South Africa News

How To Choose The Right Storage Card For Video Surveillance Systems

With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data...

What’s New “on The Edge” Of Security And Video Surveillance Systems?

By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...

Preventing Workplace Violence: Considering The Instigator's Perspective

A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their...

ForeSight Medical, LLC Attains HITRUST CSF Certification To Manage Risk, Enhance Security Posture And Meet Compliance Requirements

ForeSight Medical, LLC, a renowned provider of surgical and implant cost-containment services, has announced that their ForeSight and Encompass applications have earned certified status for information security by HITRUST. HITRUST CSF Certified status HITRUST CSF Certified status demonstrates that the organization’s ForeSight and Encompass applications have met key regulations and industry-defined requirements and is appropriately managing risk. This achievement places ForeSight Medical,...

Six Reasons Security Integrators Should Adopt Cloud Technology Today

As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...

360 Advanced, Inc. Assist Silvervine Achieve Compliance With SOC 1 Data Security Standards

Silvervine, Inc. has demonstrated its continued commitment to data security and privacy by completing a meticulous outside audit of its System and Organization Controls 1 (SOC 1) Type 2 standards. The detailed examination that led to the achievement was administered by the IT assurance and compliance staff at 360 Advanced, a respected national Qualified Security Assessor, HITRUST CSF Assessor, and CPA firm based in St. Petersburg, Fla. Assurance and operational visibility Companies that compl...

360 Advanced Helps Hosting Complete Series Of 5 Rigorous Data Security Exams

Hosting, a pioneer in cloud computing and database services since 1997, has achieved an extraordinary status in its industry by completing a series of five data security examinations, including the Service Organization Controls (SOC) 1 and 2, HITRUST for healthcare, Payment Card Industry (PCI) standard of compliance, and penetration testing. The rigorous third-party examinations that led to compliance with the demanding series of data security standards were administered by...

Userful Corporation Announces The Launch Of Version 9.10 Of Their Renowned Video Wall Solution

Userful Corporation, a renowned provider of display controller software, announced the new version 9.10 of its award-winning video wall solution that strengthens cloud features to give administrators more control of remote locations plus improved capabilities for users. Some of the new features include: Backup and Restore Server Settings via Userful Cloud - where administrators now can remotely backup and restore server settings from a central location. Upload content directly on the Signage...

GSX To Address Employees' Right To Store Firearms In Vehicles

One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable em...

How Can Security Manufacturers Improve After-sale Service?

What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of afte...

Integrated Security Systems For Medium And Large-sized Offices

If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access...

Five Best Practices For Protecting Video Surveillance Systems Against Cyber Threats

There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...

President Signs Government Ban On Hikvision And Dahua Video Surveillance

The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the...

How To Optimize Mobile Access Control Authentication With Smart Devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...

Enhancing Video Surveillance Data Storage With Active Archive Solution

By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall vid...

Impact Of Data-driven Smart Cities On Video Surveillance

The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...

What Technology Will Impact Security Most In The Rest Of 2018?

Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?

Applying Biometric Authentication To Physical Access Control Systems

Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent o...

VIVOTEK And Genetec Provide Video Surveillance Solution For Brazil’s Famous Gran Marquise Hotel

One of Fortaleza's largest hotels, the Gran Marquise Hotel, which hosts thousands of people each year and holds hundreds of events, has reinvented itself and converted analog technology to IP surveillance. Upon project completion, it is expected that the Gran Marquise will have 250 VIVOTEK network cameras installed, integrated and linked with all other hotel devices under Genetec’s cloud-based video-surveillance-as-a-service (VSaaS) solution, Stratocast. About Gran Marquise The Gran Marq...

Where Is It Inappropriate To Install Video Cameras?

Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can...

Highlighting The Importance Of Security Integrations And Alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emergi...

How SecuriThings Boosts Cybersecurity Across Multiple IoT Devices

As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a...

Pivot3 HCI Deployed To Ensure Robust Protection Of Critical Video Surveillance Data At Caesars Entertainment EMEA

Pivot3, the hyperconverged infrastructure performance and technology provider, announced Caesars Entertainment EMEA has deployed Pivot3 HCI to ensure robust protection of critical video surveillance data and to future-proof its IT infrastructure to support a wider range of workloads. Support Multiple Mission-Critical Workloads Pivot3 unifies storage, compute and virtualisation resources into a powerful, easy-to-deploy solution that reduces cost, IT complexity and organizational risk. With Pivo...

Vanderbilt’s SPC IP Security System Protects Coop Retail Chain In Switzerland

Coop wanted a security system to protect a number of their valuable instore goods, such as home electronics, cell phones, and tablets, perfumes, and jewelry. They wanted a modular alarm system that could transmit reliably with the most modern means of communication to the standard alarm receiving centers in Switzerland. They also wanted a solution that had proven reliability and fast alarm detection, and that was certified according to SES EN standards. It was essential that this solution would...

Costar Technologies' Acquisition Of Arecont Vision Approved By Bankruptcy Court

Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced that the acquisition by Costar Technologies, Inc. (OTC markets Group: CSTI) of its assets has been approved by the bankruptcy court (“Court”). It is anticipated that the sale will close on July 13, 2018. As previously announced, Arecont Vision initiated proceedings under chapter 11 of the United States Bankruptcy Code in the District of Delaware in May, 2018 and has achieved its goal...

Physical And Cyber Security Precautions When Traveling

Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats....

What Are The Security Challenges Of The Hospitality Market?

Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...

Video Analytics Trends: Security And Business Intelligence

In the physical security space, video analytics have historically over-promised and under-delivered, often leaving end users sceptical about their capabilities. However, increased integration with security solutions and other business systems, as well as developments in deep learning and artificial intelligence (AI), have given video analytics a significant boost in recent years. Here, we take a look at the key trends putting video analytics in the spotlight, and how this opens up new opportunit...

Mass Transit Security Evolves With Modern Security Solutions

As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveler safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundr...

Are Mobile Credentials More Secure Than Smart Cards?

For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, al...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems