the audio, video, and integration buying group in the United States, has announced the addition of eight new Custom Integrator (CI) members and one new PRO level member in the second quarter of 2019. New members in Q2 represent $44 million in new revenue for the group. Networking and integration firm "ProSource continues to grow by welcoming outstanding operations into the organisation," said Dave Workman, CEO and President of ProSource. "Members benefit from the excellent programs...
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from in...
Browse security news
- By event
- Black Hat Middle East 2024
- Intersec 2025
- Data Centre & Cloud Innovation Summit 2025
- Inter Airport Southeast Asia (IASEA) 2025
- Global Table Games and Game Protection Conference 2024
- ISC East 2024
- SIA Honors 2024
- Dahej Industrial Expo 2024
- Suprema Global Partner Program (SGPP) 2024
- AUCSO European Region – Winter Conference 2024
- Inno Rail 2024
- View more
Featured products
Related videos
Enhanced security with S617 video door station
OPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download- Tonga Security companies
- Tonga Manufacturers
- Tonga Distributors
- Tonga Resellers / Dealers / Reps
- Tonga Installers
- Tonga Consultants
- Tonga Systems integrators
- Tonga Events / Training / Services
- Tonga Manned guarding
- Tonga Training organisations
- Tonga Associations / regulatory bodies
- Tonga Event organisers
- Tonga Media
- Tonga Recruitment / personnel
- Tonga Services