Zimbabwe News
Software drives video solutions in the IP environment, but often that software is a pre-installed component of a purpose-built network video recorder (NVR). In other cases, software solutions are sold separately and then installed (usually by the integrator) on a commercial off-the-shelf (COTS) server. But how can an integrator or end user decide which approach is best for them? We asked this week’s Expert Panel Roundtable: What are the advantages and disadvantages of using a pre-configure...
Vos Logistics deployed Vess A2000 NVR storage appliances and Vess R2000 external storage solutions Logistics services Vos Logistics, founded in 1944, is an independent European logistics service provider, delivering a wide range of transport and customer specific logistics services. With 24 locations, Vos Logistics is active throughout Europe and ranks among the largest road haulers in the region. With just under 1,900 employees, the company operates a modern fleet of 1,200...
Part 6 of our Security in Healthcare series Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities Hospitals and healthcare institutions increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. When these types of conflicts arise, there is an urgent need to lock the facility down quickly. Security professionals and their teams need...
Robots such as those designed by SMP Robotics can handle a variety of tasks ranging from perimeter fence monitoring to snow removal Robots come in all shapes and sizes from small tracked vehicles to large upright cylinders and cart-like devices on wheels. They fly through the air and glide underwater. They’re becoming familiar sights and will become more so. The future of robots in the military, public safety and security is expanding for some very good reasons. The new...
The new Pokemon Go video game, which has taken the world by storm, combines real-world landmarks and locations with virtual creatures in a smart phone video game that requires players to walk around in the real world to “find” the imaginary creatures. It’s a little like what the security industry has been trying to do for years: To achieve convergence of physical and cyber worlds. Pokemon Go security risks To be sure, the new game has presented its own set of security chall...
Arecont Vision megapixel cameras enable city, county, state, and federal or national governments worldwide to deploy new, cost-effective applications for enhanced situational awareness and forensic viewing.With security concerns on the rise, video surveillance is often the first and sometime the only witness to incidents and the actions that led to them.Arecont Vision solutions increase surveillance coverage and quality, while reducing the number of cameras required and for less cost. Surveilla...
Open Options and Axis Communications have announced the integration of Open Options' DNA Fusion and AXIS A1001 Open Options, an open platform access control and software development company, and Axis Communications, the global leader in network video, announce the integration of Open Options' DNA Fusion™ with AXIS A1001 Network Door Controller. Open Options and Axis Communications are both proponents of the value of open architecture in access control software and hardw...
Over the course of the last decade, we’ve seen a blurring of lines between cyber and physical security concerns. Whether it’s the hacking of corporate information or the use of social media for nefarious activities, it’s clear that these once-separate security disciplines are often tied together. As a result, various organisations seek ways in which they can collaborate and share information to gain greater situational awareness to react faster, smarter and more...
Hospital security always counts. Patients may arrive from a crime scene and someone has to make sure they weren’t followed by trouble. Doctors, nurses and other medical personnel may come under blame for the death of a loved one and need protection. Heightened security needs Think for a minute, though, about the elevated need for security when the victims of a massacre — such as the Orlando massacre — arrive at the hospital. On the heels of the shooting at the Pulse Nightclu...
Part 5 of our Security in Healthcare series It’s difficult for hospital security directors to provide a quantified ROI in an updated security system Several forces are working in favour of greater adoption of hospital security and video surveillance technologies in the healthcare market. “Healthcare facilities and campuses are growing at a rapid rate to accommodate an aging population and the research and development of pharmacology and many different type...
I’ve been hearing a lot of talk lately about the “user experience” or UX. UX is a techy term that refers broadly to how a customer uses a product, including both how the product operates and hundreds of other factors that can enhance – or conversely, can detract from – how a customer perceives and experiences a product. In SourceSecurity.com’s world of digital publishing, an optimum user experience is the Holy Grail. How a user experiences digital media, h...
Keeping surveillance networks secure can be a daunting task but there are several methods that can greatly reduce risk, especially when used in conjunction with each other. Below are 13 tips security and IT professionals can follow in order to keep an IP video surveillance network secure. 1. The stronger the password the better Strong passwords are the most basic security measure, but unfortunately ignored by many users. Many surveillance systems are deployed in the field with...
Big security trends are driving change in the physical security market. We see change happening around us every day, and much of it is disruptive to the status quo. We asked this week’s Expert Panel Roundtable: What has caused the greatest disruption to the physical security market in the last 12 months?
Time and attendance has proven to be a successful use of biometric technology traditionally used for controlling access to highly sensitive areas Security technology is increasingly being used to help organisations tackle challenges going far beyond controlling access to office buildings and monitoring parking lot activity. Video, in particular, has become the darling of many markets. Retailers use live and recorded video to assess promotional sales efforts. Manufacturers con...
Video surveillance plays a significant role in any comprehensive security plan, and the value derived from surveillance continues to expand Across the globe, organisations are challenged by a diverse risk landscape and a dynamic operational environment. The safety and security of people, assets and intellectual property are a No. 1 priority, and stakeholders look to gain continuous insight into what is happening at any given time. The ability to identify threats early and effi...
Body worn cameras are seen as improving accountability, and also can provide evidence in criminal trials Body worn cameras have realised a surge in demand across the United States in the current climate of concern about how police interact with citizens, especially when that interaction turns deadly. Embracing body worn cameras For example, Los Angeles has approved a $69.6 million plan to equip 7,000 Los Angeles patrol officers with body worn cameras by the end o...
Part 4 of our Security in Healthcare series Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-c...
