Uzbekistan News

Technology developments enhancing biometrics performance in the security market

Important biometric capabilities include multispectral imaging, superior liveness detection, and tamper resistance Technology developments are enabling a range of new functionality for biometrics in the security market. Early biometrics solutions had poor performance (high failures during enrolment or acquisition that meant significant percentages of users could not use biometrics), says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. Early solutions were not able...

How is the rise in terrorism impacting the physical security market?

Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-w...

Technological innovations in security industry move towards greener performance

The development of PSIM security systems and the move towards smart buildings and cities holds huge potential for environmental performance in the security industry Is the drive to give clients improved CCTV, perimeter protection, intruder alarms and access control making our industry any greener? Is technological innovation consistent with reducing security industry’s carbon footprint? In any case, green operating practices are more a side effect of current developments...

Formulating background check strategies to minimise insider and post-hire threats

Employers are increasingly concerned about the risks associated with employees, temporary workers, independent contractors, and others who have the ability to wreak havoc on an organisation from the inside. This is often referred to as “insider threat.” There are numerous types of insider and post-hire threats that range from embezzlement, theft of trade secrets, workplace violence or active shooters, and everything else in between. Potential insider threats are...

Meet Hanwha Techwin – The new name for Samsung Techwin after Hanwha Holdings acquisition

Samsung Techwin is changing its name to Hanwha Techwin. The move comes a little more than a year after Korean conglomerate Hanwha Holdings acquired the largest share of the company from Samsung Holdings in late 2014. However, use of the Samsung brand on the company’s cameras and other products will continue for now. “Eventually we want to make it our own brand,” said Tom Cook, vice president of North American sales. “Samsung carries some weight in the user mentality....

Biometric solutions bridge the gap between physical and logical access control

A biometrics-embedded tablet can tag a guard upon entering the building & feed videoof what’s happening beyond secure doors as he/she moves through the facility The best way to make the case for biometrics is to consider a physical and logical access control scenario, according to biometrics vendor SRI Identity, a program from SRI International, one biometrics company. With advances in security technology, access control systems have come to play a bigger role in org...

Security industry speculates as Honeywell-UTC deal falls through

In a year of mega-deals impacting the security marketplace, one of the big news stories recently was a deal that did not happen – between giants Honeywell and United Technologies (UTC). Financial news pages have been full of the back-and-forth between these two companies. It seems Honeywell wanted to merge with UTC, but UTC declined because of “insurmountable regulatory obstacles and strong customer opposition.” So the deal is off, at least for now. Impact on the security mark...

How to tackle the Zika virus impact on employee security, companies and business travel

Many companies are considering carefully the possible risks of business travel to the areas most impacted by the Zika virus, and others may have facilities located in affected areas. What is the Zika Scare? Transmitted by mosquito bite, the Zika virus can cause a fever that typically involves minor symptoms. There is an additional risk to pregnant women as Zika fever has been linked to incidences of microcephaly (a neurodevelopmental disorder) in newborn babies through mother-to-child transmi...

E-passport technologies address border security crisis and ease tourism

Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-growing border security challenges “More than one bil...

Food Safety Modernisation Act Final Rule to enforce tighter facility assessments to reduce intentional food contamination

The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Secur...

ROI for biometrics – an equation that makes biometric security systems worthy of investment

Proving ROI, setting proper customer expectations and training is imperative tothe success of biometric implementation End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “e...

How to choose between a cloud-based system and a server-based security system?

We hear that everything is going to the cloud – or is it? Security end users can be understandably confused by conflicting claims in the market from proponents of cloud-based or server-based systems. A number of major security companies are offering cloud video surveillance solutions apart from the traditional server-based systems. At the end of the day, how do you choose? What factors should be considered? We asked this week’s Expert Panel Roundtable: What factors should a customer...

LILIN bank surveillance solutions protect against threats such as robbery, fraud & violence through cutting-edge functionality

LILIN can equip all branches with the best-of-breed video surveillance security equipment and systems. Teller windows, processing rooms, ATM’s, parking lots, lobbies and common areas are all monitored by high-quality video cameras for the safety of customers, employees and staff. The company offers a large selection of IP cameras for use with bank location, and the surveillance video can be searched by date, time, camera location or any combination of these. Zone Entering technology is ab...

Effective corporate security strategy adds value to business strategies and operations

A more strategic approach to corporate security can better align departmentsin an organisation to achieve better results of shared goals The alignment of corporate security with the business strategy of an organisation is a topic that has been on the agenda of many senior security professionals. A corporate security department’s inability to demonstrate a clear thought process of how they arrived at proposing the strategic direction, or failing to make a compelling busin...

Engineers of Tomorrow competition registration now open to fire & security apprentice engineers

Successful entrants to Engineers of Tomorrow will be invited to pit their skills against each other in a live installation challenge at IFSEC 2016 The prestigious Engineers of Tomorrow annual competition is now open for the fire and security industry’s brightest young engineers to register their interest. Successful entrants will then be invited to pit their skills against each other in a live installation challenge at Europe’s largest security exhibition, IFSEC In...

Optical fingerprint sensors in smart phones paving way for biometrics comeback?

More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...

