Germany News

ASSA ABLOY to showcase integrated security & access control technology at IFSEC 2015

ASSA ABLOY will feature Aperio wireless locking technology run on the new high speed V3 platform ASSA ABLOY, the global leader in door opening solutions, will be showcasing integrated security and access control technology from its leading brands at IFSEC 2015. Recently named by Forbes as one of the world’s 100 most innovative companies, ASSA ABLOY will exhibit its unrivalled breadth of product choice on stand D1700 in Hall S17 at Excel, London, from 16-18 June. AS...

Siemens enhances Citigroup’s data center

Citigroup relies on the expertise and integrative solutions from Siemens for many years In Frankfurt, Siemens helps optimise Citigroup’s data center. When it comes to building automation, security technology and power supply, the Siemens divisions Building Technologies and Energy Management deliver numerous customer benefits through seamless cooperation that goes beyond divisional boundaries.  Frankfurt: the city with the highest density of data centers in Europe....

IFSEC 2015: Bosch Security Systems’ latest innovations and technologies to be showcased

Bosch’s new FLEXIDOME IP panoramic camera family as well as AUTODOME IP 4000 and 5000 models will be shown at the event From 16th to 18th of June, Bosch Security Systems will showcase its innovations and award-winning technologies in the South hall on stand F700 during IFSEC International 2015 in London. Visitors are invited to come see and experience how Bosch’s portfolio of video, intrusion, communication and fire solutions can meet any security and safety need....

Mul-T-Lock to present its digital security advances with ASSA ABLOY at IFSEC 2015

Visitors to Mul-T-Lock will be invited to experience ENTR, the first smart lock solution in the market Mul-T-Lock® will be at IFSEC 2015 with ASSA ABLOY to present its very latest revolutionary advances in digital security. The global brand will be highlighting its world-renowned ability to deliver incomparable functionality and build quality without compromising on security. A specialist integration hub The ASSA ABLOY stand (D1700 in Hall S17) will showcase how to &lsq...

Integrators should foster relationships to increase primary/secondary education sales

Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (primary/secondary) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience...

School security: Communication and controlling access

Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...

Networking basics for security professionals: What do layers really mean?

Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...

Oncam video surveillance solution boosts hospital security at various levels

According to the US Census Bureau 2012, the annual revenue total of the healthcare industry is $1.668 Trillion. There are 5,724 registered hospitals in the US (American Hospital Association). Each one is estimated to be worth between $100-500m in terms of total asset value (building, staff, and equipment). In the 2012 Hospital Security Summary, 25% of respondents reported an overall increase in attacks and assaults compared with more than 7% reporting a decrease; 34% reported an increase in pat...

Convergence of IT networks and physical security

Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...

Technology advancement requires well-educated, well-paid security officers

The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control centre. The post of security officer was a minimum wage job requiring little more than a high school diploma, if that. Educated and experienced security officers a prerequisite No more. “Today, when we read our requests for proposal (RFPs), we’re...

inter airport Europe 2015: Mack Brooks Exhibitions expands exhibition space

20th anniversary edition of the event will comprise of 3 exhibition halls & a spacious outdoor area Show organisers, Mack Brooks Exhibitions, has expanded the exhibition space at inter airport Europe 2015 by adding a third hall. The 20th anniversary edition of the International Exhibition for Airport Equipment, Technology, Design & Services, held from 6 – 9 October 2015, at the Munich Trade Fair Centre, Germany, for the first time will comprise of three exhib...

The Internet of Things presents new cyber-vulnerabilities

Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...

Online and offline locks: Leveraging the best of both options

Online wireless locks enable real-time online access control functionality Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customised system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...

Cyber-defence challenges cannot be ignored, says DVTEL

Cybersecurity has been getting much more attention lately in the physical security market. One company ready to address cybersecurity of IP video products is DVTEL. The Israeli company’s roots in IT and networking make it a logical choice to take a lead in cyber-defence of IP video systems. DVTEL’s core research and development (R&D) in Israel includes cyber-defence expertise. DVTEL’s cyber-defence plan In fact, DVTEL is moving fast to implement its cyber-defence plan &nd...

Networking basics for security professionals: Misinterpreting product specs – temperature, latency and more

Too often a valid assumption turns out to be the opposite in practical operation It’s easy to misinterpret product specifications of IP video transmission products to the detriment of system functionality. We have seen how this problem relates to port speed, power over Ethernet (PoE) and transmission media. Now let’s look at some additional aspects of product specifications – and how they can be misinterpreted. Importance Of Temperature Rating What about te...

