from SourceSecurity.com http://www.sourcesecurity.com/news/sweden.html Copyright (C) SourceSecurity.com 2014 Fri, 31 Oct 2014 08:00:00 GMT Fri, 31 Oct 2014 08:00:00 GMT HID Global's IdenTrust achieves PIV-I Assurance levels with IGC PKI certificatehttp://www.sourcesecurity.com/news/articles/co-823-ga-co-11526-ga.15592.htmlhttp://www.sourcesecurity.com/news/articles/co-823-ga-co-11526-ga.15592.htmlEvents NewsFri, 31 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>IGC PKI certificate includes both certificate for identity authentication and digital signing and certificate for encryption</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/identrust-inc.html" class="blue_bold">IdenTrust</a>&reg; (part of <a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/hid-global.html" class="blue_bold">HID Global</a>&reg;, a worldwide leader in secure identity solutions), recently announced that it has achieved U.S. Federal Bridge Authority (US FBCA) cross-certification...NCT CBRNe Asia concludes its third year with more than 250 visitors from over 30 countrieshttp://www.sourcesecurity.com/news/articles/15591.htmlhttp://www.sourcesecurity.com/news/articles/15591.htmlEvents NewsFri, 31 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The NCT CBRNe Awards Gala Dinner represented the glamourous highlight of this 3-day event</strong></td> </tr> </tbody> </table> <p>The NCT CBRNe Awards are part of Asia&rsquo;s premier CBRNe event, <a href="http://www.sourcesecurity.com/events/enhanced-event-listing/nct-cbrne-asia-2014.html" class="blue_bold">The Non-Conventional Threat: CBRNe Asia</a>. During the last three years, NCT CBRNe Asia has become the largest and leading forum in the field of CBRN defense in Asia. After successful regional events in Thailand (2012)...ONVIF hosts its 11th Developers Plugfest in Dusseldorf, Germanyhttp://www.sourcesecurity.com/news/articles/co-8173-ga.15587.htmlhttp://www.sourcesecurity.com/news/articles/co-8173-ga.15587.htmlEvents NewsFri, 31 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The 2014 Developers&rsquo; Plugfest was held in conjunction with Security Essen</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/onvif.html" class="blue_bold">ONVIF</a>, the leading global standardisation initiative for IP-based physical security products, hosted its 11th Developers&rsquo; Plugfest September 29-October 1 in Dusseldorf, Germany. With record numbers of interoperability implementations and multiple testings of ONVIF conformant video, access control and edge devices,...Pelco by Schneider Electric strengthens relationship with Avaya to deliver IP video surveillance solutionshttp://www.sourcesecurity.com/news/articles/co-12371-ga-co-1286-ga.15586.htmlhttp://www.sourcesecurity.com/news/articles/co-12371-ga-co-1286-ga.15586.htmlCorporate NewsFri, 31 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>This global alliance partnership will enable deeper collaboration on technology development and interoperability</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/pelco.html" class="blue_bold">Pelco</a> by <a href="http://www.sourcesecurity.com/companies/company-listing/schneider-electric-limited.html" class="blue_bold">Schneider Electric</a> recently announced that they are strengthening their relationship with <a...British Security Industry Association reports South East Business Crime Conference set to return in central Londonhttp://www.sourcesecurity.com/news/articles/co-306-ga.15585.htmlhttp://www.sourcesecurity.com/news/articles/co-306-ga.15585.htmlEvents NewsFri, 31 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>It gives businesses from across the region the opportunity to learn more about reducing their security risk</strong></td> </tr> </tbody> </table> <p>Empowering businesses to reduce their risk from crime is the aim of a popular annual event set to return to the South East this November.</p> <p>Free to attend, the <a href="http://www.sourcesecurity.com/events/free-event-listing/south-east-business-crime-conference-2014.html" class="blue_bold">South East Business Crime Conference</a> is taking place at Westminster&rsquo;s Church House...Strengthening Loss Prevention with Unified and Cloud-Based Security Solutionshttp://www.sourcesecurity.com/news/articles/co-2566-ga.12813.htmlhttp://www.sourcesecurity.com/news/articles/co-2566-ga.12813.htmlExpert CommentaryFri, 31 Oct 2014 08:00:00 GMT<table class="smalltxt" style="width: 220px; height: 304px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> </tbody> </table> <p><strong><em>Asset protection across retail organisations is sometimes still viewed as a necessary evil. But at a time when shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximise any investment in technology and consider how it can positively impact their bottom line.&nbsp;Steve Bocking, Sales Engineering Manager at <a href="http://www.sourcesecurity.com/companies/micro-site/genetec-inc.html" class="blue_bold">Genetec</a>, explains that retailers are now considering the benefits of network security technology to...Security products distributor TRI-ED releases 2014-2015 IP product cataloguehttp://www.sourcesecurity.com/news/articles/co-7927-ga.15582.htmlhttp://www.sourcesecurity.com/news/articles/co-7927-ga.15582.htmlCorporate NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The new 100 page catalogue showcases a broad range of products from over 50 of the industry&rsquo;s leading IP manufacturers</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/tri-ed-northern-video-distribution.html" class="blue_bold">TRI-ED</a>, An Anixter Company, is pleased to announce the release of its 2014-2015 IP Product Catalogue, available at all branches throughout the U.S. and Canada. Dedicated exclusively to all things IP, the 100 page catalogue showcases a broad...AMAG Technology expands Symmetry V8 software to support federal government markethttp://www.sourcesecurity.com/news/articles/co-130-ga-co-823-ga-npr.15581.htmlhttp://www.sourcesecurity.com/news/articles/co-130-ga-co-823-ga-npr.15581.htmlNew Product ReleasesThu, 30 Oct 2014 08:00:00 GMT<p>AMAG Technology, a worldwide provider of complete end-to-end security management solutions for access control and video management, announced recently that its new Symmetry V8 software has been expanded to address the specific needs of end users in the federal government market. While Symmetry V8 meets the needs of many vertical markets, the latest V8 software is specifically designed to meet FICAM testing lab requirements for 128-bit credentials, and has been submitted to the U.S. General Services Administration (GSA) for final Federal Identity Credential and Access Management (FICAM) compliant testing and approval.&nbsp;</p> <p><em>&ldquo;The latest version of Symmetry software as a FICAM-compliant, GSA-approved solution is an example of AMAG&rsquo;s continued commitment to the federal government market. We are looking forward to the opportunity to partner with federal government agencies in their efforts to comply with current PACS standards,&rdquo;</em> said AMAG Technology,...Genetec president Pierre Racz wins EY 2014 Quebec Entrepreneur of the Year Awardhttp://www.sourcesecurity.com/news/articles/co-2566-ga.15580.htmlhttp://www.sourcesecurity.com/news/articles/co-2566-ga.15580.htmlCorporate NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Pierre Racz wins EY's 2014 Quebec Entrepreneur of the Year in the Technology and Communications Category</strong></td> </tr> </tbody> </table> <p>Pierre Racz, president of <a href="http://www.sourcesecurity.com/companies/micro-site/genetec-inc.html" class="blue_bold">Genetec</a>&trade;, a leading provider of unified IP security solutions, was named EY's 2014 Qu&eacute;bec Entrepreneur of the Year in the Technology and Communications Category.</p> <p>The EY Entrepreneur of the Year celebrates the contribution and spirit of entrepreneurs everywhere. The Canadian program is in its...LTV Europe presents itself as manufacturer and solution provider for perimeter protection at EPPC 2014http://www.sourcesecurity.com/news/articles/co-12015-ga.15579.htmlhttp://www.sourcesecurity.com/news/articles/co-12015-ga.15579.htmlEvents NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Many international exhibitors and speakers presented their innovative security solutions at the event</strong></td> </tr> </tbody> </table> <p>At <a href="http://www.sourcesecurity.com/events/free-event-listing/european-perimeter-protection-conference-2014.html" class="blue_bold">EPPC</a> (28th and 29th October 2014), <a href="http://www.sourcesecurity.com/companies/micro-site/ltv-europe-sicherheitstechnik-gmbh.html" class="blue_bold">LTV Europe Sicherheitstechnik </a>GmbH presented itself as manufacturer and solution provider for perimeter protection. At this...Identiv CEO Jason Hart to lead speaker session at Cartes Secure Connexions 2014 in Parishttp://www.sourcesecurity.com/news/articles/co-5790-ga.15578.htmlhttp://www.sourcesecurity.com/news/articles/co-5790-ga.15578.htmlEvents NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The presentation will take place at Paris Nord Villepinte Exhibition in Paris, France</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/identive-group.html" class="blue_bold">Identiv</a>, a global security technology company that provides trusted identity solutions for premises, information, and everyday items, recently announced that Jason Hart, Identiv CEO, will lead a speaker session at <a href="http://www.sourcesecurity.com/events/enhanced-event-listing/cartes-secure-connexions-2014.html"...TDSi welcomes Thomas Bird as Graduate Software Developer and Kevan Fry as Senior Technical Support Engineerhttp://www.sourcesecurity.com/news/articles/co-1645-ga.15577.htmlhttp://www.sourcesecurity.com/news/articles/co-1645-ga.15577.htmlCorporate NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>This latest round of TDSi appointments follows an impressive set of recent recruitments across the company</strong></td> </tr> </tbody> </table> <p>Integrated security solutions manufacturer <a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/tdsi.html" class="blue_bold">TDSi</a> announces the appointment of its new Graduate Software Developer; Thomas Bird and Senior Export Technical Support Engineer; Kevan Fry.</p> <p>Reflecting on the appointments, John Davies, Managing Director of TDSi commented<em>, &ldquo;Software has rapidly become an essential facet of any security provider&rsquo;s offering and...Vanderbilt Industries integrates SMS physical access control system with IDV Solutions Visual Command Center ERV platformhttp://www.sourcesecurity.com/news/articles/co-8694-ga-co-12200-ga-npr.15576.htmlhttp://www.sourcesecurity.com/news/articles/co-8694-ga-co-12200-ga-npr.15576.htmlNew Product ReleasesThu, 30 Oct 2014 08:00:00 GMT<p>Vanderbilt Industries and IDV Solutions, LLC recently announced that the companies have formed a technical partnership and completed an integration of Vanderbilt&rsquo;s SMS physical access control system (PACS) with IDV Solutions&rsquo; Visual Command Center&reg; enterprise risk visualisation (ERV) platform.</p> <p>Using a combination of the two technologies, security operations teams can visualise alarms for events like doors propped open, windows forced, or unauthorised entry attempts. Visual Command Center provides context for alarms, showing the building location, nearby assets, and surrounding events; such as current and forecast weather, natural disasters, terrorist threats or the release of hazardous materials.</p> <p>Vanderbilt Industries is a global leader in creating state-of-the-art security systems. The company innovates access control technology by designing, manufacturing and distributing systems that make environments safe, secure and easy to maintain....Arecont Vision appoints John Voyatzis as Director of Sales for Canadahttp://www.sourcesecurity.com/news/articles/co-3107-ga-co-3126-ga-co-1753-ga.15575.htmlhttp://www.sourcesecurity.com/news/articles/co-3107-ga-co-3126-ga-co-1753-ga.15575.htmlCorporate NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 267px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>John Voyatzis has over 10 years&rsquo; experience with security and surveillance technologies</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/micro-site/arecont-vision.html" class="blue_bold">Arecont Vision</a>&reg;, the industry leader in IP-based megapixel camera technology, has announced that John Voyatzis has joined the company as Director of Sales for Canada. Voyatzis will apply his extensive industry experience to support Arecont Vision&reg; customers, integrators, and technology partners, while generating new business to further grow Arecont Vision&reg;&rsquo;s...Milestone Systems announces distribution agreement with Ingram Micro for DACH regionhttp://www.sourcesecurity.com/news/articles/co-10635-ga-co-1151-ga.15574.htmlhttp://www.sourcesecurity.com/news/articles/co-10635-ga-co-1151-ga.15574.htmlCorporate NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Ingram Micro will handle distribution of Milestone products in the German-speaking countries of