Argentina News

Oncam Adds EVO-05 Outdoor And EVO-05 Recessed IP Cameras To Evolution 05 Mini Range

Oncam, the leading provider of 360-degree video capture and business intelligence technology, announced recently the addition of two new models to its Evolution 05 camera suite: the EVO-05 Mini Outdoor and the EVO-05 Mini Recessed cameras. Featuring the company’s patented 360-degree dewarping technology, Oncam’s EVO-05 Mini range packs a high-quality 5MP sensor and fisheye lens into an ultra-small and robust form factor with no moving parts. EVO-05 Mini Outdoor The EVO-05 Mini Outd...

Remote Power Management Of Networked Systems Offers Uninterrupted Security Services & New Business Opportunities

By adding remote monitoring to service contracts, dealers and end users bothbenefit from substantial cost savings while reducing potential downtime Whether upgrading an existing surveillance and/or access system from analog to IP, or installing a completely new system using structured cable, the ability to communicate, monitor and control IP devices delivers significant operational and economic benefits. The vast amounts of data these systems generate are useful in many ways &...

Benefits And Challenges Of Omnidirectional Cameras In Video Surveillance Market

As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...

Live Finger Detection Technology Reinforces Future Of Advanced Biometric Authentication

Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...

How Smartphone Access Control Credentials Strengthen Security And Minimize Risk To Organizations

PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...

Misguided Trust Leads To Increase In Security Risks And Potential Attack From Intruders

Stringent security policies are necessary in an organization to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

How Can Security Integrators Replace Revenue In The Age Of Commoditization?

As more security equipment categories become commoditized, a previously rich source of income for integrators and installers – markup – is becoming harder to come by. Less expensive products with little to no perceptible value differentiation leave integrators with few options, not to mention the growth of pricing transparency that comes courtesy of the Internet. We asked this week’s Expert Panel Roundtable: Given the increase in commoditized hardware (i.e., lower profit margin...

CCTV Budget Cuts Reduce Video Surveillance Expenditures And Camera Counts Across The UK, Except In London

Nationally from 2012 - 2015, there has been a decrease in the money spent on theinstallation, monitoring and maintenance of CCTV compared to the period 2009-2012 The UK has often been referred to as the world’s most watched country in terms of the scale of CCTV surveillance. But a new report claims that UK local authorities have reduced spending on the installation, maintenance and monitoring of public space CCTV systems, while the number of cameras being used is also do...

Developing Innovative Aviation Security Technologies To Prevent Future Terrorist Attacks

What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police office...

What Is An Open System? Interoperability Rises As A Security Trend, But Lacks An Exact Definition

Recently at a conference, one of my media colleagues asked an interesting, and basic, question: What exactly is an open system? Many of us think we know what an open system is, but the ensuing discussion provided several different answers, many of them centered on what an open system is NOT (rather than what it is). An open system does not limit a customer’s options. An open system provides maximum flexibility as a system evolves over time. In other words, an open system doesn’t l...

ISE Emphasize Need For Improved Hospital Security Program To Avoid Attacks On Specific Targets

ISE’s research shows that healthcare facilities & hospitals security programsto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security program can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see a w...

New Technologies Empower Visitor Management Systems To Improve Physical Security Efficiency And Cost-Effectiveness

Access control and visitor management are evolving and becoming more rooted in an organization’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organization’s overall physical sec...

IFSEC 2016: Engineers Of Tomorrow Annual Competition For Fire & Security Apprentice Engineers Now Fully-booked

64 of fire and security industry’s young engineers will head to IFSEC 2016 to put their skills against each other in live installation challenge IFSEC International, organized by UBM EMEA, have recently announced that all places on the prestigious Engineers of Tomorrow annual competition are now filled. 64 of the fire and security industry’s brightest young engineers will head to IFSEC International over the 21-23 June 2016 to put their skills against each other in...

2016 IFSEC And FIREX International Launch Inaugural ARC Village For UK’s Alarm Receiving Centers

The ARC Village, brought in association with CSL Dualcom, comprises of 8 exhibition booths surrounding a central networking area Europe’s leading security and fire industry events, IFSEC and FIREX International have recently launched the first ever ARC Village at 2016 shows located at London’s ExCeL on 21st to 23rd June. Providing an incisive platform for the UK’s alarm receiving centers to showcase their technical expertise and services, the ARC Village will...

Top 4 Indicators That An Access Control Vendor Is Customer-Service-Centric

Customer service is a vital part of any vendor’s business approach – from theplanning stages, to installation to maintenance of the access control system In today’s highly competitive and technology-rich security marketplace, an organization’s customer service is as important as the product solution they offer. Let’s face it, you will always remember if the customer service was terrible – or if it was great. Do they go the extra mile or do t...

High-Security Portable Crash Barriers Offer Security Integrators And Dealers New Expansion Opportunities

Portable crash barriers & traffic access control systems allow security integrators to expand their deployments for municipal surveillance and critical infrastructure The Pope does it. The Democratic and Republican National Conventions do it. Leading universities and police departments do it. Just what does this diverse list of people and organizations have in common? They have all used high-security portable barriers at their events with good success. According to manufa...

Access Control Challenges In A Changing World - From Managing Nurse Servers In Hospitals To Securing Sterile Facilities

ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...

New Access Control Technologies Offer Flexible Locking Solutions For Enterprise Security

End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15...

Hanwha Techwin Launches High Capacity Storage Solution In Partnership With Veracity

The combined solution consists of Hanwha Techwin’s cameras, SSM video management software and COLDSTORE storage Hanwha Techwin, (formerly Samsung Techwin), the globally renowned manufacturer of video surveillance is introducing a low power, high capacity storage solution in partnership with Veracity, the market leader in IP transmission and surveillance storage. The combined solution, encompassing the latest generation of high definition Hanwha Techwin’s camera...

ISONAS Global VP Of Sales Robert Lydic Highlights Importance Of IP Open Platforms For Access Control

IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends In Access Control Technology SourceSec...

ISC West 2016: Physical Security Industry Focuses On Incorporating Audio, Video And Other Safeguards In An Integrated Approach

Access control now includes a strong focus on the data integration sideof the business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...

Top 4 Trends Shaping The Future Of Physical Security Information Management (PSIM)

Many transformations have occurred that have caused PSIM’s true definition to be misunderstood and miscategorized The evolution of Physical Security Information Management (PSIM) over the past ten years has been rapid and transformative. In fact, according to a recent report from marketsandmarkets.com, the global physical security market, estimated to be $65.41 billion in 2015, is expected to reach $105.26 billion by the year 2020. At the forefront of this movement...

Impact Of The UK’s ‘Brexit’ EU Referendum On European Border Control And Other Security Measures

UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks o...

What Are The Physical Security Challenges Of “Safe Cities”?

Cities are increasingly connected using information and communication technologies, a trend often referred to as “smart cities.” In much the same way, “safe cities” initiatives are uniting businesses, city officials, law enforcement and other stakeholders in an effort to maximize the safety of businesses and citizens and to minimize theft and crime. Safe cities programs seek to leverage a variety of resources, including public-private partnerships, to make urban communiti...

Access Solutions Can Impact Sustainability Performance Across The Full Life-Cycle Of A Building

Embedding sustainability within any organization requires a broad, strategic perspective. Scrutiny should include the physical infrastructure itself: According to the IEA, buildings consume around 30% of global energy. These considerations are already part of many architecture and design workflows. The demand for green building certifications, for example, is growing among decision-makers in the built environment space, according to a recent survey of 4,000 professionals.  Building life-c...

Why Employing A Software System Is A Smart Way To Enhance Data Accuracy And Business Profitability

Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labor costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...

IDIS Integrates HD IP Dome Cameras With Genetec’s Security Center Open-architecture Unified Video Management Software

IDIS, a leading global security company that designs, develops, manufactures, and delivers IP surveillance solutions, announces that it is integrating a range of its market-leading high definition (HD) cameras with world-class video management software (VMS) from Genetec Inc. (Genetec™). Simplifies Management Of Security Operations And Situational Awareness The development – which builds on an established relationship – brings to market a powerful combination of IDIS network...

How Is The Role Of Women In The Physical Security Market Changing?

Women in Security will be a focus at this year's ISC West in Las Vegas, including targeted conference sessions and the Women in Security Forum Breakfast on Friday, April 12. As a preview of the upcoming events, let's revisit an Expert Panel Roundtable on this subject. We asked: How is the role of women in the physical security market changing and expanding?

Building An Effective Video Surveillance Data Infrastructure For Enhanced Storage And Performance

Pre-existing networks are not usually designed to support IP video cameras, so aparallel network for their exclusive use is best when it comes to storage The video storage boom shows no signs of slowing down. The talk is not typically how much storage; but where and how to store. Locally-housed (on-premises) storage continues to be the most cost-effective, along with providing the most control over your data. However, prior to considering the storage, it is important to look a...

Adopting Smart Security Operational Methods For Greener Businesses

Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...

Related videos

Time Challenge: Installation Of Battery Powered Aperio Cylinder

HID Powers Secure Mobile Banking For Santander International With HID Approve

Top-Of-The-Line Intercom Systems By DNAKE