Access control software News

Johnson Controls Enriches Mission-Critical Functionality With v5.4 Of victor VMS And VideoEdge NVRs

Johnson Controls announces the release of the newest version of Tyco victor video management and VideoEdge NVR systems designed to provide users with mission-critical, enterprise-level solutions, while also furthering the solution’s cyber position and evolving the unification between victor/VideoEdge and Tyco Software House C•CURE 9000 security and event management platform. The release of version 5.4 offers dynamic features to flexibly support hundreds of cameras, empower facial bio...

Prey For Education Centralizes And Automates Mobile Device Security Management For Schools

Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Prey for Education, a mobile security feature-set offering developed to address the needs of K-12 and higher education environments. Co-designed with partnered schools, Prey for Education centralizes and automates mobile device security management so that hard-pressed school IT staff can delegate and automate tasks and ease their workflow. This initial featu...

Hikvision Releases Its Year-Over-Year (YoY) Growth Report For The First Half Of 2019

Hikvision, the provider of innovative security products and solutions, reports a total operating revenue of RMB 23.92 billion for the first half of 2019, representing a year-over-year (YoY) growth of 14.60%. Net profits attributable to shareholders of the Company amounted to RMB 4.22 billion, a growth of 1.67% YoY. The Company also reported strong financial performance during the second quarter of 2019, with 21.46% growth YoY in total operating revenue and 14.98% growth YoY in net profits. Mai...

Radware’s DefenseSSL System Features Behavioral-Based Algorithms To Prevent HTTPS Flood Attacks

Radware® a provider of cyber security and application delivery solutions, announces that its SSL DDoS attack protection, DefenseSSL®, now features behavioral-based algorithms for keyless protection against HTTPS flood attacks. For the first time, organizations have the scale needed to effectively mitigate HTTPS floods. According to Google, the majority of internet traffic is now encrypted and accounts for more than 70% of internet pages. While SSL/TLS encryption is critical for many asp...

Niagara Networks And L7 Defense Partners To Bring Zero Trust Security To API Communication

Niagara Networks, the Open Visibility Platform pioneer, and L7 Defense, a cutting-edge cyber security vendor, announces that they have formed a partnership to bring Zero Trust security to API communication running across an organization’s network. The L7 Defense application runs directly on Niagara Networks Open Visibility Platform which provides it full access to network traffic. The Open Visibility Platform offers enterprises, for the first time, on-demand deep cyber defense into their...

Ontic Technologies Offer Proactive Protection That Leverages Deep Analytics And Intelligence To Secure Enterprises

Ontic Technologies, the globally renowned provider of protective intelligence security software, delivers technology to empower security teams, in order to protect assets, employees and customers. In the modern world, organizations and their employees, clients, customers, and their physical assets may come under some kind of threat or attack, at any time. Protection that leverages deep analytics Investments in physical and other security systems have already been made, to protect these critica...

GlobalPlatform To Host Free-To-Attend Technical Workshops To Explain Deployment And Use Of Secure Devices

GlobalPlatform, the standard for secure digital services and devices, will host free-to-attend technical workshops in Shenzhen, China on 24th and 25th September. Both workshops will focus on device security and the deployment and use of secure devices. The agendas on both days are identical and will investigate key GlobalPlatform technologies and provide participants with opportunities to interact with subject matter experts. Presentations will explore Root of Trust and secure component technol...

Genetec Partners With Cylance To Provide AI-Based Antivirus Protection To Its Customers

Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that it is partnering with Cylance, a business unit of BlackBerry, Limited, to bring AI-based antivirus protection to its appliances customers. Through this partnership, Genetec will offer additional cyber security protection to its Streamvault™ family of infrastructure solutions by including CylancePROTECT out-of-the-box at no additional cost to its customers...

Aratek Marshall 5 With ePassport-Reading Capability Allows For Tighter Border Control & Better Immigration Security

The Aratek Marshall 5, an all-in-one biometric handheld device that makes ‘identification-anywhere’ a reality, is expected to help immigration authorities implement tighter border control measures with its MRZ reading capability for ePassports and other travel documents. The powerful biometric handheld terminal allows immigration authorities to effect stricter border controls. Biometric handheld terminal Aratek’s flagship device features the Access-IS OCR310e miniature OCR r...

AMAG’S Access Control System Named One Of The Best Business Tools Of 2019

The Newsweek Best Business Tools list recognizes the Symmetry access control system based on ratings in categories such as trust, service promise, reliability, security, and satisfaction.   Symmetry platform AMAG’s Symmetry platform provides reliable, actionable data to help customers make better business decisions" “I am honored and excited to have our Symmetry Access Control software recognized as a Best Business Tool by Newsweek,” said AMAG Technology President,...