Everything about wireless access control makes life easier for those who install and operate it A lot of market data crosses my desk at ASSA ABLOY. Sometimes it can be hard to spot patterns or pick out the trends. But not always. Some recent access control market research we commissioned pointed in one direction. Our conclusion? Slowly but surely, access control is becoming a wireless technology As the global leader in door opening solutions, we are able to survey a large,...
The appointment signals the growing Middle East demand for the IDIS Total Solution IDIS has appointed Wael Tanoukhi to the position of Technical Manager to support its growing customer base in the Middle East and North Africa (MENA). Based out of the IDIS MENA regional headquarters in Dubai, Wael will lead pre- and after sales technical support across the region. He will also oversee the IDIS training program for both installers and end-users as well as driving product-market...
As a society, we have been studying crime for years, with an eye to prevention. Now that mass shootings have seized our attention, experts have begun studying this particularly violent crime, again with an eye to prevention. “Our view is that inside a large enterprise — a corporation or government agency — anyone can be the risk you may face someday,” says Bryan Ware, CEO of McLean, Virginia-based Haystax Technology, a business that identifies risks b...
The LTO Program discusses how organisations are struggling to balance thebenefit of video surveillance with high costs and increasing legal parameters We live in a world where there is an increasing need for video surveillance for crime prevention and public security and safety. Video surveillance is being used in greater quantity and with higher quality expectations in airports, cities and workplaces around the globe. In fact, the average person is reportedly caught on a surv...
Part 3 of our Security in Healthcare series Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities Video is a major component of most hospital and healthcare security systems. Among the big video trends are greater integration of video with other systems, and increased use of higher-megapixel cameras and 180-degree and 360-degree-view cameras to monitor larger areas. Variety of video...
IFSEC 2016 attracted 27,052 attendees, in line with the 2015 attendance IFSEC International 2016, organised by UBM EMEA, has announced another hugely successful year for Europe’s largest security event, hosted from the 21st – 23rd June at ExCeL London.Volume of visitors IFSEC once again delivered an exceptional industry experience, attracting 27,052 attendees, in line with the 2015 attendance. The event saw a huge day one and two at IFSEC, with exhibitors overwhel...
What factors should an end user consider when looking for a professional systems solution provider? Andrew Schonzeit, President of IDESCO Corp., New York, knows what it takes to have an award-winning, top-in-its class systems integration company. For more than seven decades, the company has grown, morphed and continued to move into the world of value-add integrated solutions contracting. They’ve received numerous industry and business accolades and increased their statur...
How will the UK's decision to leave the European Union affect security cooperation between its member countries and with European countries? 'Strength through unity' is the term being used by pro-European economists observing the fall-out from Brexit, but it's surely an even more pertinent phrase for the security sector and this is being underlined in the most unexpected quarters. Fifty-six percent of the referendum votes cast in Northern Ireland were for 'Remain' and even sta...
A long and hard-fought primary season in the United States will culminate this month when the major political parties nominate their candidates officially at their national conventions in Cleveland and Philadelphia. The rancorous campaign has raised concerns about possible civil unrest associated with both conventions, but security planners say they have considered every eventuality. Beyond possible civil disturbances, there have been no credible threats made against either convention, authoriti...
Our society is engulfed in social media, from Facebook to Twitter to YouTube and all the rest. Among other benefits, social media provides an immediate and accessible form of communication. They say that social media is changing everything in our society, so we wondered what specific impact social media might have on the security marketplace. We asked this week’s Expert Panel Roundtable: What role can social media play in the security marketplace and/or as a tool to promote better security...
Matrix products connected Tyco's locations with a central location for time-attendance Security solutions provider Tyco has been delivering the latest solutions to unique business challenges in the security domain. With their global reach and wide range of products and services, Tyco has helped customers achieve their safety, security and business requirements with the right solutions. Time-Attendance challenge Tyco had an existing Time-Attendance system whi...
Melrose Industries PLC will acquire Nortek, Inc. for $86 per share in cash Nortek, Inc., a provider of air management and technology-driven solutions for residential and commercial applications, recently announced that it has signed an agreement and plan of merger with Melrose Industries PLC, a UK listed public company and Nevada Corp., a newly created wholly owned subsidiary of Melrose, to be acquired by Melrose for $86.00 per share in cash -- an estimated total enterprise va...
Just 0.4 percent of fixed-broadband subscribers in the US purchased a residential alarm system from an MSO in 2015 Although multi-system operators (MSOs) have made significant inroads into the residential alarm market; they still have a long way to go before they can claim to have truly conquered the traditional security provider’s stranglehold on demand. In fact, according to Jim Dearing, IHS Technology’s analyst, residential security, just 0.4 percent of fixed-br...
Browse security news
Featured products
Related videos
OPTEX REDSCAN mini series protects The Londoner Hotel
Hofbräuhaus in Munich relies on eCLIQ
What Alcatel-Lucent OmniVista Network Advisor can do for network infrastructure
Cybersecurity for enterprise: The essential guide to protecting your business
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
DownloadThe 2024 state of physical access trend report
Download- Zimbabwe Security companies
- Zimbabwe Manufacturers
- Zimbabwe Distributors
- Zimbabwe Resellers / Dealers / Reps
- Zimbabwe Installers
- Zimbabwe Consultants
- Zimbabwe Systems integrators
- Zimbabwe Events / Training / Services
- Zimbabwe Manned guarding
- Zimbabwe Training organisations
- Zimbabwe Associations / regulatory bodies
- Zimbabwe Event organisers
- Zimbabwe Media
- Zimbabwe Recruitment / personnel
- Zimbabwe Services