Europe</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/milestone-systems.html" class="blue_bold">Milestone Systems</a>, the open platform company in IP video management software (VMS), announced recently a new distribution agreement with <a href="http://www.sourcesecurity.com/companies/company-listing/ingram-micro-inc.html" class="blue_bold">Ingram Micro</a> to...HID to demonstrate secure identity solutions portfolio at Cartes Secure Connexions 2014http://www.sourcesecurity.com/news/articles/co-823-ga.15573.htmlhttp://www.sourcesecurity.com/news/articles/co-823-ga.15573.htmlEvents NewsThu, 30 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>HID will also highlight secure identity for enterprise, banking and government customers</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/enhanced-company-listing/hid-global.html" class="blue_bold">HID Global</a>, a worldwide leader in secure identity solutions today announced that under the theme &ldquo;Your Security Connected,&rdquo; it will demonstrate it new mobile identity solution and the power to connect people, devices and applications using its broad Genuine HID&reg;...Standardising global security to minimise risks and budgethttp://www.sourcesecurity.com/news/articles/co-4108-ga.15393.htmlhttp://www.sourcesecurity.com/news/articles/co-4108-ga.15393.htmlExpert CommentaryThu, 30 Oct 2014 08:00:00 GMT<table style="width: 101px; height: 299px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> </tbody> </table> <p><strong><em>Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at <a href="http://www.sourcesecurity.com/companies/micro-site/nedap-security-management.html" class="blue_bold">Nedap</a>, states that standardising security gives this assurance and more. It not only minimises risk and guarantees...How cybersecurity impacts the physical security worldhttp://www.sourcesecurity.com/news/articles/co-289-ga-co-2293-ga-co-3292-ga.15572.htmlhttp://www.sourcesecurity.com/news/articles/co-289-ga-co-2293-ga-co-3292-ga.15572.htmlExpert CommentaryWed, 29 Oct 2014 08:00:00 GMT<table style="width: 89px; height: 299px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Cybersecurity is a critically important aspect in today&rsquo;s increasingly IP-driven world of physical security</strong></td> </tr> </tbody> </table> <strong><em>The physical security market tends to dismiss issues of cybersecurity as outside its area of expertise, but cyber-threats are a problem that has been ignored for too long. The fact is, cybersecurity is a critically important aspect of the systems our industry provides in the increasingly IP-driven world of physical security. </em></strong> <p>And...Urmet delivers IP-based door entry system for Fulham Reach development project in Londonhttp://www.sourcesecurity.com/news/articles/co-1745-ga.15571.htmlhttp://www.sourcesecurity.com/news/articles/co-1745-ga.15571.htmlApplications NewsWed, 29 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>Urmet was able to deliver the powerful IPervoice IP-based door entry system &amp; IP PoE 7 inch Imodo touchscreens</strong></td> </tr> </tbody> </table> <p><a href="http://www.sourcesecurity.com/companies/company-listing/urmet-domus-communication-and-security-uk-ltd.1.html" class="blue_bold">Urmet</a> continues to dominate the high-volume, high-end residential door entry market with the award of another prestigious development contract, working alongside London&rsquo;s leading property developers, St George. Fulham Reach, positioned on the north bank of the River Thames and...IRN's East Africa Energy forum to address security challenges facing the oil and gas industryhttp://www.sourcesecurity.com/news/articles/co-11636-ga.15570.htmlhttp://www.sourcesecurity.com/news/articles/co-11636-ga.15570.htmlEvents NewsWed, 29 Oct 2014 08:00:00 GMT<table style="width: 1px; height: 269px;" border="0" cellspacing="8" align="left"> <tbody> <tr> <td></td> </tr> <tr> <td class="smalltxt" valign="top" align="center"><strong>The forum will address counter-terrorism, local conflicts and violence, among other issues</strong></td> </tr> </tbody> </table> <p>Although in the last half-decade a number of East African countries have emerged as global energy frontiers, and consequently the region is increasingly attractive to major IOCs, there are a number of specific security challenges which may hamper East Africa booming oil and gas industry.</p> <p>The <a...