from SourceSecurity.com http://www.sourcesecurity.com/news/republic-of-moldova.html Copyright (C) SourceSecurity.com 2014 Thu, 18 Dec 2014 08:00:00 GMT Thu, 18 Dec 2014 08:00:00 GMT AxxonSoft powers security monitoring for Pan-American Highwayhttp://www.sourcesecurity.com/news/articles/co-6163-ga.16047.htmlhttp://www.sourcesecurity.com/news/articles/co-6163-ga.16047.htmlApplications NewsThu, 18 Dec 2014 08:00:00 GMT<table style="width: 242px; height: 287px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">Axxon Intellect PSIM was installed at The Pan-American Highway's tollbooths to service and secure the highway</span></strong></td> </tr> </tbody> </table> <p>The Pan-American Highway is the world's longest motorable road, connecting the U.S. and Canada with Latin America. Extending from the North Slope of Alaska to the southern tip of South America, the highway extends approximately 30,000 miles (48,000 kilometres) &ndash; greater than the circumference of the earth. Construction started in 1923 and, in some stretches, continues to this day. This is a massive project to be sure. But it is also a massive maintenance task. Imagine trying to service and secure such...Skillweb launches 'SmartTask' solution for advanced employee scheduling and mobile workforce managementhttp://www.sourcesecurity.com/news/articles/co-12059-ga-npr.16046.htmlhttp://www.sourcesecurity.com/news/articles/co-12059-ga-npr.16046.htmlNew Product ReleasesThu, 18 Dec 2014 08:00:00 GMT<p>Skillweb has launched the next generation of SmartTask to create an advanced employee scheduling and mobile workforce management solution that helps to better plan and manage security officers. As a result, companies will now be able to take advantage of an integrated tool which combines intelligent rostering, live monitoring and integrated proof of attendance across teams of both static and mobile officers, making sure they are at the right place, at the right time to meet all service requirements and perform reliably.</p> <p>Every aspect of SmartTask has been designed with simplicity and flexibility in mind using more than 12 years of industry expertise, making it the ideal tool to plan and coordinate security requirements. This means that fewer rostering and control room staff will be required to handle a greater workload, while at the same time helping to deliver higher levels of service, operate compliantly and make the most of available resources.</p> <p>In particular,...The year in mergers and acquisitions: Top 10 of 2014http://www.sourcesecurity.com/news/articles/co-7254-ga-co-3126-ga-co-353-ga-co-12086-ga-co-823-ga-co-2060-ga-co-984-ga-co-2910-ga-co-2281-ga-co-1151-ga-co-12085-ga-co-1437-ga-co-268-ga-co-7927-ga-co-12200-ga-co-1756-ga-co-3802-ga-co-2140-ga-co-3194-ga-co-8096-ga.16023.htmlhttp://www.sourcesecurity.com/news/articles/co-7254-ga-co-3126-ga-co-353-ga-co-12086-ga-co-823-ga-co-2060-ga-co-984-ga-co-2910-ga-co-2281-ga-co-1151-ga-co-12085-ga-co-1437-ga-co-268-ga-co-7927-ga-co-12200-ga-co-1756-ga-co-3802-ga-co-2140-ga-co-3194-ga-co-8096-ga.16023.htmlExpert CommentaryThu, 18 Dec 2014 08:00:00 GMT<table style="width: 246px; height: 323px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong></strong></td> </tr> </tbody> </table> <p>2014 was a year for eye-popping merger and acquisition (M&amp;A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market &ndash; Google, which made not one but two acquisitions this year that could have impact the future security market.</p> <p>It was also the year that a smaller player in the video camera market (although a huge familiar brand overall) bought a large, open systems VMS company (to almost everyone&rsquo;s...Embracing big data and discontinuing antiquated systemshttp://www.sourcesecurity.com/news/articles/co-2415-ga.15894.htmlhttp://www.sourcesecurity.com/news/articles/co-2415-ga.15894.htmlExpert CommentaryThu, 18 Dec 2014 08:00:00 GMT<table style="width: 262px; height: 299px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong class="smalltxt">Big Data is a challenge that emerging technologies are working to address</strong></td> </tr> </tbody> </table> <p><strong>Quantum Secure 2014/2015 Review and Forecast:</strong> <br /><br />As demonstrated by end users&rsquo; continued desire to identify and implement technologies that provide the greatest level of protection for people, property and assets, it&rsquo;s clear that security will always be a necessity.</p> <p>Today, customers demand strong, demonstrable ROI from those technologies and expect solutions to align with their overall business goals. For example, the C suite and the Board of Directors require metrics that show which policy...The power of uncoupling hardware and softwarehttp://www.sourcesecurity.com/news/articles/co-4108-ga.15892.htmlhttp://www.sourcesecurity.com/news/articles/co-4108-ga.15892.htmlExpert CommentaryWed, 17 Dec 2014 08:00:00 GMT<table style="width: 263px; height: 297px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong class="smalltxt">Uncoupling software from hardware allows manufacturers to respond faster to changes</strong></td> </tr> </tbody> </table> <p><strong>Nedap Security Management 2014/2015 Review and Forecast:</strong><br /><br />Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems &ndash; these are just some of the challenges <a href="http://www.sourcesecurity.com/companies/search-results/company-search/t.manufacturers.html" class="blue_bold">security manufacturers</a> and system users have to deal with and respond to. External factors such as these do provoke change in...Foxstream announces Samsung Techwin partnershiphttp://www.sourcesecurity.com/news/articles/co-4167-ga-co-1437-ga.16021.htmlhttp://www.sourcesecurity.com/news/articles/co-4167-ga-co-1437-ga.16021.htmlCorporate NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>FoxCounter is Foxstream&rsquo;s first solution to benefit from this strategic alliance</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/foxstream.html" class="blue_bold">Foxstream</a>, the fast growing software company specialising in real-time VCA (Video Content Analysis) is pleased to announce its partnership with <a href="http://www.sourcesecurity.com/companies/micro-site/samsung-techwin.html" class="blue_bold">Samsung...CNL Software's IPSecurityCenter PSIM receives factory certification under Lenel OpenAccess Alliance Programhttp://www.sourcesecurity.com/news/articles/co-1042-ga-co-8497-ga.16020.htmlhttp://www.sourcesecurity.com/news/articles/co-1042-ga-co-8497-ga.16020.htmlCorporate NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>The interface provides security intelligence, allowing organisations to react faster and more precisely to incidents</strong></p> </td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/cnl-software.html" class="blue_bold">CNL Software</a>, a world leader in Physical Security Information Management (PSIM) software is pleased to announce that its IPSecurityCenter&trade; PSIM has received <a href="http://www.sourcesecurity.com/companies/company-listing/lenel-systems-international.html"...SSAIB appoints Alex Carmichael as Chief Executivehttp://www.sourcesecurity.com/news/articles/co-1591-ga.16017.htmlhttp://www.sourcesecurity.com/news/articles/co-1591-ga.16017.htmlCorporate NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Alex Carmichael will be taking over from Geoff Tate who will be stepping down as CEO after 16 years in the role</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/ssaib.html" class="blue_bold">SSAIB</a>, which is celebrating its 20th anniversary as the UK and Ireland&rsquo;s leading fire, security and telecare certification body, has appointed its new Chief Executive. Alex Carmichael will be taking over from Geoff Tate, who announced earlier this year that he will be stepping...Penton announces International Wireless Communications Expo 2015 keynote speakershttp://www.sourcesecurity.com/news/articles/co-9856-ga.16015.htmlhttp://www.sourcesecurity.com/news/articles/co-9856-ga.16015.htmlEvents NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>Penton&rsquo;s IWCE keynote speakers includes Roger Cressey and Dr. Reginald Brothers </strong></p> </td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/penton.html" class="blue_bold"><span class="blue_bold">Penton</span></a>&rsquo;s <a href="http://www.sourcesecurity.com/events/enhanced-event-listing/iwce-2015.html" class="blue_bold">International Wireless Communications Expo (IWCE)</a> has announced Roger Cressey, a counter-terrorism analyst for NBC News and former presidential advisor, will give the Opening Keynote Address for its 2015 show. Dr. Reginald...BCDVideo certifies new Johnson Controls P200 video management systemhttp://www.sourcesecurity.com/news/articles/co-10265-ga-co-2900-ga.15991.htmlhttp://www.sourcesecurity.com/news/articles/co-10265-ga-co-2900-ga.15991.htmlCorporate NewsTue, 16 Dec 2014 08:00:00 GMT<table style="width: 235px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr class="smalltxt"> <td style="text-align: center;"><strong>The P2000 VMS helps to navigate between various management systems</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/bcdvideo.html" class="blue_bold">BCDVideo</a><span class="blue_bold"> </span>has announced the certification of <a href="http://www.sourcesecurity.com/companies/micro-site/johnson-controls-inc.html" class="blue_bold">Johnson Controls&rsquo;</a> newly released P2000 Video Management