United Kingdom (UK) News

Wireless Electronic Locks: Opportunities For Security Integrators

Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realized in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labor costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportun...

Which Security Vertical Markets Are Impacted By Seasonal Changes In Demand?

The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?

Cyber-physical Security Event, ISC East Collaborate With Infosecurity North America & USE

ISC East, sponsored by the Security Industry Association (SIA), the Northeast's premier security industry convention for new products, solutions and technologies, announced its co-locating with Infosecurity North America and Unmanned Security Expo (USE). This move provides security professionals with even more opportunities to yield the benefits of robust educational sessions, listen to high-level speakers, explore new products and services, network with fellow security industry members and more...

SBN Applauds SIA Plans For Overhaul Of Its Licensing And Approved Contractor Scheme

Following a parliamentary review, the SIA has recommended a systematic and transformational approach to its regulations - a result supported by the Small Business Network (SBN), which is a security industry body made up of leading private security firms. SIA Licensing After long advocating for industry-wide, mandatory SIA licensing as well as an overhaul of the current Approved Contractor Scheme (ACS), the SBN is delighted to see progress on both fronts. They vehemently believe buyers of secur...

How To Choose The Right Storage Card For Video Surveillance Systems

With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data...

What’s New “on The Edge” Of Security And Video Surveillance Systems?

By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...

Preventing Workplace Violence: Considering The Instigator's Perspective

A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their...

ForeSight Medical, LLC Attains HITRUST CSF Certification To Manage Risk, Enhance Security Posture And Meet Compliance Requirements

ForeSight Medical, LLC, a renowned provider of surgical and implant cost-containment services, has announced that their ForeSight and Encompass applications have earned certified status for information security by HITRUST. HITRUST CSF Certified status HITRUST CSF Certified status demonstrates that the organization’s ForeSight and Encompass applications have met key regulations and industry-defined requirements and is appropriately managing risk. This achievement places ForeSight Medical,...

Six Reasons Security Integrators Should Adopt Cloud Technology Today

As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...

360 Advanced, Inc. Assist Silvervine Achieve Compliance With SOC 1 Data Security Standards

Silvervine, Inc. has demonstrated its continued commitment to data security and privacy by completing a meticulous outside audit of its System and Organization Controls 1 (SOC 1) Type 2 standards. The detailed examination that led to the achievement was administered by the IT assurance and compliance staff at 360 Advanced, a respected national Qualified Security Assessor, HITRUST CSF Assessor, and CPA firm based in St. Petersburg, Fla. Assurance and operational visibility Companies that compl...

360 Advanced Helps Hosting Complete Series Of 5 Rigorous Data Security Exams

Hosting, a pioneer in cloud computing and database services since 1997, has achieved an extraordinary status in its industry by completing a series of five data security examinations, including the Service Organization Controls (SOC) 1 and 2, HITRUST for healthcare, Payment Card Industry (PCI) standard of compliance, and penetration testing. The rigorous third-party examinations that led to compliance with the demanding series of data security standards were administered by...

HID Global Fargo DTC Printer Utilized To Provide Secure Access Systems At Maine School Districts

It began with a desire to help students fit in. Officials in Maine School Administrative District (MSAD) 58 introduced uniform bar-coded plastic ID cards to replace their existing color-coded punch cards so that students eligible for free lunches would not easily be identified by their friends. “In the past, students used punch cards to buy their lunches,” said Angel Allen, Technology Director for both MSAD 58 and neighboring district, MSAD 9. “The different colors identified t...

Userful Corporation Announces The Launch Of Version 9.10 Of Their Renowned Video Wall Solution

Userful Corporation, a renowned provider of display controller software, announced the new version 9.10 of its award-winning video wall solution that strengthens cloud features to give administrators more control of remote locations plus improved capabilities for users. Some of the new features include: Backup and Restore Server Settings via Userful Cloud - where administrators now can remotely backup and restore server settings from a central location. Upload content directly on the Signage...

GSX To Address Employees' Right To Store Firearms In Vehicles

One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable em...

How Can Security Manufacturers Improve After-sale Service?

What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of afte...

Integrated Security Systems For Medium And Large-sized Offices

If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access...

