Canada News
Network video recorders (NVRs) are at the center of today’s IP video systems. The video surveillance market includes a wide range of NVR choices for integrators and end users alike. NVR appliances include purpose-built machines that have embedded software systems as well as servers that are sold by video management system (VMS) software vendors and that have been pre-installed and preconfigured with their latest software capabilities. This article will take a loo...
IP video recording systems offer high-resimaging, speed & analytics to its end users Familiarity With Analog Systems Familiarity is one factor in the slow conversion of casino customers to IP technologies. Many end users and integrators are comfortable with and have long-term experience with the more simplistic analog systems. However, as IP systems continue to become easier to install and maintain with more plug-and-play technology, this dynamic should ch...
In a school security lockdown, teachers typically display red or green cards on the doors or in the windows of their classrooms. The manual procedure uses red cards to alert to a crisis condition; green cards designate that everything is safe inside the classroom or office. Color-Coded Crisis Management System Physical security company Sielox has adapted the idea of using a color scheme to characterize an emergency situation into its electronic security system. CLASS [Crisis Lockdown Alert Sta...
IP is here and is continuing to proliferate in the security industry and its next major advancement is in pure IP access control IP technologies in the security industry are nearly ubiquitous today. End users and integrators have adopted and embraced IP cameras, building automation systems, wireless mesh networks, alarms, monitoring, and regularly view all of these technologies from the palm of their hand, on their smart phone. The technologies are easier to in...
Increases in the number of cameras and storage capacity have created an overabundance of video information that is difficult to manage Investment in video surveillance technology continues to increase as technology improves and security equipment becomes more affordable. Companies invest in video surveillance primarily to protect people and property, for both deterrence and more crucially for incident response. While there’s no doubt that the systems can...
Executive protection can be costly, but it isa fraction of the loss that protecting a topexecutive could prevent Corporate security departments work hard to protect people and property. Executive protection is one of the key components of corporate security services. In fact, many corporate security departments are now taking on this new responsibility. “We are seeing more companies adopting executive protection as a normal part of corporate security,” says B...
The worst insider threats are existential, dangerous enough to literally destroy an organization The key to maintaining an effective security system is timely detection of security breaches. Widespread use of technology has resulted in massive amounts of data transfer which in turn makes organizations vulnerable to both internal and external threats. Mass shootings, data thefts and other internal breaches of security have cast a spotlight on the issue of insider threats. Accor...
College campuses often operate like small communities – or even like large communities depending on enrollment. Although each college and university campus is unique, there are commonalities such as a young and vulnerable population of students, many living away from their parents for the first time. Campuses can be urban or rural, geographically dispersed or densely populated, with a variety of demographics and “wild card” elements such as partying, drugs and alcohol. Campus p...
The sheer number of travelers and lack of passport control in the Schengen Area in Europe tests railroad security’s capabilities Railroad security faces the unenviable task of monitoring hundreds of thousands of passengers traveling between countries every day, and an attack on a train in Europe last month has cast a spotlight on the conflict between offering fast and efficient transport services while conducting thorough surveillance of passengers and luggage in transit...
To meet market and customer demand, AMAG Technology is proud to announce the release of the Symmetry EN-1DBC+ Single Door Controller. The IT centric edge-network controller offers advanced functionality, reliability and cost effectiveness in the deployment of a Symmetry access control system. AMAG Technology is a security management solution provider that specialises in, end-to-end access control, IP video and intrusion management solutions for the commercial and government markets. “Cust...
A variety of control and usage options are available for automated key management systems in data centers The protection of networks and data centers is a growing concern given the recent spate of high profile security breaches, and it is forcing organizations into taking serious steps to improve protection. For many businesses, this means implementing a combination of passive and active security measures designed to deter, detect and react against threats. Included in these m...
Most of today’s video surveillance cameras are capable of providing audio, but when should it be implemented? Acceptable uses of audio surveillance, as opposed to video, are a different concept in many jurisdictions worldwide. Privacy laws regarding audio may be more stringent than those for video, but both tend to center around the concept of an “expectation of privacy,” which may mean something different in the case of audio versus video. How can system designers and end user...
Successful video infrastructure management requires visibility into the network’s behaviour The importance of video in an organization has been growing over the past several years, almost exponentially. In retail, video images can help detect or deter theft by employees and patrons. Casinos use video partly due to state regulations, to ensure gaming activity is free of deceit or fraud. Branch offices use video to communicate with the head office. Schools use video for di...
Any wireless device can be a soft target for hackers Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure. Internet of Things Securi...
With the power of new technology and analytics, security systems could be used in other ways as well Security and surveillance systems are valuable beyond strictly providing compliance in the casino market. Even beyond ensuring physical security on premises outside the casino floor, systems are providing additional benefits including customer service, marketing and profitability, says Maureen Bruen, vertical market specialist – gaming, Honeywell Security Products Ame...
As a “futurist” for lock manufacturer Allegion, Robert C. Martens says he is “part strategist, part predictor” – looking at megatrends, current events, technology changes, and how those changes impact Allegion’s business customers and partners. Spanning both the commercial and residential businesses, Martens considers various scenarios for business leaders and partners, specifically regarding where technologies and electronics are going. Today, he spends a lo...
Camden Door Controls has introduced its new CX-ED2079 kit, a low profile ‘Universal’ grade 2 strike, with three stainless steel faceplates included. The strike features field selectable 12/24V AC/DC voltage, fail safe or fail secure operation, and horizontal adjustability of the strike body. Compatible with center-line latch entry cylindrical locksets with 1/2” to 5/8” (13mm to 16mm) latch projection, FCX-ED2079 strike comes with three stainless steel faceplates for ANS...
An eruption of violence at a church in Charleston, S.C., this June has increased awareness of the potential for such incidents at our houses of worship. On June 17 at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston, a 21-year-old attacker wielding a Glock 41 .45-caliber handgun took the lives of nine people. But it was far from the first security breach at a house of worship. In fact, since 1999, more than 500 people have died a violent death on church or faith-based prop...
Camden Door Controls has released its new CV-550SPK surface mount, weather and vandal resistant, backlit, stand-alone keypad with proximity card reader. Benefits Of Keypad/Reader The HID format prox reader and keypad supports up to 2,000 users with card, PIN, or card and PIN access. Rugged and attractive, the keypad/reader is designed for high traffic indoor and outdoor applications. CV-550SPK features a cast metal housing with fully potted electronics, making CV-550SPK both weather (IP 65 ra...
Manufacturers need to come to integrators with a multi-faceted approach on how a wholesale change could be made Dakota Security Systems Inc., Sioux Falls, S.D., a security systems integration company is nearly 40 years old and started as a lock shop. Eric Yunag, president and chief executive officer, has been at the helm of the award-winning company for nearly 10 years. In an exclusive Q&A, SourceSecurity.com asked Yunag what he looks for from his manufacturer-partners. S...
Airport and school safety systems have undergone major changes with variety of electronic and mechanical access control products Airport security has tightened ever since the September 9/11 catastrophic event. Post-incident investigation of such events often brings to light a particular weakness in security. As a result, security and safety protocols are developed in reaction to such traumatic events. Similar to the security measures adopted by airlines, school safety systems...
In casino surveillance, there must be an understanding of the behavior of thieves and cheats. In particular, casinos must understand how the behavior of a casino adversary differs from that of a legitimate guest. The end result of the understanding is that only threatening or fraudulent behavior is challenged, leaving other guests free to simply enjoy their visits to the casino. Responding to behavior anomalies requires understanding that comes from analytics capabilities eme...
Having leapt to the top of market share reports mostly selling inexpensive cameras, Hikvision USA is now making an aggressive play for large systems business at the top end of the market. Jeffrey He, President of Hikvision USA and Hikvision Canada, acknowledges that much of the company’s success to date has been in the low- to mid-sized systems market based on the “value proposition” of Hikvision’s inexpensive cameras. However, to succeed in the North American market, the...
Gallagher now incorporates LifeSafety Power enclosure as part of its access control product suite LifeSafety Power® and Gallagher have announced a partnership to integrate Underwriters Laboratories (UL)-listed powered cabinets into Gallagher’s leading access control solution. Gallagher - a global provider of integrated access control, intruder alarms management and perimeter protection, now incorporates a LifeSafety Power enclosure as part of the company&rsquo...
See larger image The 4K pixel density allows two times the digital zoom of a full HD 1080p camera CCTV cameras with higher resolution have proven their worth in casino settings. Now, 4K security cameras are gaining ground thanks to their ability to achieve full frame rate, which is required by many gaming jurisdictions. 4K is definitely the next resolution standard for casinos in the coming years, says Ron Grinfeld, director, global vertical marketing, DVTEL. DVTEL 4K Ca...
Small-timers with big ideas can always make their way into the industry In recent years, home automation technology has given birth to the “Smart Home” in which internet-enabled and controlled devices are bringing a new level of comfort to the standard house. From locking doors to setting the temperature to opening the blinds for a view of the sunset, technology is transforming the home into something reminiscent of the now-quaint 1960s sci-fi cartoon, The Jetsons....
More and more physical security systems are being hosted in the cloud. But are cloud-based security systems “safe?” It’s a question being posed by risk-averse security professionals all over the world, and one for which a clear, concise answer may be difficult to find. We decided to pose it to our Expert Panel.
Viscount Systems’ Freedom access control now secures the U.S. Department of Homeland Security, which uses the physical security system in dozens of field offices of Citizenship and Immigration Services (USCIS), the department’s largest agency. (Tentative plans by President Obama call for the number of USCIS sites to increase ten-fold.) For many access control companies, government business is difficult to win and may even prove elusive. It’s ironic, then, that Viscount’s...
Voice biometrics is fast becoming a security imperative due to increasing instances of fraud and identity theft. From identifying customers at banks and call centers to securing mobile devices in a “bring your own device” world, the use of a person’s unique “voiceprint” is fast gaining ground as an identifier. The global voice biometrics market is expected to reach $4.7 billion (U.S.) by 2020. Much of it is being driven by the increasing need to...
The key driver to growth in the IP market is the effectiveness and efficiency of the technology Technological advances in video surveillance are allowing end users the flexibility to do more with their systems than previously imagined. 2014 saw several new technological trends that shaped the future of the security market, with 4K and cyber security being the main drivers. The drift continues this year too with end users demanding HD video surveillance and wide-spread impl...
Browse security news
Featured products
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
The Key To Unlocking K12 School Safety Grants
DownloadHoneywell GARD USB Threat Report 2024
DownloadPhysical Access Control
DownloadThe 2024 State Of Physical Access Trend Report
DownloadThe Security Challenges Of Data Centers
Download- Canada Security companies
- Canada Manufacturers
- Canada Distributors
- Canada Resellers / Dealers / Reps
- Canada Installers
- Canada Consultants
- Canada Systems integrators
- Canada Events / Training / Services
- Canada Manned guarding
- Canada Training organisations
- Canada Associations / regulatory bodies
- Canada Event organisers
- Canada Media
- Canada Recruitment / personnel
- Canada Services