Understanding starlight camera technology and low-light applications in the security industry

Starlight camera technology is redefining low-light surveillance to new levels Starlight cameras are the latest products security companies are adding to their product line-ups, each camera boasting the most comprehensive ability to make darkness visible. While low-light surveillance capabilities have been around on the market for some time, starlight camera technology is redefining low-light surveillance to new levels. Sourcesecurity.com spoke to manufacturers to discuss this...

Ingram Micro to be acquired by Tianjin Tianhai in $6 billion deal, becomes part of HNA Group

Ingram Micro will facilitate the internationalisation of the HNA Group, Tianjin Tianhai's largest stockholder. They will have access to business opportunities in emerging markets, which have higher growth rates & better profitability Ingram Micro Inc. and Tianjin Tianhai Investment Company, Ltd. today announced that they have entered into a definitive merger agreement under which Tianjin Tianhai will acquire Ingram Micro for $38.90 per share in an all-c...

What's the most unusual application of surveillance cameras you have seen recently?

A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillanc...

ADT and Protection 1 merger – Latest multi-billion-dollar security industry deal

2016 is shaping up to be the year of the billion-dollar merger in the security market. After last month's mammoth Tyco/Johnson Control merger, a second big merger has rocked the market, this one involving one of the most familiar names in the consumer market – ADT. The home and small business security company, which traces its history back to 1874, has agreed to be acquired by private equity firm Apollo Global Management, and will merge with competitor Protection 1, a subsidiary of Apollo-...

Security industry manufacturers push for environmentally accredited products with ISO 14001 certification

Many security manufacturers are working towards ISO 14001, an internationally-recognised standard for the environmental management of businesses How green are security industry manufacturers? As innovation (much of it driven from home video and mobile phones) continues, it’s likely that our sector’s carbon footprint will decrease since compact products use up fewer raw materials. Even casual observers will note that integrators are falling over themselves to gain e...

ADT Corporation acquired by Apollo Global Management in $15 billion deal to merge with Protection 1

The merger agreement includes a “go-shop” period, during which ADT and its Board of Directors may actively solicit, receive, evaluate and potentially enter into negotiations with parties that offer alternative proposals ADT, a leading provider of monitored security, interactive home and business automation and related monitoring services in the United States and Canada, today announced that it has entered into a definitive agreement to be acquired by an affiliate o...

IFSEC 2016: Physical Perimeter Security Zone to feature latest security products

The enhanced Physical Perimeter Security Zone at IFSEC International 2016 will occupy over 1,000 square metres of dedicated floor space IFSEC International, Europe’s largest security exhibition, will enhance its dedicated Physical Perimeter Security Zone in 2016 with many leading suppliers within the sector already confirmed to participate. Taking place from 21-23 June 2016 at London’s ExCeL, IFSEC International continues to announce further exciting details and ne...

How to understand security metrics to determine success of security programmes

Done right, a good metric programme will help tell the story of the security department Knights of medieval times are known for impossible quests and challenging missions seeking rare religious items. The quest for the Holy Grail is perhaps the most notable. Today’s security professionals are often on their own quest, seeking what sometimes feels like the impossible – the search for perfect security metrics! What are metrics and are they really that hard to find?...

CSAA/ANSI alarm verification standard to improve law enforcement responsiveness & reduce false dispatches

Improved alarm verification standards will help reduce the number of false dispatches of law enforcement officers The verification of alarms continues to progress with more affordable technology as well as an updated industry standard set for release as soon as the end of February 2016. The definition of alarm verification is getting a makeover in the standard, guided by a range of stakeholders including the security industry, law enforcement, associations and other intereste...

What is the best way to ensure customer loyalty in the security industry?

As the security industry continues to evolve and come up with innovative technologies, it has also thrown open the doors for competition among manufacturers of security systems and products. Price wars are emerging in the physical security market, while manufacturers and integrators are looking for new ways to offer greater value and better service. It’s one thing to fight it out for a new customer, but nobody wants to lose an existing customer based on price, or any other factor for that...

Access control manufacturers address biometric myths & end user misconceptions

A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings created by pop culture Contributing to the problem of understanding is the popular culture. “Popular mo...

Wireless technology attracts security installers’ attention for its reliability and cost-effectiveness

Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signalling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programming, de...

Retail security strategy – balancing data security solutions and user experience

Secure payment card technology at the point of sale and a strong authentication are effective defences against data security threats Data security is one of the top concerns to a retailer’s reputation and its customers’ privacy. The fall-out can be catastrophic, and organisations must understand the threat and take all necessary steps to protect their assets and customers. The challenge has become more complex with the explosive growth in mobile device usage throug...

Border security technologies "Trump" Presidential candidate Donald Trump's proposed U.S.-Mexican border wall

Trump’s border wall proposal reflects a rising demand forgreater border security When GOP presidential candidate Donald Trump proposed building a wall along the length of the U.S.-Mexican border, some ridiculed the idea. Yet, it also struck a nerve among Americans deeply concerned about unchecked illegal immigration. "I would build a great wall, and nobody builds walls better than me, believe me, and I'll build them very inexpensively. I will build a great, great wall o...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?




Latest Uzbekistan companies