Argentina News
Oncam, the leading provider of 360-degree video capture and business intelligence technology, announced recently the addition of two new models to its Evolution 05 camera suite: the EVO-05 Mini Outdoor and the EVO-05 Mini Recessed cameras. Featuring the company’s patented 360-degree dewarping technology, Oncam’s EVO-05 Mini range packs a high-quality 5MP sensor and fisheye lens into an ultra-small and robust form factor with no moving parts. EVO-05 Mini Outdoor The EVO-05 Mini Outd...
By adding remote monitoring to service contracts, dealers and end users bothbenefit from substantial cost savings while reducing potential downtime Whether upgrading an existing surveillance and/or access system from analog to IP, or installing a completely new system using structured cable, the ability to communicate, monitor and control IP devices delivers significant operational and economic benefits. The vast amounts of data these systems generate are useful in many ways &...
As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...
Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...
PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...
Stringent security policies are necessary in an organization to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...
As more security equipment categories become commoditized, a previously rich source of income for integrators and installers – markup – is becoming harder to come by. Less expensive products with little to no perceptible value differentiation leave integrators with few options, not to mention the growth of pricing transparency that comes courtesy of the Internet. We asked this week’s Expert Panel Roundtable: Given the increase in commoditized hardware (i.e., lower profit margin...
Nationally from 2012 - 2015, there has been a decrease in the money spent on theinstallation, monitoring and maintenance of CCTV compared to the period 2009-2012 The UK has often been referred to as the world’s most watched country in terms of the scale of CCTV surveillance. But a new report claims that UK local authorities have reduced spending on the installation, maintenance and monitoring of public space CCTV systems, while the number of cameras being used is also do...
What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police office...
Recently at a conference, one of my media colleagues asked an interesting, and basic, question: What exactly is an open system? Many of us think we know what an open system is, but the ensuing discussion provided several different answers, many of them centered on what an open system is NOT (rather than what it is). An open system does not limit a customer’s options. An open system provides maximum flexibility as a system evolves over time. In other words, an open system doesn’t l...
ISE’s research shows that healthcare facilities & hospitals security programsto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security program can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see a w...
Access control and visitor management are evolving and becoming more rooted in an organization’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organization’s overall physical sec...
64 of fire and security industry’s young engineers will head to IFSEC 2016 to put their skills against each other in live installation challenge IFSEC International, organized by UBM EMEA, have recently announced that all places on the prestigious Engineers of Tomorrow annual competition are now filled. 64 of the fire and security industry’s brightest young engineers will head to IFSEC International over the 21-23 June 2016 to put their skills against each other in...
The ARC Village, brought in association with CSL Dualcom, comprises of 8 exhibition booths surrounding a central networking area Europe’s leading security and fire industry events, IFSEC and FIREX International have recently launched the first ever ARC Village at 2016 shows located at London’s ExCeL on 21st to 23rd June. Providing an incisive platform for the UK’s alarm receiving centers to showcase their technical expertise and services, the ARC Village will...
Customer service is a vital part of any vendor’s business approach – from theplanning stages, to installation to maintenance of the access control system In today’s highly competitive and technology-rich security marketplace, an organization’s customer service is as important as the product solution they offer. Let’s face it, you will always remember if the customer service was terrible – or if it was great. Do they go the extra mile or do t...
Portable crash barriers & traffic access control systems allow security integrators to expand their deployments for municipal surveillance and critical infrastructure The Pope does it. The Democratic and Republican National Conventions do it. Leading universities and police departments do it. Just what does this diverse list of people and organizations have in common? They have all used high-security portable barriers at their events with good success. According to manufa...
ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...
End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15...
The combined solution consists of Hanwha Techwin’s cameras, SSM video management software and COLDSTORE storage Hanwha Techwin, (formerly Samsung Techwin), the globally renowned manufacturer of video surveillance is introducing a low power, high capacity storage solution in partnership with Veracity, the market leader in IP transmission and surveillance storage. The combined solution, encompassing the latest generation of high definition Hanwha Techwin’s camera...
IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends In Access Control Technology SourceSec...
Access control now includes a strong focus on the data integration sideof the business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...
Many transformations have occurred that have caused PSIM’s true definition to be misunderstood and miscategorized The evolution of Physical Security Information Management (PSIM) over the past ten years has been rapid and transformative. In fact, according to a recent report from marketsandmarkets.com, the global physical security market, estimated to be $65.41 billion in 2015, is expected to reach $105.26 billion by the year 2020. At the forefront of this movement...
UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks o...
Cities are increasingly connected using information and communication technologies, a trend often referred to as “smart cities.” In much the same way, “safe cities” initiatives are uniting businesses, city officials, law enforcement and other stakeholders in an effort to maximize the safety of businesses and citizens and to minimize theft and crime. Safe cities programs seek to leverage a variety of resources, including public-private partnerships, to make urban communiti...
Embedding sustainability within any organization requires a broad, strategic perspective. Scrutiny should include the physical infrastructure itself: According to the IEA, buildings consume around 30% of global energy. These considerations are already part of many architecture and design workflows. The demand for green building certifications, for example, is growing among decision-makers in the built environment space, according to a recent survey of 4,000 professionals. Building life-c...
Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labor costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...
IDIS, a leading global security company that designs, develops, manufactures, and delivers IP surveillance solutions, announces that it is integrating a range of its market-leading high definition (HD) cameras with world-class video management software (VMS) from Genetec Inc. (Genetec™). Simplifies Management Of Security Operations And Situational Awareness The development – which builds on an established relationship – brings to market a powerful combination of IDIS network...
Women in Security will be a focus at this year's ISC West in Las Vegas, including targeted conference sessions and the Women in Security Forum Breakfast on Friday, April 12. As a preview of the upcoming events, let's revisit an Expert Panel Roundtable on this subject. We asked: How is the role of women in the physical security market changing and expanding?
Pre-existing networks are not usually designed to support IP video cameras, so aparallel network for their exclusive use is best when it comes to storage The video storage boom shows no signs of slowing down. The talk is not typically how much storage; but where and how to store. Locally-housed (on-premises) storage continues to be the most cost-effective, along with providing the most control over your data. However, prior to considering the storage, it is important to look a...
Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...
Browse security news
- By event
- India Cyber Revolution Summit 2024
- The Fire Safety Event 2024
- The Security Event Birmingham 2024
- 6th Middle East Retail & Commerce Summit & Awards
- RSA Conference 2024
- Security & Fire Expo Mumbai 2024
- SAFE-Security and Fire Expo West India 2024
- Disasters Expo Europe 2024
- Angola Cyber Revolution Summit 2024
- World CyberCon META 2024
- 3rd Annual National Congress on Counter UAS Technology
- View more
Featured products
Related videos
Time Challenge: Installation Of Battery Powered Aperio Cylinder
HID Powers Secure Mobile Banking For Santander International With HID Approve
Top-Of-The-Line Intercom Systems By DNAKE
The Truth Behind 9 Mobile Access Myths
Download5 Surprising Findings From OT Vulnerability Assessments
DownloadMulti-Residential Access Management And Security
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadBank Security
Download- Argentina Security companies
- Argentina Manufacturers
- Argentina Distributors
- Argentina Resellers / Dealers / Reps
- Argentina Installers
- Argentina Consultants
- Argentina Systems integrators
- Argentina Events / Training / Services
- Argentina Manned guarding
- Argentina Training organisations
- Argentina Associations / regulatory bodies
- Argentina Event organisers
- Argentina Media
- Argentina Services
- Argentina Recruitment / personnel