Uzbekistan News

Optimising Effectiveness and ROI for Physical Identity and Access Management Software

Ideal COTS solutions take cost, customisation and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronised and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...

Security threats & co-existence of freedom (privacy) and security

Privacy or Security? Privacy: Does it really exist? Does it matter? You still hear about privacy concerns in our market, but in many ways the privacy ship has sailed. A session on privacy at ISC West reminded me how much privacy expectations have changed in the era of Facebook. Now people think nothing of posting personal information in a public forum that clearly identifies who they are. What a shift from the days when anonymous screen names both protected identities and encouraged greater can...

IHS Senior Analyst foresees growth in second-generation HD CCTV market

There seems to be genuine uncertainty amongst manufacturers at the future direction for HD, low-latency video provision Growing slice of the $13 billion video surveillance equipment market or small-time niche which can never keep up with the double-digit growth rates for network surveillance? It’s a very different outlook for HD CCTV technology, depending on who you speak to. There are those who see the growing revenues and a viable alternative to HD IP cameras for many...

The Impact of Big Data on the Physical Security Market

From being a buzzword today, Big Data is poised to have a large impact on the physical security market with numerous practical applications in preventing and fighting crime. I’ve been hearing a lot about "Big Data" and its impact on the physical security market. Wikipedia tells us that Big Data involves using larger and larger sets of data points to find correlations that can “spot business trends, determine quality of research, prevent diseases, link legal citations, combat crime,...

SALTO secures Bon Secours Hospital with XS4 Lockers

Bon Securs Hospital, Galway, has integrated the SALTO XS4 Locker Lock into the drug and medicine cabinets used within a new build extension to the hospital to control when and by whom patient medication can be accessed.Bon Secours Hospital Galway is a 120 bed acute care facility, providing a wide range of surgical and medical services. It is part of the Bon Secours Health System, the largest private healthcare provider in Ireland, and currently admits 18,000 patients per annum, comprising 6,000...

IHS report - Mechanical locks market to have positive CAGR of 3.8% from 2013 to 2017

The mechanical lock industry is experiencing an increased penetration of Chinese suppliers into the international market Despite the growing popularity of access control systems driving the adoption of electronic locking devices, mechanical locks are not projected to falter any time soon. Mechanical locks are forecast to have a positive compound annual growth rate (CAGR) of 3.8% from 2013 to 2017, a new report from IHS. While access control is driving the penetration of elect...

Intrusion detection challenges: Reducing false alarms with advanced sensor technologies

Intrusion detection devices must maintain a delicate balance. Highly sensitive devices can cause too many false alarms, while devices with insufficient sensitivity are easily defeated by sophisticated intruders. Innovations in intrusion detection technology have enabled significant advancements in performance, resulting in excellent catch performance while virtually eliminating false alarms. In this article, Tom Mechler, Product Marketing Manager for intrusion products for Bosch Se...

Pelco Is "Back" with a Focus on IP video surveillance: Hervé Fages

Pelco is making its big comeback with renewed vigour and new lines of surveillance products to set it apart from the rest Working to Regain Momentum in a Changing Market: Most observers agree that Pelco lost momentum in the video surveillance market after the acquisition by Schneider Electric in 2007. Hervé Fages, senior vice president of Schneider Electric's video business, is looking to regain that momentum, guiding the surveillance giant in new directions as the mark...

Axis network cameras help raise wildlife conservation awareness through live web streams

These “critter cams” let viewers share in the daily lives of animals usually hidden in forests, groves or high atop trees Axis Communications, the global leader in network video, recently celebrates Earth Day by highlighting non-profit organisations who raise awareness of wildlife and conservation projects through live Web streams of animal habitats using Axis network cameras. These “critter cams” let viewers share in the daily lives of animals usually...

Allegion CEO: Driving open protocols in security systems, investment and growth

Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kick-off ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I ca...

Brickcom announces V5 version of its Fixed Box IP network camera series

Brickcom is pleased to announce the new version of the Fixed Box IP network cameras. The V5 new design includes a bunch of new hardware and software features, and is the result of the joint efforts from Brickcom's R&D team and the customers in all parts of the world. From the hardware point of view, the V5 Fixed Box cameras come with the following new features and enhancements: Real-Time Clock for the camera to maintain the accurate time even if powered off for days. Temperature Alarm f...

VMS best practices for IP video surveillance in education

Security is a top priority in schools throughout the United States. The capabilities of IP video surveillance systems, in conjunction with Video Management Software (VMS) systems, make them one of the most popular and effective security tools available. In this article, Gadi Piran, President, OnSSI defines scope and structure of IP video and its advantages in improving school security in a number of ways including: superior image quality, ease of manipulation, integration capabilit...

ISC West Review: Recurring Themes and Surprises

After days of back-to-back meetings at ISC West, you start hearing some repetitive themes, but then something will surprise you. That happened to me at the NVT booth when I saw a display showing transmission of power and IP video signals over barbed wire (rather than the more familiar Cat-5 or coax cabling). Wondering about possible applications at correctional facilities (or cow pastures), I was assured the display was intended to make the point that NVT products can transmit video and power ov...

HID Global infographic reveals attitudes about best practices for physical access control

The infographic combines results from its survey with published data on security breaches and associated costs HID Global®, a worldwide leader in secure identity solutions, recently released an infographic illustrating the results of a survey it conducted on physical access control. The survey of 600 respondents revealed enterprise end users’ perceptions about change and the importance of industry best practices, and how well today’s technology and policy best...

Where's the Danger in “Scanning Kids?”

“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thou...

Allegion introduces Briton range of door closers and manually programmable digital locks

Leading global provider of security and safety solutions, Allegion (formerly Ingersoll Rand Security Technologies), will be showcasing the very latest additions to its Briton range of architectural hardware products at The National Merchant Buying Society Ltd’s trade exhibition on Wednesday 9 April at Coventry’s Ricoh Arena. A recently-introduced range of door closers from Allegion’s Briton brand, specifically designed to offer market-leading cam-action technology and high per...

HID Global settles patent-infringement lawsuits relating to multi-technology reader patents

The lawsuits filed by HID Global and ASSA ABLOY were amicably settled HID Global, trusted leader in solutions for the delivery of secure identity, recently announced that it has settled patent-infringement lawsuits against Apollo Security, Applied Wireless IDentifications Group (AWID) Inc., and Secura Key, a division of Soundcraft, Inc. The lawsuits included HID Global’s multi-technology reader patents. “We are pleased that the lawsuits filed by HID Global and ASS...

Data overload at ISC West

Data overload describes both my condition in the midst of a busy trade show and the current condition of the industry itself. At an opening session at ISC West in Las Vegas, I hear that technology development now means there are more sensors and cameras providing more and better quality data all the time. As if making the case, Axis introduced a 4K “super high resolution” camera for under $1,000. Other companies also introduced 4K cameras, including Sony, Bosch, and several more. Ho...

Combining crowdsourced data to create a useful whole

Smart phone video played a starring role in the investigation following the Boston Marathon bombing in 2013. The investigation also highlighted limitations in existing systems related to incorporating crowdsourced information, including video, audio, still images and other data. What's needed, and doesn't exist yet, is a system that can unify the information – the thousands of video snippets and still images from smart phone cameras – into a “big picture” that reflects th...

Axis introduces AXIS P1428-E, its first 4K resolution camera

Axis Communications, the world leader in network video, recently announces its first 4K resolution camera, AXIS P1428-E. The 4K standard is defined and approved by the International Telecommunication Union (ITU) and offers a video resolution of 3840 x 2160 pixels at 30 frames per second. The AXIS P1428-E Network Camera is the top-of-the-line model in the compact AXIS P14 Series, designed for outdoor and demanding indoor environments. The AXIS P14 Series consists of seven network camera models r...

Vicon and IQinVision enter definitive merger agreement

Vicon Industries, Inc. and IQinVision, Inc., a privately held California corporation, announced today that they have entered into a definitive merger agreement that is expected to create a global provider of integrated solutions to the video security market. Vicon is a designer and producer of video security and surveillance systems. IQinVision designs and produces high performance HD megapixel IP cameras.   The merger has been approved by the boards of directors of both comp...

A sea of cameras all ready to deploy

I shot these photos of a room full of video surveillance cameras during my recent tour of Genetec's facilities in Montreal. And the photos don't even show them all. Definitely a lot of cameras, and they're just some of the ones Genetec uses to test and ensure integration with the company's software. How does a company like Genetec, and all the other video management system companies for that matter, integrate all these security cameras into their systems? My visit to Genetec reinforced the ongo...

Made in the USA: Does it matter?

In today's security market, nothing is really “Made in the USA” – or is it? Most components of security systems today are manufactured in places like China and Korea. Even products that are technically assembled (“made”) in the United States contain many components manufactured overseas. In the global marketplace, does it really matter? Is it fair to characterise goods manufactured overseas as somehow lower in quality? I was thinking about the variables of “M...

Time to Check In

Hello, glad to meet you. Welcome to my new column, where I will write about the security marketplace from the viewpoint of a “seasoned veteran.” I won't say “old guy,” but suffice it to say that the lady at the grocery store no longer asks if I qualify for the “senior discount.” Somehow she knows. I should start by assuring you, dear reader, that I am a real person. It seems obvious, but in the days of Siri and other “pretend” people, you can't al...

SourceSecurity.com Technology Report highlights remote business management platform

A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others, the OnVu360 management platform has applications in remote business management and secur...

Proximex integrates its Surveillint™ PSIM solution with Control Room Management Suite from Barco

Proximex, part of the Security Products business unit of Tyco, announces the integration of its Surveillint™ Physical Security Information Management (PSIM) solution with the Control Room Management Suite (CMS) from Barco, a leader in enterprise visualisation and collaboration. Under this collaboration, security operators using Surveillint can easily select particular camera sources to be shown in pre-defined areas on Barco CMS-powered video walls and displays. The integration also extend...

Oncam Technologies introduces the OnVu360: a new paradigm in cloud-based management

Oncam Technologies today announces the launch of its unique management platform, the OnVu360. The OnVu360 Management Platform uses an innovative, cloud-based architecture that is simple to install and configure, and yet extremely adaptable. The power of the platform emanates from a small, pre-configured hardware gateway (or software on a local box, such a set-top box or console) and its connectivity to backend services. Once that connection is established, using fixed, wireless or even mobi...

The Secure Identity Alliance presents eServices Vision 2020 at Connect:ID and Cartes Asia conference

The Secure Identity Alliance will identify the $50bn savings opportunity government are set to enjoy through On 19th & 20th March 2014 at the Connect:ID conference in Washington and the Cartes Asia conference in Hong Kong, The Secure Identity Alliance will identify the $50bn savings opportunity government are set to enjoy through the implementation of secure eServices by 2020. The report also investigates the wider social and economic benefits of this shift to digital: f...

Milestone announces Solution Certification for IT infrastructure vendor products

The Milestone Solution Certification provides verification of the components being interoperable and optimised for performance with XProtect VMS Milestone Systems, the open platform company in IP video management software (VMS) announces fully reported performance certification of Milestone Solution Partners with IT infrastructure components such as servers, storage, and workstation products. The first to achieve this comprehensive process with documented results are HP, NetAp...

HID Global announces HID Trusted Tag Services

HID Global®, a worldwide leader in secure identity solutions, recently announced its HID Trusted Tag™ Services offering. Combining trusted tags with existing secure cloud authentication services, HID Global’s latest solution confers everyday objects with unique and trusted identities that can be read by NFC-enabled mobile devices in a wide variety of IoT applications. With NFC technology, smartphones and tablets can interact with everyday objects in new and exciting ways, rangin...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?





Latest Uzbekistan companies