Security devices

MATRIX NVRs Makes Centralized Security Management Easy For Organizations

For medium and large scale enterprises, security strategies involve the deployment of a large number of cameras. These cameras are continuously monitored, and the streams are recorded for future reference. The device in which these recordings are recorded and stored is known as Network Video Recorder. Among the various challenges that an organization faces, managing various other security systems at a time is one. There are systems like POS, Access Control, Fire Alarm etc., which need to be man...

Dahua Recognised As ‘2017 National Intellectual Property Role Model Enterprises’ For Innovative Security Technology

Dahua Technology has been officially crowned by the State Intellectual Property Office (hereinafter referred to as “SIPO”) as one of the ‘2017 National Intellectual Property Role Model Enterprises’. Its patented ‘HD digital video signal transmission methods and devices, cameras, and aggregation equipment’ are recognized as a winner of the 19th China Outstanding Patent Award. According to the notice issued by SIPO on December 20th, Dahua is one of the 182 compa...

Aiphone Enhances Emergency Tower Design For Accurate Incident Management

Aiphone Corp., a manufacturer of intercom and entry security products, has announced enhancements to its emergency enclosure products. Towers and wall boxes now feature built-in UL Listed electrical boxes to easily satisfy local electrical codes. The new modular tower designs also include an optional CCTV camera arm module. Now a second camera can be mounted to the top of the towers, providing security personnel with a second line of sight to more accurately assess and respond to situation...

REI Launches Counter Surveillance Equipment To Prevent Fraudulent Exam Testing Sites

The newly-launched ANDRE Advanced Near-field Detection Receiver from Research Electronics International (REI) is helping to prevent fraud at exam testing sites. Commonly used for counter surveillance operations and intelligence protection, the ANDRE is now also helping educators prevent cheating during examinations by detecting covert electronic transmissions. Radiofrequency Detection According to Brazilian news reports, eleven individuals were arrested last year for using electronic...

Midpoint Security releases CredoID open platform access control software

Midpoint Security introduces a free edition of CredoID access control software, compatible with HID VertX controllers, Edge IP readers, Mercury Controllers, Suprema biometric IP and wireless Aperio locks by Assa Abloy. The free life-time license of CredoID supports systems of up to 20 readers and includes all basic access control functions, as well as floorplans, attendance reports, and operator action logging, all delivered via an intuitive multilingual interface. With more than 2000 CredoID sy...

Top 10 mergers and acquisitions in the security industry for 2017

Rapid changes in the physical security market this year have largely overshadowed one arena where change has slowed down in 2017 – mergers and acquisitions (M&A). Although there were no “mega-mergers” as in years past (such as Axis-Canon and Johnson Controls-Tyco, M&A activity still made headlines last year on SourceSecurity.com. In 2017, we wrote about M&A news involving companies such as HID Global, Eagle Eye Networks, ADT, and Honeywell. ...

Round Table Discussions

What Are The Challenges Of Body-worn Cameras For The Security Industry?

Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?

How Does The IT Department Influence Security Purchases?

In recent years, information technology (IT) departments at end user companies have often been seen as adversaries of traditional security departments – or, at least, as a thorn in their side. One of the issues is territorial: As physical security products have migrated to use of Internet protocols and the network infrastructure, the IT and security departments have clashed – erm… make that interacted – more and more often. New realities such as cybersecurity have made i...

How Do You Measure Return On Investment (ROI) In The Security Market?

Measuring return on investment (ROI) has long presented a challenge to the security marketplace. Investment in security is often viewed as a necessary cost whose benefits cannot be measured. For example, how do you measure the value of an event that doesn’t happen (i.e., that has been prevented)? The difficulty of measuring ROI doesn’t diminish customers’ appetite for it, however. Today’s choosy customers are driven more than ever by the bottom line and expect any and all...