Uzbekistan News

MOBOTIX camera helps researchers monitor equipment at unmanned station in Antarctica during winter

Temperatures ranging between -40°C and -5°C, storm wind speeds of more than 100 km/h, constant daylight during summer and darkness during winter. This must be Antarctica. This is where the Belgian Princess Elisabeth Antarctic base is situated, the first "zero emission" polar research station which was designed, built and operated by the International Polar Foundation (IPF). Since the station went into service on February 15, 2009, it has been already hosting a multiple of scientific pro...

VMS and PSIM jargon distracts from tangible security solution benefits

Today, we find ourselves in a world where we all need to talk less about products and more about solutions The security industry has changed a lot in recent years. Many will remember a time not so long ago when it was about buying boxes/pieces of tin, opening them up and installing them. Today, we find ourselves in a world where we all need to talk less about products and more about solutions. Despite this, there is still an inclination to put everything in a ‘box’...

SALTO to showcase latest security products and BLE access control at ASIS 2016

SALTO’s BLE enabled access control increases efficiency and convenience for end users in any vertical SALTO Systems, a manufacturer of electronic access control solutions, will showcase its latest security innovations — including new BLE enabled products — at the annual ASIS International Conference to be held in Orlando, Sept. 12th-15th. Bluetooth Low Energy (BLE) technology “SALTO’s emphasis on incorporating mobile access Bluetooth Low Energy...

Qognify to demonstrate advanced video security portfolio at ASIS International 2016

Qognify will be demonstrating its multi-award winning solutions in booth 3451 at ASIS International 2016 Qognify, formerly NICE Security, will showcase its portfolio at ASIS International in Orlando Florida, September 12th-14th. With significant advancements to its security portfolio, Qognify will be demonstrating its multi-award winning solutions in booth 3451.   VisionHub VMS The new next-generation, web-based VisionHub is the winner of the Security Industry Associati...

Matrix to showcase access control and surveillance solutions at ASIS 2016, Florida

Matrix will showcase its range of Biometric Access Control and IP video surveillance solutions Matrix, a manufacturer of telecom and security solutions, is participating in ASIS 2016, from 12th – 15th September 2016. Matrix will showcase its well-engineered security solutions specifically designed for enterprises. Biometric access control  At ASIS 2016, Matrix will showcase its range of Biometric Access Control solution and its advanced applications. Mobile being...

IT & access control collaboration leads to functional, personnel and financial benefits

IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...

How is the role of distributors changing in the security market?

Distributors have traditionally played an important role in the physical security market, ensuring ready availability of products that systems integrators need to complete their projects. But a changing industry has had dramatic impact all along the supply chain of which distributors are a critical link. We asked this week’s Expert Panel Roundtable: How is the role of distributors changing in the market, and what is the impact?

Military and government data collection technologies for corporate and city security

Creating and accessing intelligence is increasingly part of the mission of corporate security departments, and of Safe Cities applications. Such capabilities were previously the domain of military and government applications, but the same approaches used to provide intelligence from military bases can also be applied to Safe Cities and corporate security projects. Edge360 is a six-year-old company with roots in the military and Department of Defence surveillance. Now, Edge360 is looking to app...

Smart home products help security companies engage customers

Dennis Sage Home Entertainment, Phoenix, is a best-in-breed audiovisual contracting services firm that gradually began expanding its offerings to security several years ago. After testing the waters, hiring experienced technicians and learning about the parallels with its current business, the company made a successful transition. Now, Dennis Sage, President and Chief Executive Officer (CEO), is also counting on heightened customer engagement and stickier clients as he moves into the role of t...

Weaponised robots? Military and police response uses for robots on the rise

(Image credit: Antonio Scorza / Shutterstock.com) The era of the “killer robot” hasn’t arrived, exactly, but it may not be far off. Police and the military have been using these machines for decades now to disarm bombs and provide reconnaissance in areas where it would be risky to send officers or soldiers. When Dallas Police equipped a robot with an explosive device and sent it in to take out a sniper who had killed five officers, it raised eyebrows and conjured images of a...

10 tips for using business intelligence tools to maximise ROI in retail

A lot has changed in the last 15 plus years in the security industry, including the ability to process and analyse Big Data. The growth rate of data has reached an astounding pace. Today, best estimates are that about 2.5 quintillion bytes of data are produced every day—that’s 2.5 followed by a staggering 18 zeros! The volume of data feeding into businesses is so vast, the only means available to leverage this data to drive decision making is to harness the power of a Business I...

Electronic locks prove a worthwhile investment for the security industry

  The security industry as a whole is migrating from the historical mechanical lock to the newest technology of electronic locks Mechanical locks and keys date back thousands of years and have undergone many changes, but the industry’s transition to electronic locks might be the most important, lasting, and surprisingly affordable security and safety change of all. The objective behind the creation of locks so long ago remains: to control a value on the other side...

IFSEC Southeast Asia 2016: What to expect from the security, fire and safety event

IFSEC Southeast Asia 2016 is an opportunity to create new networks with leading companies and peers The region’s security, fire and safety industry is getting excited for the fourth edition of IFSEC Southeast Asia 2016. On 7th - 9th September 2016, industry experts from around Southeast Asia will gather on the show floor to build networks amongst industry peers, discuss on the future development and business deals, and obtain new information from seminars. All these will...