Illinois Association works to quell proposed fire alarm legislation

Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the Illinois Electronic Security Association (IESA) to validate the reason for membership. Just last week IESA members and lobbyists travelled downstate to Springfield to show support and testify against two new bills, up for debate in a senate committee hearing, that would ultimately prove harmful and create a competitive disadvantage for license...

Deploying a high-performance computing environment to minimise processing costs

Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...

From consolidation to video services: Milestone’s Thinggaard talks coming trends

Milestone Systems is closing in on a year since their acquisition by Canon’s European subsidiary in June 2014. Throughout the ownership transition, Milestone has reiterated its commitment to open systems and continued to flourish, building its “ecosystem” alongside other industry partners. At the recent Milestone Integration Platform Symposium (MIPS 2015), I had a chance to chat with Lars Thinggaard, Milestone’s president and CEO, about industry trends and what’s ah...

Impact of school shootings on demand for security systems

School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (primary/secondary) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase in de...

Andreas Beerbaum to take sales responsibility at SeeTec AG

Andreas had already been in a leading sales position at SeeTec between 2008 and 2013 Starting April 1st, Andreas Beerbaum will take over the overall responsibility for sales at SeeTec AG, Bruchsal, again. He has a proven track record with several leading manufacturers in the video security industry and had already been in a leading sales position at SeeTec between 2008 and 2013. Stephan Rasp, CEO at SeeTec, is excited about the return: “I am glad that we’ve suc...

Networking basics for security professionals: Considering 4k’s impact on networks

Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HDTV, which in some cases was defined in terms of its resolution of 1920 hor...

What are the cybersecurity vulnerabilities of IP based systems?

Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...

ASIS European Security Conference & Exhibition witnesses 500 visitors from 46 countries

ASIS International showcased Europe’s leading suppliers of security technology and solutions ASIS International held its 14th European Security Conference & Exhibition on 29-31 March 2015 at the Messe Frankfurt Congress Centre in Frankfurt, Germany. Almost 500 attendees from 46 countries gathered to take part in a rich programme composed of exciting networking events, key industry presentations with exceptional keynote speakers and an industry exhibition showcasi...

ASIS European Security Conference to focus on security management

The conference will help delegates to connect with peers in security management The 14th ASIS European Security Conference & Exhibition will take place on March 29-31, 2015, in Frankfurt, Germany. This unique conference event will address a full spectrum of topics in security management such as: supply chain security, loss prevention, intellectual property, critical infrastructure security, terrorism, executive protection, physical security, investigations and gl...

GJD to showcase latest innovations at IFSEC 2015

Featuring on GJD’s stand will be the recently launched D-TECT 2 IP detector GJD Manufacturing Limited, one of the world’s most innovative leaders in UK manufacturing, design and supply of professional external detector equipment and CCTV LED Illuminators, recently announced it will showcase its latest innovations at IFSEC International 2015, on stand F1160 at the Excel, London from June 16th to 18th. IFSEC International is the world's largest gathering of security...

How should manufacturers engage with end user customers?

If we didn’t have manufacturers, integrators wouldn’t have anything to sell. But what is the role of manufacturing companies when it comes to taking those products to market? Effectively managing the sales channel – helping resellers be successful without somehow undermining their efforts or (heaven forbid!) selling direct to an end user – is an ongoing and delicate challenge for manufacturers. They want to do everything in their power to ensure success of their products...

Networking basics for security professionals: Do you believe in specifications?

Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...

Addressing the unique security challenges of primary/secondary schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Protection & Management 2015: Sir Ranulph Fiennes confirmed for Inspirational Speaker Series

Sir Ranulph Fiennes will touch on how the ability to perform under extreme pressure determines success Sir Ranulph Fiennes Bt OBE has recently been revealed as the second high-profile speaker confirmed for the Inspirational Speaker Series at this year’s Protection & Management Series; he will take to the stage on Wednesday 17th June at 2.30pm at ExCeL London. The world’s greatest living explorer at Protection & Management 2015 Pushing the boundaries o...

Security camera manufacturers address commoditisation and lower pricing

Commoditisation of cameras and downward price pressure are big topics in the video surveillance market. There was an interesting discussion about pricing and its impact on the integrator community at last month’s MIPS 2015 (Milestone Integration Platform Symposium). Participants were several of the major camera manufacturers, who provided a variety of viewpoints. Prompting the discussion – but with no representative on the panel – were the emerging Chinese manufacturers, who a...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems