Integration software - News
Between crime and cold weather, many commercial facilities develop vulnerabilities over the winter period, but door hardware can play a vital role in protecting property says Daniel May of Consort. The temperature has dropped. The nights have drawn in. And many commercial properties now face a tough period of additional challenges. From drastically increased footfall and extended periods of closure to extreme weather conditions, the winter months invite a host of differentials that are seldom c...
Qognify, a provider of Physical Security and Enterprise Incident Management software solutions, announces being acquired by Hexagon AB, a pioneer in digital reality solutions combining sensor, software, and autonomous technologies. Hexagon acquires Qognify from Battery Ventures, a global, technology-focused investment firm. Qognify was formed in 2015 when Battery Ventures acquired the physical security division of NICE Systems, thus creating a new brand in the market. Physical security market...
Access control software is an important component of building security systems, but deciding which one is best for users can be difficult. The following article will break down the various types and features of access control software so that users can make an informed decision about which one is best for them. What is access control software? Aratek would want to give users a quick introduction to access control software and how it works in physical access control applications. Access control...
Aiphone has partnered with SecurityCEU.com to develop an online course for integrators looking for a comprehensive training that teaches everything needed to know about installing and programming an Aiphone IX system. Titled, Aiphone IX Series Quick Start Guide, the three-hour course, describes the network requirements for an Aiphone IX Series system, how to identify the type of network in an installation environment, how to install the easy to use IX Support Tool, and how to complete the initi...
The UK’s resilience to terrorism is to be stepped up, as the Government announces details for the Protect Duty to be known as ‘Martyn’s Law’ in tribute to Martyn Hett, who was killed alongside 21 others in the Manchester Arena terrorist attack in 2017. Public safety Working closely with security partners, business and victims’ groups, including Figen Murray and the Martyn’s Law Campaign Team, and Survivors Against Terror, the new duty will require venues to...
The Outstanding Security Performance Awards (OSPAs) is delighted to be working in collaboration once again with the National Security Inspectorate (NSI) to deliver the fifth UK OSPAs Thought Leadership Summit on Thursday 23rd February 2023 at the Royal Lancaster Hotel in London. The Thought Leadership Summit provides a unique platform for security providers and industry stakeholders to gather to discuss and debate topical issues affecting the UK security sector, taking the form of panel session...
Matrix has joined hands with their channel partner Onyx Electrotech, to participate in the SSSA Business Expo’22 organized by Saurashtra Security and Surveillance Association. In the two-day long event, Matrix will be putting forth its wide-ranging products and solutions in the domains of IP Video Surveillance, Access Control, and Time-Attendance alongside its set of established Telecom products. IP Video Surveillance IP Video Surveillance has become the top priority of businesses...
UK-based Reading FC named Acronis, a global pioneer in cyber protection, as its Official Cyber Protection Partner. Under the #Cyberfit delivery partner Westcoast Cloud, Acronis will provide the organization with a full suite of cyber protection solutions to protect the team's data assets and optimize workflow, facilitating the team to perform at its best on and off the field. Online security solutions As part of the partnership, the club will benefit from Acronis&rsqu...
XOi Technologies, a provider of technician-focused technology solutions, announces the addition of Chief Financial Officer Leon Weiss and Chief Product Officer Jeff Grisenthwaite to the company’s leadership team. Extensive executive experience Weiss and Grisenthwaite each bring extensive executive experience in the software industry to XOi as the company continues to transform technology for field service contractors. “Leon and Jeff bring unique experience and skills that align wi...
i-PRO Co., Ltd. a global pioneer in professional security solutions for surveillance and public safety shared its top five predictions for the physical security industry in 2023. 1) AI-based analytics become standard at the edge 2023 will see significant adoption of AI-based analytics in cameras and video management systems (VMS) as more manufacturers provide this feature within their standard camera lines. There are simply too many camera streams for humans to monitor effectively, so AI...
