Croatia News
Today, customers are demanding immediacy, personalisation and seamless services from their providers and our desire for instant gratification means that those servicing the public need to provide easy, fast, smooth and continuous ways to meet customer expectations. This is where interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way. In recent years, kiosks have fast gained popularity, not only because they enhance customer satisfac...
In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A...
Userful Corporation, a renowned provider of AV-over-IP solutions for enhanced video communication since 2015, announced that Sigma Alimentos, a popular global branded refrigerated food company, has deployed Userful video wall technology at its headquarters’ main control room. Sigma Alimentos is headquartered in Monterrey, Mexico and maintains operations in the U.S., Mexico, Latin America and Europe. The company’s 2017 revenues totaled more than 3 billion and it deploys a fleet of mo...
The fragmented nature of the security and safety equipment market has brought manufacturers, integrators and other market players together to drive the need for integrated, interoperable systems. As a global distributor of Network and Security Solutions, Anixter Inc. has joined the Open Security & Safety Alliance, a new partnership of global security, safety and building automation organisations, to help develop a framework of common standards, best practices and specifications that address...
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understan...
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level...
The best route to greater adoption of robotics in the field of physical security is intellectual honesty, says Travis Deyle, CEO and co-founder of Cobalt Robotics. “Robots are not a panacea, so we must be clear and honest about capabilities and use cases,” he says. “If you are dishonest, people will lose faith. We must have clear expectations about what’s feasible today and possible tomorrow.” The robotics tide is turning in the security market, which is notoriousl...
Provider of secure payments BITEL has recently launched a new point of sale (POS) terminal that features a fingerprint sensor manufactured by ARATEK, the pioneer in biometric authentication. Easy Integration “We are pleased to introduce the IC7200 featuring ARATEK capacitive A400-M fingerprint sensor,” said Mark Chun, senior sales manager for BITEL. The new model IC7200 is designed to be implemented for mobile payment, retail and social welfare distribution in various countri...
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and...
Userful Corporation, one of the world's pioneering developers of software for visual display solutions, announced that the Calgary Public Library has deployed 200 of Userful’s collaborative displays throughout its network of libraries, including the brand new 240,000 square foot central branch in the heart of downtown Calgary. The new library features a wide range of innovations and Userful Corporation is proud to be associated with the project. The company’s visual display solution...
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new wit...
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a CCTV system and why?
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focu...
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centres, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wire...
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to unders...
As cybersecurity has become a boardroom issue, there is an increasing call for the financial exposure from cyber risk to be measured. This enables financial appraisal of cybersecurity investments and informs decisions on cybersecurity insurance. Applying quantitative techniques to cybersecurity has long been considered a complex, if not impossible task due to the large number of factors to consider each with varying degrees of uncertainty and the lack of relevant, contextual data on cyber breac...
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors...
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact canno...
Video surveillance systems have proven to not only be a deterrent to crime, but are also now being used to collect data points to actually help detect abnormal behaviours which can alert authorities of potentially evolving situations. In either case, recorded video is critical for investigations to provide all but irrefutable evidence to prove or disprove that an incident took place and the identity of the individuals involved. Sounds like a pragmatic approach that’s quite simple in...
Tepe Security, which provides private electronic security services for individuals and corporations, became the fastest responding company to customer complaints with 51 minutes. Tepe Security Customer Services made a difference in the sector with the fast resolution time it brought to the complaints regarding Tepe Security alarm systems published on sikayetvar.com in 2017. According to the 2017 data of Complaintvar.com, Tepe Security resolved the complaints in a short time like 51 minutes...
Userful Corporation, one of the world's leading developer of software for visual display solutions, announced that it has surpassed the one million mark for displays supported globally. With customers in more than 100 countries in various markets, Userful is the trusted provider for industry leaders such as Capital One, Hewlett Packard, Hilton, NASA, Nestle and Schlumberger. “We partner with Userful because we love the adaptability and flexibility of their solutions,” said Marielle...
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panellists explain. We asked: What new technologies...
Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?
Tripp Lite, a global manufacturer of power protection and connectivity solutions, has released a new line of secure KVM switches. All 11 models are on the National Information Assurance Partnership (NIAP) list of compliant products, having achieved certification for Protection Profile v3.0 (vPP3.0) for Peripheral Sharing Switches. This NIAP certification holds IT networking products to high standards for data protection capabilities, meeting the strict security needs of the U.S. military and go...
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, New York, would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into...
Hikvision showcased their latest alarm solutions at Security Essen, with a keen focus on integration, demonstrating the company’s commitment to providing extensive security solutions to customers for a wide range of applications. The Hikvision alarm solutions demonstrated the full range of products and technologies available and how they can all be utilised together - covering any security need - all from one provider. Intrusion and video verification “We had a great show with lot...
Browse security news
Featured products
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download- Croatia Security companies
- Croatia Manufacturers
- Croatia Distributors
- Croatia Resellers / Dealers / Reps
- Croatia Installers
- Croatia Consultants
- Croatia Systems integrators
- Croatia Events / Training / Services
- Croatia Manned guarding
- Croatia Training organisations
- Croatia Associations / regulatory bodies
- Croatia Event organisers
- Croatia Media
- Croatia Services
- Croatia Recruitment / personnel