Machine learning security systems address the limitations of traditional threat detection

The need for security convergence and shared threat intelligence is markedly increasing “Converged security” has been a buzz phrase for more than a decade, but the industry is just now starting to reap the rewards. Converged security recognises that truly comprehensive organisational risk management involves the integration of two distinct security functions that have largely been siloed in the past: information security (network operations centre or NOC) and physi...

Access control evolution allows multiple options for healthcare security

Part 8 of our healthcare series Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. Hospitals are challenging environments. A hospital requires ov...

Home automation: A growth area for the security industry?

It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of bli...

What if a customer expects more than a security system can deliver?

Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater...

Evolution of security robots responds to market needs

Part 2 of our robots in security series Companies realised they could improve security by mounting laser sensors and cameras on a mobile platform such as Knightscope's Autonomous Data Machines Security and safety robotics, unlike any other industry, is driven by customer and market demand. Once buyers acquire robots, they often find new things they want them to do. Manufacturers are then called upon to respond to those demands, and they often do. Enhancing security...

ASUSTOR announces compatibility with Seagate IronWolf 10 TB NAS hard disks

All ASUSTOR NAS devices are compatible with Seagate’s IronWolf 10 TB hard disks, 6 TB Enterprise NAS hard disks & 10 TB Enterprise Capacity hard disks ASUSTOR, a provider of network storage solutions, has announced today that, after stringent testing, all of its NAS products are fully compatible with Seagate’s newly launched IronWolf 10 TB NAS hard disks, 6 TB Enterprise NAS hard disks and 10 TB Enterprise Capacity hard disks. These hard disks are recommended...

TDSi to showcase new GARDiS solution at IFSEC Southeast Asia 2016

TDSi will be giving visitors a chance to see its new range of GARDiS software and hardware solutions Integrated security manufacturer TDSi will be giving visitors a chance to see its new range of GARDiS software and hardware solutions at IFSEC Southeast Asia 2016, which is being held in Kuala Lumpur from 7th-9th September. The show follows this year’s highly successful IFSEC International in London, which saw increased stand visitor numbers and considerable interest in t...

PROMISE Technology storage deployed in city surveillance project in Singapore

PROMISE Technology's VTrak solution is an instrumental part of the city surveillance project in Singapore Singapore is one of the most densely populated regions in the world, with over 7,000 people per squared kilometre crammed into the island country. A natural issue that arises with so many people in such a small area is that legally parking one’s car is not an easy task. Illegal parking is a real problem in Singapore and it affects the safety and convenience of Singap...

Iris ID IrisAccess iCAM7000 authentication system selected by UAE retailer for time and attendance

Iris ID’s non-contact solution provides highly accurate identification using the iris to authenticate employees Iris ID, a provider of iris biometric technology, has announced its IrisAccess® iCAM7000 identity authentication system has been installed for employee time and attendance at all Sharjah Co-Operative Society retail stores in the United Arab Emirates. The retailer operates 26 stores with more than 3,000 employees throughout Sharjah, a UAE state, and the cap...

Data mining for insider threats: Another convergence of physical and cyber security

For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety of surveys across the IT security industry. Companies are becoming increasingly worried about insider threats.  From the cyber security perspective, insider threat is primarily focused on malicious threats to the company either by, or to, information technology assets. Whether it is fraud, intellectual property theft, or ev...

Shedding light on integrated cameras and independent illuminators

Lighting, or the absence of it, is one issue that significantly affects a camera’s video quality Video surveillance has rapidly advanced over the last two decades. Today, integrators can purchase IP cameras offering complete network control, megapixel cameras with HD imaging, and PTZ cameras with remote directional control. Although these features are impressive, they don't solve all the challenges that surveillance solutions face. Importance of lighting for camera per...

Rio 2016 security: The role of technology and personnel

A force of 85,000 police and military will patrol the Olympic grounds and environs to provide security A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the various Olympic venues located around Rio De Janeiro. The security plan called for 3,400 screeners. The security firm had only found 500. What happened? Today, prospective security officers must undergo background checks that do...

Location-based alerting technologies to secure employees in emergency situations

Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situat...

Video surveillance as evidence: Does human bias undermine reliability?

The power of video as evidence in a court of law is often seen as a function of specific variables: How clear is the video? What exactly does it show? Can it be authenticated? Possibly lost in the discussion is the fact that the value of video as evidence is decided almost completely by people, specifically by a small group of people; that is, the jury. Is there a gap between what the video “shows” and what people “see?” Are there psychological or even physiological vari...

Surveon enterprise surveillance solutions for commercial buildings

Surveon’s 3 megapixel cameras provide 1.5-time larger monitoring range at 30 FPS, offering a cost-effective option for monitoring wide areas As people come in or go through the buildings every day, security has become one of the priorities to be focused on for the operation of commercial buildings. IP surveillance solutions are particularly essential for those commercial applications generally used in a wider and more open areas it requires system scalability. Surveon pr...

Healthcare facilities’ diverse security requirements provide opportunities for systems integrators

Part 7 of our healthcare series Integrators can sell a breadth of possible equipment into the healthcare market One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in s...

How to choose between an NVR and VMS running on an off-the-shelf server

Software drives video solutions in the IP environment, but often that software is a pre-installed component of a purpose-built network video recorder (NVR). In other cases, software solutions are sold separately and then installed (usually by the integrator) on a commercial off-the-shelf (COTS) server. But how can an integrator or end user decide which approach is best for them? We asked this week’s Expert Panel Roundtable: What are the advantages and disadvantages of using a pre-configure...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?




Latest Uzbekistan companies