Network video recorders (NVRs) News
Nowadays the Internet of Things has become an integral part of business around the world. The enhanced functionality made possible by the Internet of Things (IoT) and associated technologies are responsible for many of the major changes seen across society today. Video surveillance Video surveillance is one area that experiences substantial evolution driven by IoT technology. The intelligent monitors and sensors of the IoT combined with emerging high-speed network solutions promise to improve...
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several m...
The growing mobile ownership rate, the emergence of more user-friendly banking apps, the tech-native younger generation, and, of late, the pandemic-induced shift to online, all create a fertile ground for mobile banking. Unfortunately, the acceleration of banking app adoption today goes hand in hand with the increase of targeted security threats. In 2022, a month wouldn’t go by without a headline-making mobile banking attack or incident that resulted in stolen funds and sensitive personal...
Generally speaking, security becomes a topic of conversation among the general public only after something bad has happened. The context in these situations is: What went wrong? Largely absent from awareness by the public at large is how often things go right; that is, how often security systems work as intended to avoid expensive or even deadly consequences. We asked this week’s Expert Panel Roundtable: How can the industry communicate the value of security to the public?
With the worst of the COVID pandemic’s impact behind us, most would agree that the security industry was transformed by the interlude, as were most other elements in our society. But what will be the lasting impact on the security market – positive or negative? We asked this week’s Expert Panel Roundtable: Is post-pandemic security more effective than pre-pandemic security? How?
Although video camera technology has been around since the early 1900s, it was not until the 1980s that video started to gain traction for security and surveillance applications. The pictures generated by these initial black and white tube cameras were grainy at best, with early colour cameras providing a wonderful new source of visual data for better identification accuracy. But by today’s standards, these cameras produced images that were about as advanced as crayons and coloring books....
Nowadays to save costs by making full use of old devices while upgrading the old security projects, many integrators or installers prefer to use video management software to manage multiple brands of video devices (such as IP cameras, and NVR), instead of only one single brand. So that they could have more flexible choices to earn profits while saving costs. Multi-brands video device management On other hand, with market segmentation and specialisation, instead of managing the video by themsel...
Security is critical in the government sector, as much as any other vertical. Successful systems must promote public safety while also facing onerous requirements when it comes to cybersecurity. From a global perspective, the world seems less safe than ever before, suggesting an even greater role for security technologies. We asked this week’s Expert Panel Roundtable: How can security address the challenges of the government market?
One of the biggest security trends in the last two years has been the adoption of cloud-based services, spearheaded mainly by an increasing number of video surveillance-as-a-service (VSaaS) offerings. VSaaS market value According to MarketsandMarkets Research, the global VSaaS market value is expected to reach $6.2 billion by 2026. This growth is propelled by demand for remote access video services, less local hardware to maintain, new internet-enabled devices, and a lower total cost of owners...
Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend: More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher...
Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for the larger compa...
It’s safe to say there has been more change in the workplace in the last two years than ever before. Driven by the pandemic, technology has both allowed greater flexibility for employees and enabled continuing prosperity for many companies that otherwise would have had to cease operation. But have security protocols and practices done enough to enable companies to keep pace with the changes? We asked this week’s Expert Panel Roundtable: Have security protocols and practices kept up w...
Any marketplace tends to emphasise the newest technologies and products. Confirming the trend is the perpetual rush to buy the latest iPhone. But some legacy products are so good and perform the required functions so well that users may stick with the “tried-and-true.” But does staying with yesterday’s technology suggest a missed opportunity to leverage new product features and benefits? We asked this week’s Expert Panel Roundtable: What is the security market’s app...
With increasing security and public health concerns, contactless credentials are gaining more and more importance. Contactless credentials can be divided into two main categories: soft credentials that include mobile phone applications that tap into their BLE/NFC hardware and transmit the data, and hard credentials that typically include low frequency (125 kHz) and high frequency (13.56MHz) based passive RFID transponders. With the help of these credentials, organisations can tackle safety conc...
Early in the pandemic, before the mechanisms of COVID spread were clearly understood, there was talk about the disease being transmitted through contact with surfaces. Such concerns created a windfall for manufacturers of hand sanitizer, and broadly changed the perceived risks of touching surfaces, perhaps forever. Touching the same surface as hundreds of other people suddenly became less desirable, thus boosting the fortunes of “touchless” access control and security devices. But wi...
Audio-video technologies have historically been a silo in the enterprise, separated from the larger network infrastructure by their use of analogue, hard-wired and proprietary connections. Software-defined system However, AV devices such as video walls and corporate signage add more value to security and emergency response operations when they are connected to the larger IT network and can interface seamlessly with other systems. That’s the approach provided by Userful, which offers a s...
The intersection of consumer electronics and the physical security marketplace is a fertile sector for growth and innovation. Consumers increasingly have the same high expectations for the operation of their workplace technologies as they are accustomed to in the digital world at large. We asked this week’s Expert Panel Roundtable: How do developments in personal electronics impact customer expectations in the physical security market?
Corporate global security operations centres (GSOCs) bear the responsibility for protecting C-suite executives from physical and reputational harm amid the social upheaval, extreme weather events, and escalating cyber threats. That mission, daunting as it is, becomes more difficult when GSOCs lack the data necessary for conducting a comprehensive threat assessment. Threat intelligence Unfortunately, many centres never move past basic threat intelligence which focuses on scenario-driven queries...
Cloud-based applications and platforms revolutionise supply chain management, helping stakeholders scale operations from small businesses to complex enterprises. Cloud supply chain solutions are showing significant increases in implementation – so much so the sheer number of organisations with a cloud solution outpace or far outnumbers the ones that don't. But there is one area that has still not made the switch to the cloud, most often the security department. But the advent of using vid...
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximise that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges su...
The COVID-19 pandemic has complicated the task of securing hospitals and healthcare facilities by adding new concerns about disease transmission to the long list of other threats healthcare security professionals face. Hospital security must also crack the code to both allow open public access to healthcare facilities while keeping out violence and other security threats. We asked this week’s Expert Panel Roundtable: What are the security challenges of the healthcare industry?
Casinos offer several attractive applications for LiDAR, including security and business intelligence. Using laser sensors, the technology can replace the use of surveillance cameras. For casino security, LiDAR can track player movement and provides complete coverage and accuracy that have not been achievable by surveillance cameras. Massive coverage areas can save on costs of sensor deployment versus other technologies. LiDAR and its applications LiDAR is a method for determining ranges by t...
Newer facial recognition systems are scalable and provide more accurate results, and the end-user selects the parameters of system performance to suit their own application needs. “We have developed algorithms that can be optimised in various compute environments, whether in a small chip inside an edge device or on a large server device,” says Ido Amidi, Oosto’s Vice President of Products and Business Development. “It all depends on client needs. We can do it all withou...
Sadly, active shooter incidents have become so common that they no longer grab big headlines or dominate the news cycle. A near-constant cascade of active shooter events persists in the background of our collective consciousness, a familiar drumbeat that is no less tragic because it is continuous. As more active shooter incidents occur, the security marketplace continues to implement solutions to minimise the impact, including gunshot detection. We asked this week's Expert Panel Roundtable: What...
In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule. This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace. Strong a...
For security professionals who thought analogue systems were a thing of the past, a new approach by Mythic Inc. demonstrates that everything old is new again. Using older technology in a new way, the Mythic M1076 Analogue Matrix Processor leverages analogue computer chips from a previous generation to drive new levels of artificial intelligence (AI) performance with lower power requirements. Low power and high speed Mythic provides power-efficient AI at the edge, including inside...
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilo...
Air travel is returning to pre-pandemic levels. COVID and its aftermath have added new compliance and operational concerns for airport security, and social and political volatility around the world emphasises the need for constant vigilance. A range of new technologies are enhancing airport security, not to mention providing new tools to simplify processes throughout the airport. We asked our Expert Panel Roundtable: Which technologies are transforming airport security?
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-mas...
Cyber threats hit the headlines every day; however digital hazards are only part of the security landscape. In fact, for many organisations - physical rather than virtual security will remain the burning priority. Will Liu, Managing Director of TP-Link UK, explores the three key elements that companies must consider when implementing modern-day business surveillance systems. 1) Protecting more than premises Video surveillance systems are undoubtedly more important than ever before for a...
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
- View more IP cameras
- IP cameras
- IP Dome cameras
- Audio, video or keypad entry
- Network video recorders (NVRs)
- CCTV cameras
Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security
KentixONE – IoT Access and Monitoring For Data Centres
Climax Technology HSGW-Gen3 Modular Smart Security Gateway
One system, one card
DownloadEnhancing physical access control using a self-service model
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadHow to implement a physical security strategy with privacy in mind
Download