Sweden News
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
Located in the middle of the deep forests of Småland in the south of Sweden, the Strandudden Gated Community has been designed to provide a safe environment for homeowners who wish to enjoy a high quality of life. The first phase of the development has seen the construction of 18 apartments which have stunning lake views. The materials and features of each apartment have been carefully selected to ensure sustainable energy consumption. When the development is completed, over 100 Wisenet c...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
The Boring Labs announces its Boring Toolbox, a series of functional tools that help enterprises and integrators more efficiently manage medium-to-large distributed video surveillance/security networks using Milestone XProtect Express+, XProtect Professional+, XProtect Expert and XProtect Corporate. Initial tools include hardware/device name, password and device-group management that reduce the time spent on these manual functions by up to 97%. “While working as a leading Milestone integr...
Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understan...
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level...
Provider of secure payments BITEL has recently launched a new point of sale (POS) terminal that features a fingerprint sensor manufactured by ARATEK, the pioneer in biometric authentication. Easy Integration “We are pleased to introduce the IC7200 featuring ARATEK capacitive A400-M fingerprint sensor,” said Mark Chun, senior sales manager for BITEL. The new model IC7200 is designed to be implemented for mobile payment, retail and social welfare distribution in various countri...
The best route to greater adoption of robotics in the field of physical security is intellectual honesty, says Travis Deyle, CEO and co-founder of Cobalt Robotics. “Robots are not a panacea, so we must be clear and honest about capabilities and use cases,” he says. “If you are dishonest, people will lose faith. We must have clear expectations about what’s feasible today and possible tomorrow.” The robotics tide is turning in the security market, which is notoriousl...
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on t...
Userful Corporation, one of the world's pioneering developers of software for visual display solutions, announced that the Calgary Public Library has deployed 200 of Userful’s collaborative displays throughout its network of libraries, including the brand new 240,000 square foot central branch in the heart of downtown Calgary. "The new library features a wide range of innovations and Userful Corporation is proud to be associated with the project." "The company’s visual display solut...
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new wit...
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a video surveillance system and why?
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focu...
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centers, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wire...
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to unders...
As cybersecurity has become a boardroom issue, there is an increasing call for the financial exposure from cyber risk to be measured. This enables financial appraisal of cybersecurity investments and informs decisions on cybersecurity insurance. Applying quantitative techniques to cybersecurity has long been considered a complex, if not impossible task due to the large number of factors to consider each with varying degrees of uncertainty and the lack of relevant, contextual data on cyber breac...
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors...
Cosmo Music was established in Richmond Hill, Ontario, Canada in 1968. Its current 56,000 sq ft store opened in 2008, making it the largest music instrument store in North America. It is also home to the Cosmopolitan Music Hall venue. Needing to replace a 20-year-old analog video system, Cosmo Music Vice President and COO Rudi Brouwers, started researching modern video management software (VMS). Initially he intended to purchase IP cameras and a basic VMS with the ability to record and playback...
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact canno...
Video surveillance systems have proven to not only be a deterrent to crime, but are also now being used to collect data points to actually help detect abnormal behaviours which can alert authorities of potentially evolving situations. In either case, recorded video is critical for investigations to provide all but irrefutable evidence to prove or disprove that an incident took place and the identity of the individuals involved. Sounds like a pragmatic approach that’s quite simple in...
Figures from the 2018 edition of ‘The Wireless Access Control Report’ show continued strong growth for wireless vs. wired solutions. Why do you think security and facility managers are “cutting the wires” more and more? Advantages Of Wireless Access Control The energy-efficiency of wireless doors delivers significant cost savings"Russell Wagstaff, Director for Commercial Access Solutions, ASSA ABLOY EMEA says, “Among the many advantages of wireless discussed in th...
Tepe Security, which provides private electronic security services for individuals and corporations, became the fastest responding company to customer complaints with 51 minutes. Tepe Security Customer Services made a difference in the sector with the fast resolution time it brought to the complaints regarding Tepe Security alarm systems published on sikayetvar.com in 2017. According to the 2017 data of Complaintvar.com, Tepe Security resolved the complaints in a short time like 51 minut...
Userful Corporation, one of the world's leading developer of software for visual display solutions, announced that it has surpassed the one million mark for displays supported globally. With customers in more than 100 countries in various markets, Userful is the trusted provider for industry leaders such as Capital One, Hewlett Packard, Hilton, NASA, Nestle, and Schlumberger. “We partner with Userful because we love the adaptability and flexibility of their solutions,” said Marielle...
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panelists explain. We asked: What new technologies a...
Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?
Tripp Lite, a global manufacturer of power protection and connectivity solutions, has released a new line of secure KVM switches. All 11 models are on the National Information Assurance Partnership (NIAP) list of compliant products, having achieved certification for Protection Profile v3.0 (vPP3.0) for Peripheral Sharing Switches. This NIAP certification holds IT networking products to high standards for data protection capabilities, meeting the strict security needs of the U.S. military and go...
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, N.Y., would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smar...
Hikvision showcased their latest alarm solutions at Security Essen, with a keen focus on integration, demonstrating the company’s commitment to providing extensive security solutions to customers for a wide range of applications. The Hikvision alarm solutions demonstrated the full range of products and technologies available and how they can all be utilized together - covering any security need - all from one provider. Intrusion and video verification “We had a great show with lot...
Browse security news
Featured products
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
The Key To Unlocking K12 School Safety Grants
DownloadHoneywell GARD USB Threat Report 2024
DownloadPhysical Access Control
DownloadThe 2024 State Of Physical Access Trend Report
DownloadThe Security Challenges Of Data Centers
Download- Sweden Security companies
- Sweden Manufacturers
- Sweden Distributors
- Sweden Resellers / Dealers / Reps
- Sweden Installers
- Sweden Consultants
- Sweden Systems integrators
- Sweden Events / Training / Services
- Sweden Manned guarding
- Sweden Training organisations
- Sweden Associations / regulatory bodies
- Sweden Event organisers
- Sweden Media
- Sweden Services
- Sweden Recruitment / personnel