Five Best Practices For Protecting Video Surveillance Systems Against Cyber Threats

There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...

360 Vision Upgrades London Borough’s Camera System With Invictus To Ensure Public Safety At A Major Event

Invictus, the latest ruggedised PTZ camera from UK’s CCTV manufacturer 360 Vision Technology, has been installed against a tight deadline to cover a major public event in a north London Borough. Specified for installation by DSSL Group, the new high-performance 360 Vision Technology Invictus cameras were installed in record time, to complete the upgrade of the London Borough’s Public Safety camera system in time to ensure the safe passage of a major public event - as well as to play...

HID Global Awarded Prestigious RFID Award For The Industry’s First Tamper-evident IoT Beacon

HID Global, global provider of trusted identity solutions, announced that it has won the 2018 RFID Journal Live! Best New Product award for its new Mini Tamper-Evident Beacon, the industry’s first Bluetooth beacon to provide anti-theft protection for IoT-based location services and conditioning monitoring applications.  “The latest addition to our IoT services for asset management addresses the escalating need to protect sensitive assets and equipment in more connected and inte...

ASSA ABLOY Electronic Security Hardware Launches Securitron AQ Series Power Supplies For Access Control Systems

ASSA ABLOY Electronic Security Hardware announced the launch of the Securitron AQ Series Power Supplies, one of the most flexible, scalable solutions available, to protect and enhance the performance of any access control device or system. Available in one to 16 Amp variants to support the smallest single door systems to the largest enterprise access control systems, customers can use any combination of the seven power supplies and nine distribution boards in any UL listed enclosure and maintai...

Connected Technologies And Bosch Integration Facilitates Intrusion Detection And Access Control Services From A Single Interface

The cloud is an enabling technology that brings new opportunity to security dealers and integrators and a way to provide popular services to customers in every market vertical. A seamless integration between Bosch B and G Series Control Panels and Connect ONE by Connected Technologies LLC makes it simple for dealers to add intrusion detection and access control services from a single panel while using one interface to manage every customer. Bosch-Connected Tech Integration “We’re e...

President Signs Government Ban On Hikvision And Dahua Video Surveillance

The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the...

Honeywell Expands Performance Series Video Range Featuring NVRS And HQA, IP Cameras For Superior Video And Storage

Honeywell has expanded its line of Performance Series video product line with upgraded HQA (high quality analog) and IP cameras – including the line’s first IP PTZ camera – and Embedded NVRs. The enhanced products further expand Honeywell’s integrated turnkey video solution, which ensures more efficient, effective safety and security, reduces total cost of ownership, and reduces compliance and liability costs. Honeywell HQA And IP PTZ Cameras The updates to the Perform...

How To Optimize Mobile Access Control Authentication With Smart Devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...

Enhancing Video Surveillance Data Storage With Active Archive Solution

By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall vid...

Amthal Fire & Security Secures Mitsubishi Electric Contract

Amthal has been awarded a new support contract with global technology leaders Mitsubishi Electric Europe B.V, to upgrade and maintain security solutions at its UK Head Office, and across its regional UK offices. As one of the world’s leading names in the manufacture and sales of electrical products and systems, Mitsubishi Electric has eight regional offices, including its UK Head Office in Hatfield, supporting over 700 staff members. New Contract Details The new contract with Amthal cov...

Pulse Secure Ensures Enhanced Enterprise Security Posture With Automated Network Visibility, IoT Deployments And Threat Mitigation

Pulse Secure, global provider of enterprise Secure Access solutions has announced the release of Pulse Policy Secure 9.0 to enable organizations an easier, flexible and VPN-integrated path to next-generation Network Access Control (NAC). The latest release incorporates more than 36 new features and enhancements; advancing visibility, usability, endpoint and IoT security, and threat response capabilities. As a result, enterprises can strengthen their security posture and mitigate malware, data br...

Impact Of Data-driven Smart Cities On Video Surveillance

The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...

What Technology Will Impact Security Most In The Rest Of 2018?

Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?

Applying Biometric Authentication To Physical Access Control Systems

Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent o...

Related videos

Find Lost Wallet with Dahua WizSeek

Dahua Traffic Signal Controller Highlight

CLIQ Connect