Eagle Eye Cloud VMS Surveillance Product Integrated Via Cloud Within Salto KS Application

Eagle Eye Networks, the provider of cloud video surveillance worldwide, announced a new partnership with Salto Systems, a global provider of access control systems. In the new and improved Salto KS application, the Eagle Eye Cloud VMS Surveillance product has been integrated via cloud to provide Salto KS customers a more cyber-secure video experience connected to access control events. Within the Salto KS mobile app, a user can confirm a person’s identity before remotely granting access t...

GET Group NA Announces NFC Support On iOS For mDL And Mobile ID Transactions At POS And Airports

GET Group North America,  an innovative developer of mobile ID technology with over 20 years of experience in identity management, announced that its GET Mobile ID Digital Identity Solution for iOS can support near-field communication (NFC) for identity transactions at Point of Sale (POS), airports, and even kiosks. GET Mobile ID for Android already supports NFC identity transactions. GET Group NA and global partner Scytáles AB, innovative developers of mobile ID technology, are the...

Allied Universal To Deliver Innovative Security Solutions To Shetler Security Services Clients Post Acquisition

Allied Universal, a security and facility services company in North America, has acquired Shetler Security Services, a Phoenix, Ariz.-based company offering security solutions on a national level. Terms of the deal were not disclosed. “The acquisition of Shetler Security Services aligns perfectly with our long-term strategic plan of adding exceptional security professionals and valuable resources into local markets around the country,” said Steve Jones, CEO of Allied Universal. &ldq...

AlertEnterprise’s Software Selected By LAWA As The Identity Management And Credentialing System For Los Angeles International Airport

AlertEnterprise Inc., the physical-logical security convergence software company, announced that its Airport Guardian software has been selected by Los Angeles World Airports (LAWA) as the new Identity Management and Credentialing System (IMCS) at Los Angeles International Airport (LAX). Airport Guardian cyber-physical security software will be deployed to deliver a new level of converged security, identity and access intelligence, and enhanced customer experience across IT, physical and OT syst...

Villiers-le-Bel City Administrators Select ABLOY’s PROTEC2 And CLIQ Electromechanical Locking Solution To Fix Lost Key Problem

One French town just north of Paris faced familiar key management challenges. Each person in their Municipal Technical Centre had to carry approximately forty physical keys. If a single key was lost or stolen, for even one door, all compromised cylinders had to be changed. To prevent unauthorized access, all the keys had to be replaced, too — at great expense. Key duplication costs were mounting. “One lost key cost from €3,000 to €4,000 for changing cylinders and replacing...

Napco Offers Dealers With Top Radio Brands And StarLink Omni Extended Cellular Antennas

Napco Security Technologies, well-known for developing innovative technology and labor-saving solutions for security professionals, now offers dealers dramatically improved cellular transmission on all top radio brands, plus extra mounting flexibility, with its growing line of StarLink Omni Extended Range Exterior Cellular Antennas, each of which comes complete with premium low-loss cable and mounting hardware. The StarLink® SLE-ANTEX Series are marine-grade antennas, ideal for indoor or ou...

Userful Announces New Expanded Capabilities Of AV-Over-IP Solutions For Enhanced Video Communication

Userful Corporation, a provider of AV-over-IP solutions for enhanced video communication since 2015, announces newly expanded capabilities of its Visual Networking Platform architecture. This includes enhancing the uClient app to support on-premise deployments by connecting webOS smart digital signage displays from LG Electronics to an onsite server for more demanding display applications. With this announcement, an onsite PC or server loaded with Userful On-Premise software can now connect ove...

Gallagher’s Perimeter Security Solution Protects Insurance Auto Auctions’ Sites From Theft And Vandalism

Insurance Auto Auctions (IAA), is one of North America’s leading salvage auto auctions companies with the largest facility footprint, strong buyer base, and high auction returns. The exclusive focus is on the automotive total-loss industry with over 160 corporate owned facilities across the United States and Canada. IAA provides sellers and buyers with the best solutions to process and acquire total-loss, recovered-theft, fleet lease, dealer trade-in and collision damaged rental vehicles....

Gallagher Partners With SAS To Install Perimeter Security Solution At Indiana Department Of Correction

Indiana Department of Correction (IDOC) is a state-wide organization, comprised of 21 adult facilities housing over 28,000 inmates. Safety of both inmates and the public is a top priority for IDOC and forms part of the organization’s mission and vision. The inefficiency and increased cost associated with managing multiple security technologies and systems led to IDOC’s Director of Construction Services Kevin Orme to seek a solution that not only increased efficiency and reliability...

Keyfactor Acquires Digital Identity Firm Redtrust As A Part Of Global Expansion

Keyfactor, a provider of secure digital identity management solutions, announced the acquisition of Spain-based Redtrust, a digital identity solutions company providing centralized certificate and digital signature management. “Like Keyfactor, Redtrust is fiercely committed to offering best-in-class identity management innovation to customers in industries where trust and reputation are a top priority,” said Jordan Rackie, CEO at Keyfactor. “This acquisition supports Keyfacto...

Aratek BIONE Fingerprint Algorithm Aces NIST MINEX III Test

The Aratek BIONE fingerprint algorithm recently achieved top scores in the MINEX (Minutiae Interoperability Exchange) III evaluations administered by the US National Institute of Standards and Technology (NIST). The test measures the accuracy and interoperability of proprietary minutiae templates along with their level of compliance with the U.S. Government’s Personal Identity Verification (PIV) program by extracting and matching the proprietary minutiae templates against the ANSI/INCITS...

Yeastar Partners With PBX To Provide The Users With Simplified Configuration

Voip Unlimited successfully completed the interoperability testing with Yeastar and has since partnered with China’s PBX manufacturer. Users can now enjoy the simplified configuration with just the username, password, and DID number, and then one click with successful registration. Yeastar provides cloud-based and on-premises VoIP PBXs and VoIP gateways for SMBs to deliver Unified Communications solutions that connect co-workers and clients more efficiently. Established as a pioneer in th...

Mistral Provides A MCCV To The Commissionerate Of Police For Mysuru To Provide Seamless Monitoring And Surveillance

The Mobile Command and Control Vehicle is a custom-made, robust vehicle, outfitted with specialized surveillance, communication & monitoring equipment for homeland security applications. The custom designed Mobile Command and Control Vehicle (MCCV) is capable of supporting diverse mission critical applications of military, security or police forces. The Mobile Command and Control Vehicle can be easily deployed at the site of emergency or at a location that has potential threat, to take comp...

ASIS International Announces Security Management MBA Program In Partnership With EOGN

ASIS International, the association for security management professionals, announces a new strategic partnership with the ‘École des Officiers de la Gendarmerie Nationale’ (EOGN), also known as the French Gendarmerie Officers Academy, which allows up to two ASIS members per year to enrol in the esteemed security management MBA program at the EOGN’s campus in Paris. The agreement also facilitates the joint development of future educational modules based on a common visio...

TIBCO And Ping Identity Collaborate On Advanced API Cybersecurity Solutions

TIBCO Software Inc., global provider of integration, API management, and analytics, has announced an official partnership with Ping Identity, a provider of Identity Defined Security. Together, TIBCO Cloud Mashery and the PingIntelligence for APIs solution bring seamless, AI-powered protection against new emerging API threats to customers. TIBCO Cloud Mashery is a complete solution for digital leaders, IT leaders, and chief information security officers to invest in API-led, cloud-native transfo...

Building Intelligence’s SV3 Receives SAFETY Act Certification For Visitor And Vehicle Management Solution

SV3, the cloud-based visitor, vehicle and vendor management system from Building Intelligence, has received SAFETY Act Certification, the highest level of accreditation awarded by the U.S. Department of Homeland Security for anti-terrorism technologies, making it the only visitor and vehicle management solution to achieve this level of federal recognition. “By using technology to secure loading docks and parking garages, as well as providing a smart method for managing vehicle access to s...

Ping Identity Updates PingOne For Customers Cloud IDaaS With Passwordless And Multi-Factor Authentication Capabilities

Ping Identity, the pioneer in Identity Defined Security, announced a significant update to PingOne for Customers, the cloud-delivered Identity-as-a-Service (IDaaS) offering built for developers. The API-first solution can now deliver seamless and secure push notifications from custom mobile applications that can be used for passwordless and advanced multi-factor authentication. The cloud identity solution helps development teams speed time to launch their applications, while also taking securit...

cPacket Networks Launches The cCloud Cloud-Based Network VaaS With Traffic Mirroring Feature

cPacket Networks, a provider of next-generation network performance/security monitoring and packet brokering solutions, launches the cCloud cloud-based network visibility-as-a-service (VaaS) offering by working with Amazon Web Services (AWS) and leveraging the traffic mirroring feature offered by Amazon Virtual Private Cloud (Amazon VPC). “While many of our customers are migrating workloads to the cloud, until now it happened to be a black-box for them, from a performance and security per...

Allied Universal Takes Over San Francisco-Based Manned Guarding And Security Personnel Provider Firm, Cypress Private Security

Allied Universal, renowned security and facility services company in North America, has announced the acquisition of Cypress Private Security, LP - a San Francisco-based company offering comprehensive security services. Terms of the deal were not disclosed.  Manned guarding and security personnel “Cypress Private Security is a company that we have long admired and always wanted to partner with,” said Steve Jones, CEO of Allied Universal. “This security company has built...

Senstar To Secure Five Airports With Its Video Management, Facial Recognition And Intrusion Detection Systems

Senstar, a provider of video management systems (VMS) and perimeter intrusion detection systems (PIDS), is pleased to announce its products were recently selected to protect five airports in various locations around the world. These sites join the list of hundreds of civilian and military airports currently using Senstar products. “Airport infrastructure and assets represent a vital economic engine for many cities and countries making them prime targets for vandals, thieves and terrorists...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems