Nedap Security Management News

What Is An Open System? Is There A Consensus In The Marketplace Of The Definition Of “Open?”

Open systems are great at providing freedom for end user customers. But does the term “open system” mean the same thing throughout the industry? In the bad old days before the introduction and broad acceptance of open systems, security vendors produced proprietary systems that used only their own hardware and software. This locked in a customer to a specific vendor’s product line, and if another vendor offered a better product, the only way to get it was to switch to that vendo...

Nedap AOES Provides Global Security Access Solution For Unilever

Nedap provided Unilever with a new security solution for physical access to its sites across the world Unilever wanted to enhance user experience, increase security and reduce costs, and chose AEOS as the solution to this challenge. AEOS will secure 20,000 doors across more than 800 Unilever sites, as well as providing video surveillance and a range of other access management services.  Ian Dunning, Unilever’s Global Facilities Director, and Jeroen Gieling, Nedap&r...

How Can Integrators And End Users Stay Informed About The Changing Technology Landscape?

In a fast-moving market like physical security, sharing information is an essential component of growth. However, there often seems to be more information available than an integrator or end user could ever digest and put to use. How does one go about finding the information he or she needs in an environment that can seem to be drowning in information (sometimes the wrong information). We asked this week’s Expert Panel Roundtable to share their strategies and suggestions. Specifically, we...

How Can IP Networked Systems Adapt To Lost Connectivity?

IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/...

IFSEC Day 2: HD Analog, Video Compression And Drones

H.265 compression continued to be a popular topic from exhibitors on the second day of IFSEC Video beyond security, compression, HD over analog and integration were on the lips of several exhibitors at IFSEC International 2016. Strangely for a security exhibition, there were plenty of exhibitors talking about non-security applications on the second day of IFSEC International in London. For Axis Communications, Atul Rajput, Regional Director for Northern Europe, said the...

Nedap Demonstrates Open Standard For Electronic Offline Locks At IFSEC 2016

Standardization means that customers can use multiple electronic offline locks and handle them in the same way Nedap Security Management, the developer of the first open security management platform AEOS, is demonstrating the open standard for electronic offline locks at both the Nedap and the Assa Abloy stand at IFSEC 2016. Visitors to stand F1475 in Hall S7, at Excel, London, from 21st-23rd June will have the opportunity to see a live demonstration of the Open Security Stand...

ASSA ABLOY Access Control Demonstrates Live Integrations With Aperio At IFSEC 2016

ASSA ABLOY Access Control will demonstrate the new features of the leading Aperio product line ASSA ABLOY Access Control, a UK division of ASSA ABLOY, the global leader in door opening solutions, is demonstrating live integrations with Aperio at IFSEC 2016. Products And Integrations Visitors to stand E1100 in Hall S7, at Excel, London, from 21-23 June will have the opportunity to see the new features of the established, leading Aperio product line, as well as live integratio...

What Will Be The Security Market’s Biggest Surprise In 2016?

Will 2016 see faster adoption of video analytics? Will cyber-security have more impact on physical security? Is the market likely to see greater use of cloud-based products and services? Will technology help to drive greater involvement by everyday citizens in public safety initiatives? Could the market focus shift from selling products to selling solutions?  We asked this week’s SourceSecurity.com Expert Panel to look ahead to 2016, and these were some of the surprises they see in o...

Open, Software-Based Security System Crucial For Dealing With Changing Security Demands

Many security solutions available today have the problem of being insufficiently open, offering very limited flexibility. Integrating third-party products is practically impossible. Customers therefore very often have to make a long-term bet on just one vendor. Upgrading or expanding security systems is often complex, expensive and time-consuming. But the industry is changing. Initiatives like open standards and cooperation between suppliers are emerging to help companies react faster to changin...

What Markets Are Likely To Embrace Biometrics?

Historically, biometrics applications have often been thought of as specialized, high-tech and used predominantly in governmental markets. Everyday systems have tended toward card readers and keypads, while biometrics have been associated with high-security applications. Today, however, biometrics are much more mainstream. Fingerprint readers, in particular, are as near as our smart phones. Many other biometric applications are also becoming more common in a wide variety of markets. We asked thi...

Is There A Seasonal Impact On Security System Sales?

Any business sees its share of highs and low, of flare-ups and lulls. In the security market, several factors can impact general business trends, whether at the macro level or for an individual manufacturer or integrator. The economy is always a factor in the business climate, but are there others? We asked our Expert Panel to assess the impact of another variable – the seasons. Specifically, we asked this week’s Expert Panel: What is the seasonal impact on sales of security technolo...

Are Schools And Universities Safer These Days?

Violence in our schools and colleges often makes headlines, suggesting a growing and scary trend. A consequence of high-profile school shootings and other reports of violence is to increase awareness of the need to ensure safety and security of students, faculty and staff. The events have prompted more than one educational institution to take a second look at their security policies and infrastructure, with an eye toward improvement. But to what effect? Has greater awareness of violence in educa...

Can End Users Trust Advice From Security Salesmen?

Salesmen may face pressure to “seal the deal,” but might an overemphasis on the ABCs of selling (“always be closing”) actually work to the detriment of an unsuspecting customer coerced into buying too much (or the wrong) technology to meet his or her needs? Not likely, according to our Expert Panel, who this week address the topic of salesmanship in the security market. We asked: Can an end user trust a security salesman’s advice? Our responses are overwhelmingly in...

IFSEC 2015: Traka Integration Capabilities Receive Positive Response

Traka showed visitors how it’s key and asset management products can integrate with software Traka, the key and asset management specialist, reports positive feedback from the security industry after attending IFSEC 2015, with an overwhelming response to its integration capabilities. On its stand, Traka showed visitors first-hand how its key and asset management products can integrate with software like OnGuard from Lenel and AEOS from NEDAP. The event gave the comp...

Nedap Presents At IFSEC: How To Create A Security Solution Ready For Tomorrow’s Technology

Nedap developed a presentation about the innovation and integration of the new software release – AEOS v3.1 At IFSEC, Daryn Flynn, UK Security Business Manager, presented at the Innovation center and highlighted why the modular software (think ‘apps’) design of Nedap has never been more relevant. For those wanting to build security solutions that will offer performance today but also longevity and future adaptability, read on... The 3 i’s – IFSEC...

ASSA ABLOY To Exhibit Aperio Wireless Locking Technology At IFSEC 2015

Visitors will have the opportunity to see the world’s most comprehensive wireless lock range for security doors Access Control, a division of ASSA ABLOY UK, the global leader in door opening solutions is showcasing its revolutionary Aperio® wireless locking technology at this year’s IFSEC exhibition. Comprehensive Wireless Lock Visitors to stand D1700, will have the opportunity to see the world’s most comprehensive wireless lock range for security d...

What Are The Benefits Of Extended Service Contracts?

Seeking to manage uncertainty is part of the core mission of security professionals. When it comes to the technology systems they depend on every day, extended service agreements are a tool to manage uncertainty as it applies to system operation. We asked our Expert Panel this week to comment on how extended service contracts benefit users, integrators and/or suppliers. Their answers effectively enumerate multiple benefits to all parties involved. Ongoing service and maintenance help to ensure c...

How Does Globalization Impact The Physical Security Marketplace?

There’s almost no such thing as a local business anymore. Even the smallest of entrepreneurs find they have immediate access to a global marketplace via the Internet, and larger companies continue to find new ways to maximize their successes throughout the world. We asked our panelists this week to comment on how they see globalization impacting the physical security market. Their broad-ranging responses emphazis the opportunities and challenges of succeeding the global marketplace.

What Are The Cybersecurity Vulnerabilities Of IP Based Systems?

Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...

Security Training: How To Improve Among Integrators And End Users

The people element is a huge variable in the operation of any security system, and in any aspect of business for that matter. Training is a valuable tool to manage that variable, especially as it relates to newer, more complex networked physical security systems. Training can be a challenge throughout our market, which needs well-trained employees at the security front lines of our end users companies as well as competent, knowledgeable technicians handling installation and maintenance of securi...

Importance Of Upgrading Physical Security Systems

Regular upgrading ensures all systems communicate correctly  In the IT world, innovation moves quickly. New versions of software are launched every day to keep business processes running smoothly. So frequent upgrading isn’t even a choice anymore – it’s a must to avoid losing valuable time and data. In this article, Dirk Kappert, IT specialist and CEO of the German company ACEA, explains about the relevance of upgrade assurance and how it applies to phys...

What is the most underutilized technology in the security marketplace and why?

We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximize the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilizing existing technology capabilities are a waste of money, aren’t they?

Security Is Better Than Ever! The Industry Is Optimistic Looking To 2015

Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...

The Power Of Uncoupling Hardware And Software

Uncoupling software from hardware allows manufacturers to respond faster to changes Nedap Security Management 2014/2015 Review and Forecast:Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. External factors such as these do provoke change in physic...

How does commoditization impact the security market? How should manufacturers and/or integrators differentiate themselves?

How do you stand out in a world of commoditization? We live in a world of commoditized consumer goods. You probably own at least one item which would be considered "commoditized" by the majority of the population today, but you can probably also remember the days when it would have been described as "new" and "unique". Think about smart phones: most people you know are likely to own a smart phone. But remember when not everyone even a regular cell phone? Now they'r...

Standardizing Global Security To Minimize Risks And Budget

Security standardization reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...

Optimizing Business Security And Processes By Implementation Of Smart Reports

Reporting has a direct effect on an organization’s security and safety At what time of day do you have most people in your building? Do you have enough parking spaces for your employees? Are there always enough first aiders in the building to meet safety requirements? Security systems provide a wealth of data, which can provide the answers to these questions and more. By extracting reports from your system, you can gather valuable information to increase safety or improv...

Transforming The Security Industry With Open Standards

Innovation in the world of physical security systems tends to be a reactive response Threats such as Mifare hacking, the General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. Daryn Flynn, Business Development Manager at Nedap Security Management, states that external factors such as these do...

Nedap Security Management's “Sorting Out Role Based Access Control” Research Paper Wins Best Paper Award SACMAT 2014

Nedap's research paper demonstrated a solution to overcome complexity and enhance organizational scalability Researchers of Nedap Security Management have taken another perspective on role based access control, which allows for easier management of identities and authorisations and ultimately enhances organizational scalability. Their research paper “Sorting out role based access control” was awarded the Best Paper Award during the 2014 ACM Symposium on Access Cont...

IFSEC 2014 round-up in pictures

The SourceSecurity.com team attended this year's IFSEC International 2014 with great anticipation to view the new innovations first-hand on show and see how the move to London would impact visitor experience. To capture the show, we have provided a summary of IFSEC in pictures above. Highlights from IFSEC 2014 We saw an overwhelming number of people and products; here is a snapshot of our IFSEC experience for 2014: FLIR SourceSecurity.com attended FLIR’s press brie...