Zimperium, the only mobile security platform purpose-built for enterprise environments revealed details of a newly discovered Android malware campaign hidden in money-lending apps developed with Flutter, a software development kit used to create applications that work across multiple platforms, including Android and iOS. The Zimperium zLabs team discovered this threat, dubbed MoneyMonger, which uses personal information stolen from a device to blackmail victims into paying more than the terms t...
The Z-Wave Alliance, the Standards Development Organization (SDO) dedicated to advancing the smart home and Z-Wave® technology, announces the completion of the Z-Wave Source Code project, which has been published and made available on GitHub to Alliance members. The Z-Wave Source Code Project opens development of Z-Wave and enables members to contribute code to shape the future of the protocol under the supervision of the new OS Work Group (OSWG). Rich development environment The goal of...
With its establishment three decades ago, Matrix has been a growing name across Telecom and Security domains internationally. Matrix covers the entire communication and security needs of organizations ranging in all sizes with its extensive solution range in the domain of Telecom, Video Surveillance, Access Control, and Time-Attendance. Customer-centered technology-driven solutions Matrix focuses on providing customer-centered technology-driven solutions by providing world-class products indig...
Immix, a global provider of software automation, integrated Ajax alarms into their software. The Ajax products are available for the IMMIX CS and GF platforms. "Our customers have expressed the need for increasingly modular and flexible solutions and we are committed to working with innovative companies that can do just that. Ajax Systems has a strong scope of solutions that extends our direct integrations with intruder detection and alarm systems," said Chris Brown, CEO of Immix. Ajax Transla...
Verkada, a pioneer in cloud-managed enterprise building security and management announced the opening of its new engineering hub in Krakow, Poland, the eighth new office Verkada has opened over the last two years. “This new hub is a critical extension of our global team as we build cutting-edge hardware and software products that protect organizations' people and property,” said Martin Hunt, CTO of Verkada. “As our Poland-based team scales up, they will work on end-to-en...
Videx has enhanced its leading door entry system, the VX2300, adding a desk mount concierge unit for small to medium-sized installations of the two-wire video system. CST2310 unit The CST2310 unit can be used for up to 200 apartments, offering both a handset and hands-free speech and a backlit touch control keypad along with a 3.5” LCD display with on-screen information relating to both entrances and apartments and the stage of a call when in progress. It can also be used to receive or...
Intellian Technologies, Inc., the pioneering technology and solutions provider for satellite communications, has announced the development of the new FB500 terminal, designed for Inmarsat’s market-pioneering Fleet Xpress (FX) solutions, which combines Ka-band with ELERA L-band FleetBroadband (FB) service. Available this year, the FB500 terminal from Intellian is the most recent product created in the company's brand-new L-Band Center of Excellence in London, United Kingdom. Joining the po...
IDEMIA, the pioneer in identity technologies announced the launch of its first service center in Japan as a reflection of its commitment to supporting digital advancement in the country. Located in Kawasaki, the service center can support millions of users and aims to partner with Japanese credit card issuers to deliver premier products and services for end users in Japan. This includes IDEMIA’s advanced card personalization offerings such as F.CODE, recycled PVC cards, metal cards, and m...
Beyond Identity, the provider of phishing-resistant and passwordless MFA, announces its two-pronged partnership with IT services and consulting company World Wide Technology (WWT). The engagement between the two leaders allows WWT to harness Beyond Identity’s authentication platform internally while also acting as a global channel partner. WWT has already initiated an internal roll-out of Beyond Identity’s passwordless, multi-factor authentication (MFA) to its 8,000 employees. Cybe...
Lacework®, the data-driven cloud security company announced the appointment of Niels Provos as the company’s first Head of Security Efficacy. Provos brings nearly two decades of industry experience in creating healthy engineering teams that build security infrastructure and systems that solve cloud security problems at scale. He puts a particular emphasis on treating security as an engineering problem. Security and privacy practice After receiving his Ph.D. in computer science from...