System (P2000 VMS) on their Nova Series line of enterprise-class storage solutions. This new VMS offers a single, open interface to intuitively navigate between video management, video analytics, system integration, and alarm...Customers want more data analysis and auditinghttp://www.sourcesecurity.com/news/articles/co-3579-ga.15973.htmlhttp://www.sourcesecurity.com/news/articles/co-3579-ga.15973.htmlExpert CommentaryTue, 16 Dec 2014 08:00:00 GMT<table style="width: 266px; height: 309px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td> <p style="text-align: center;"><strong><span class="blue_bold smalltxt" style="color: #999999;"></span><span class="smalltxt">2014 saw more organisations making data-driven decisions with insight or foresight provided by intelligent analysis of the data</span><br /></strong></p> </td> </tr> </tbody> </table> <p><strong>Morse Watchmans 2014/2015 Review and Forecast:</strong> <br /><br />2014 saw a year of continued change in the security marketplace. A healthier economy triggered growth in new projects and helped loosen the purse strings for capital expenditures. From a technology standpoint, the industry evolution to a more network-centric environment created additional opportunities for manufacturers to...Cannabis and Security: The security challenges of legalised marijuana sales in the United Stateshttp://www.sourcesecurity.com/news/articles/co-12505-ga-co-12504-ga.15921.htmlhttp://www.sourcesecurity.com/news/articles/co-12505-ga-co-12504-ga.15921.htmlExpert CommentaryTue, 16 Dec 2014 08:00:00 GMT<table style="width: 265px; height: 339px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr class="smalltxt"> <td style="text-align: center;"><strong>The decriminalisation of marijuana has left the security industry apprehensive to collaborate with the industry</strong></td> </tr> </tbody> </table> <p>If ever there was a market tailor-made for security companies, it&rsquo;s the growing cannabis industry. Although only two states &ndash; Colorado and Washington &ndash; currently allow the sale of recreational marijuana and 22 other states permit limited medical use, many within the industry believe the tide has turned in favour of legalisation. [After the recent election, recreational sale of marijuana will become legal in Alaska and Oregon in 2015, and in the District of Columbia (subject...Users need more flexibility, security and longer-range solutionshttp://www.sourcesecurity.com/news/articles/co-2736-ga-co-574-ga.15895.htmlhttp://www.sourcesecurity.com/news/articles/co-2736-ga-co-574-ga.15895.htmlExpert CommentaryTue, 16 Dec 2014 08:00:00 GMT<table style="float: left; width: 264px; height: 299px;" border="0" cellspacing="8"> <tbody> <tr> <td></td> </tr> <tr class="smalltxt"> <td style="text-align: center;"><strong>End users continue to move to smart cards and smart readers, wanting the extra flexibilities they offer</strong></td> </tr> </tbody> </table> <p>2014 was very good year at <a href="http://www.sourcesecurity.com/companies/company-listing/farpointe-data-inc.html" class="blue_bold">Farpointe Data</a>. Significantly, it became part of the <a href="http://www.sourcesecurity.com/companies/company-listing/dorma.html" class="blue_bold">DORMA group</a>, which helps cement our standing as a global partner of premium RFID solutions<span class="blue_bold smalltxt"></span><span class="smalltxt">,</span> including proximity, smart card and long-range solutions, for...Open standards in access control to increase end user choices in 2015http://www.sourcesecurity.com/news/articles/co-9787-ga.15893.htmlhttp://www.sourcesecurity.com/news/articles/co-9787-ga.15893.htmlExpert CommentaryTue, 16 Dec 2014 08:00:00 GMT<table border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td style="text-align: center;"><strong><span class="smalltxt">Open standards for access control and </span></strong><br /><strong><span class="smalltxt">integration will offer end users far greater </span></strong><br /><strong><span class="smalltxt">levels of choice</span></strong></td> </tr> </tbody> </table> <p><strong>ASSA ABLOY 2014/2015 Review and Forecast: </strong><strong><br /></strong><em><strong><br />Editor&rsquo;s Note:</strong> This article is based on Mr. Bone&rsquo;s answers to several questions about the 2014/2015 Review and Forecast posed by SourceSecurity.com.