Azerbaijan News
Userful Corporation, a renowned provider of AV-over-IP solutions for enhanced video communication since 2015, announced that Sigma Alimentos, a popular global branded refrigerated food company, has deployed Userful video wall technology at its headquarters’ main control room. Sigma Alimentos is headquartered in Monterrey, Mexico, and maintains operations in the U.S., Mexico, Latin America, and Europe. The company’s 2017 revenues totaled more than 3 billion and it deploys a fleet of...
The fragmented nature of the security and safety equipment market has brought manufacturers, integrators and other market players together to drive the need for integrated, interoperable systems. As a global distributor of Network and Security Solutions, Anixter Inc. has joined the Open Security & Safety Alliance, a new partnership of global security, safety and building automation organizations, to help develop a framework of common standards, best practices and specifications that address...
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understan...
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level...
Provider of secure payments BITEL has recently launched a new point of sale (POS) terminal that features a fingerprint sensor manufactured by ARATEK, the pioneer in biometric authentication. Easy Integration “We are pleased to introduce the IC7200 featuring ARATEK capacitive A400-M fingerprint sensor,” said Mark Chun, senior sales manager for BITEL. The new model IC7200 is designed to be implemented for mobile payment, retail and social welfare distribution in various countri...
The best route to greater adoption of robotics in the field of physical security is intellectual honesty, says Travis Deyle, CEO and co-founder of Cobalt Robotics. “Robots are not a panacea, so we must be clear and honest about capabilities and use cases,” he says. “If you are dishonest, people will lose faith. We must have clear expectations about what’s feasible today and possible tomorrow.” The robotics tide is turning in the security market, which is notoriousl...
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on t...
Userful Corporation, one of the world's pioneering developers of software for visual display solutions, announced that the Calgary Public Library has deployed 200 of Userful’s collaborative displays throughout its network of libraries, including the brand new 240,000 square foot central branch in the heart of downtown Calgary. "The new library features a wide range of innovations and Userful Corporation is proud to be associated with the project." "The company’s visual display solut...
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new wit...
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a video surveillance system and why?
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focu...
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centers, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wire...
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to unders...
As cybersecurity has become a boardroom issue, there is an increasing call for the financial exposure from cyber risk to be measured. This enables financial appraisal of cybersecurity investments and informs decisions on cybersecurity insurance. Applying quantitative techniques to cybersecurity has long been considered a complex, if not impossible task due to the large number of factors to consider each with varying degrees of uncertainty and the lack of relevant, contextual data on cyber breac...
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors...
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact canno...
Video surveillance systems have proven to not only be a deterrent to crime, but are also now being used to collect data points to actually help detect abnormal behaviours which can alert authorities of potentially evolving situations. In either case, recorded video is critical for investigations to provide all but irrefutable evidence to prove or disprove that an incident took place and the identity of the individuals involved. Sounds like a pragmatic approach that’s quite simple in...
Tepe Security, which provides private electronic security services for individuals and corporations, became the fastest responding company to customer complaints with 51 minutes. Tepe Security Customer Services made a difference in the sector with the fast resolution time it brought to the complaints regarding Tepe Security alarm systems published on sikayetvar.com in 2017. According to the 2017 data of Complaintvar.com, Tepe Security resolved the complaints in a short time like 51 minut...
Userful Corporation, one of the world's leading developer of software for visual display solutions, announced that it has surpassed the one million mark for displays supported globally. With customers in more than 100 countries in various markets, Userful is the trusted provider for industry leaders such as Capital One, Hewlett Packard, Hilton, NASA, Nestle, and Schlumberger. “We partner with Userful because we love the adaptability and flexibility of their solutions,” said Marielle...
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panelists explain. We asked: What new technologies a...
Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?
Tripp Lite, a global manufacturer of power protection and connectivity solutions, has released a new line of secure KVM switches. All 11 models are on the National Information Assurance Partnership (NIAP) list of compliant products, having achieved certification for Protection Profile v3.0 (vPP3.0) for Peripheral Sharing Switches. This NIAP certification holds IT networking products to high standards for data protection capabilities, meeting the strict security needs of the U.S. military and go...
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, N.Y., would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smar...
Hikvision showcased their latest alarm solutions at Security Essen, with a keen focus on integration, demonstrating the company’s commitment to providing extensive security solutions to customers for a wide range of applications. The Hikvision alarm solutions demonstrated the full range of products and technologies available and how they can all be utilized together - covering any security need - all from one provider. Intrusion and video verification “We had a great show with lot...
Video analytics capabilities and privacy protection enhancements are among several highlights that Honeywell has added to its equIP® Series Cameras line, and MAXPRO® network video recorders (NVR) and video management system (VMS). The expanded capabilities are designed to help protect complex building environments, while improving user friendliness for operators and reducing overall cost of operation. The updated camera technology and new analytic features include Tripwire, Intru...
HID Global®, a provider of identity solutions, announced it has dramatically elevated the machine learning capabilities in its HID Condition Monitoring solution through high-bandwidth vibration sensors that help manufacturing facilities employ AI-based technology to monitor the health and performance of motors, rotating equipment, and other assets. The cost-effective solution makes it possible for plant managers to extend their predictive maintenance strategies to all factory assets t...
Browse security news
Featured products
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
The Key To Unlocking K12 School Safety Grants
DownloadHoneywell GARD USB Threat Report 2024
DownloadPhysical Access Control
DownloadThe 2024 State Of Physical Access Trend Report
DownloadThe Security Challenges Of Data Centers
Download- Azerbaijan Security companies
- Azerbaijan Manufacturers
- Azerbaijan Distributors
- Azerbaijan Resellers / Dealers / Reps
- Azerbaijan Installers
- Azerbaijan Consultants
- Azerbaijan Systems integrators
- Azerbaijan Events / Training / Services
- Azerbaijan Manned guarding
- Azerbaijan Training organisations
- Azerbaijan Associations / regulatory bodies
- Azerbaijan Event organisers
- Azerbaijan Media
- Azerbaijan Recruitment / personnel
- Azerbaijan Services