The most prominent 2023 predictions in the cybersecurity industry for the year ahead are from Miri Marciano, Associate Director, Cybersecurity Expert at Boston Consulting Group. Miri discusses what organizations should be on the lookout for in an increasingly volatile environment where attackers are constantly finding new ways to access sensitive information and take control of vital systems. The wider issue will be to make sure the recovery system of an organization is fool-proof ensuring...
3DX-Ray has announced a significant contract for the supply of 16 units of ThreatScan®-LS3 to an undisclosed southern European security agency, for use in EOD operations. ThreatScan®-LS3 is a compact yet powerful x-ray scanning system that can penetrate steel up to 40mm at 120kV and up to 60mm at 150kV. The 305mm x 256mm imaging area enables typical bags and packages to be scanned in one scan. The complete system fits securely into a backpack. Sub-Millimeter resolution images The Thre...
i-PRO Americas Inc., a pioneer in professional security solutions for surveillance and public safety, announces the expansion of its distributor network in Canada and Latin America. New partnerships have been inked with both ADI and TD SYNNEX in Canada while the company also expands into Latin America with the help of the International Security and Trading Corporation (ISTC). “The finalization of the distribution network in Canada is very exciting as we have reached a key milestone in joi...
Axis Communications, an approved Common Vulnerability and Exposures (CVE) Numbering Authority (CNA), is launching a private bug bounty program with Bugcrowd, the pioneer in crowdsourced cybersecurity. The private bug bounty program strengthens Axis’ commitment to building professional relationships with external security researchers and ethical hackers. The new program reinforces the company’s efforts to proactively identify, patch, and disclose vulnerabilities in AXIS OS, the Linux...
HID, the pioneer in trusted identity solutions, recently migrated HID Academy to a new platform and unveiled its improved learning center to provide a more engaging user experience to partners and customers. Through its team of subject matter experts and instructional designers, HID Academy is committed to providing an engaging, relevant, on-demand digital learning experience via the Docebo interface that enables HID partners and customers to gain knowledge and expertise on the HID product port...
Almost half of UK businesses have a basic cyber security gap that is leaving them exposed. This stark reality was revealed in a report from the Department for Digital, Culture, Media, and Sport (DCMS). It found that the people responsible for cyber security in 48% of UK businesses lack the confidence to carry out basic tasks and are not receiving support from external cyber security providers. So, if users are in-house person isn’t confident in doing basic security tasks and they are not...
Professor Avishai Wool looks at five areas where he expects cyber security practices to develop in 2023 in response to the changing threat landscape and advances in response and protection technologies. Application-centric approach I think the market has matured to the point where the network security policy management (NSPM) approach has reached a tipping point and I see the shift to an application perspective becoming the de facto approach in NSPM as there are better and more robus...
Traka, the industry pioneer in intelligent asset management systems, has integrated with Paxton’s Net2 software to enable users to operate from one access control platform to maintain critical key and equipment management. Data integrity, single credential The seamless integration with Net2 ensures complete data integrity with Traka, allowing users to benefit from improved security and drive improvement. This includes sending personnel, credential, and access level updates to the Traka s...
An investigation by the National Audit Office (NAO) has uncovered that 30 per cent of applications used by the Department for Environment, Food & Rural Affairs (Defra) are unsupported, having been developed with outdated software, increasing their security risk. The report revealed that Defra, the government department overseeing environmental protection, food production, and rural communities, use an estimated 1,962 different applications with 30 per cent not supported by their supplier in...
Alcatraz AI, a pioneer in autonomous access control solutions, announces a series of new enhancements to its flagship product the Rock™. Now including features like Admin Portal Single Sign On (SSO) and Profile Expiration, Alcatraz AI delivers critical controls for organizations to easily manage employee access while complying with industry privacy and security regulations. Facial authentication solution The Rock by Alcatraz AI is a simple, secure, and trusted facial authentication solu...