</em><strong> <br />&nbsp;<br />We will continue to see a two-speed economy in general terms in Europe in the New Year, with the northern...ASSA ABLOY signs agreement to acquire Digi Electronic Lockhttp://www.sourcesecurity.com/news/articles/co-9380-ga.16001.htmlhttp://www.sourcesecurity.com/news/articles/co-9380-ga.16001.htmlCorporate NewsMon, 15 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The acquisition of Digi Electronic lock will strengthen ASSA ABLOY&rsquo;s digital door lock segment</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/assa-abloy.html" class="blue_bold">ASSA ABLOY</a> has signed an agreement to acquire <a href="http://www.sourcesecurity.com/companies/company-listing/digi-electronic-lock.html" class="blue_bold">Digi Electronic Lock</a>, the leading digital door lock manufacturer in China.</p> <p><em>"I am very pleased to have Digi Electronic Lock and its competent personnel joining the ASSA ABLOY...Milestone elevates Samsung Techwin to Elite Partner statushttp://www.sourcesecurity.com/news/articles/co-1151-ga-co-1437-ga.15999.htmlhttp://www.sourcesecurity.com/news/articles/co-1151-ga-co-1437-ga.15999.htmlCorporate NewsMon, 15 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Samsung Techwin is only one of eight Milestone Camera Partners in the world to achieve this status<br /></strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/milestone-systems.html" class="blue_bold">Milestone Systems</a>, the open platform company in IP video management software (VMS), has elevated <a href="http://www.sourcesecurity.com/companies/micro-site/samsung-techwin.html" class="blue_bold">Samsung Techwin</a> to the status of Elite Partner in the Milestone...Matrox to exhibit new C-Series multi-display graphics cards and Matrox Mura MPX video wall controller boards at Intersec 2015http://www.sourcesecurity.com/news/articles/co-9825-ga.15997.htmlhttp://www.sourcesecurity.com/news/articles/co-9825-ga.15997.htmlEvents NewsMon, 15 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"> <p><strong>The attendees are invited to see how the latest Matrox products can be used to capture and display video and data in fire and rescue</strong></p> </td> </tr> </tbody> </table> At <a href="http://www.sourcesecurity.com/events/enhanced-event-listing/intersec-dubai-2015.html" class="blue_bold">Intersec 2015</a> (Dubai, Jan. 18&ndash;20) <a href="http://www.sourcesecurity.com/companies/company-listing/matrox-graphics-inc.html" class="blue_bold"><span class="blue_bold">Matrox&reg; Graphics </span></a>will demonstrate new Matrox C-Series&trade; multi-display...Security systems training course provider Tavcom launches online shop for installation and service engineershttp://www.sourcesecurity.com/news/articles/co-1640-ga.15996.htmlhttp://www.sourcesecurity.com/news/articles/co-1640-ga.15996.htmlCorporate NewsMon, 15 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 268px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The Tavcom shop includes installation tool kits, fibreglass wire running rod and telescoping poles<br /></strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/tavcom-ltd.html" class="blue_bold">Tavcom</a> has launched an online shop to provide installation and service engineers with easy access to &lsquo;need to have&rsquo; tools and test equipment.</p> <p>Accessible via the Tavcom Training, the online shop offers a wide range of equipment which engineers might not find easy to purchase elsewhere.</p>...IP access control system manufacturer ISONAS announces Robert Lydic as Vice-President of Saleshttp://www.sourcesecurity.com/news/articles/co-6100-ga.15995.htmlhttp://www.sourcesecurity.com/news/articles/co-6100-ga.15995.htmlCorporate NewsMon, 15 Dec 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><a href="http://www.sourcesecurity.com/companies/company-listing/isonas-security-systems-inc.html" class="blue_bold"><strong></strong></a><strong>Mr. Lydic will be responsible for managing the outside sales team and working to increase revenue</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/isonas-security-systems-inc.html" class="blue_bold">ISONAS Inc.<span class="blue_bold"></span>,</a> the leading pure IP access control system manufacturer, has announced that Robert Lydic has been...Terrorist threats increase need to protect soft targetshttp://www.sourcesecurity.com/news/articles/co-10263-ga.15972.htmlhttp://www.sourcesecurity.com/news/articles/co-10263-ga.15972.htmlExpert CommentaryMon, 15 Dec 2014 08:00:00 GMT<table style="width: 117px; height: 310px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>With a growing threat from home-grown terrorists, there will be a greater need to protect soft targets as well as to use portable barriers</strong></td> </tr> </tbody> </table> <p><strong>Delta Scientific 2014/2015 Review &amp; Forecast:</strong><br /><br />In 2014, hard targets, such as government facilities, airports, refineries and similar installations continued to boost sales for <a href="http://www.sourcesecurity.com/companies/micro-site/delta-scientific-corporation.html" class="blue_bold">Delta...