India News

Matrix IP cameras utilise True WDR to ensure good image clarity in all lighting conditions

Surveillance Cameras need proper illumination to capture images. So, low or no light means no proper images. The solution to this is True Wide Dynamic Range. It is a sensor-based technology used in modern IP Cameras. Using this technology, cameras can produce images even under varying light conditions. It can also maintain proper image brightness, exposure and contrast to ensure good image clarity. True WDR technology It works by capturing several images with slow shutter speed (to capture mor...

How artificial intelligence (AI) is changing video surveillance today

There’s a lot of excitement around artificial intelligence (AI) today – and rightly so. AI is shifting the modern landscape of security and surveillance and dramatically changing the way users interact with their security systems. But with all the talk of AI’s potential, you might be wondering: what problems does AI help solve today? The need for AI The fact is, today there are too many cameras and too much recorded video for security operators to keep pace with. On top of...

Security Essen 2018 promises modernised trade show experience for attendees

Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen w...

Steps to develop an integrated retail security strategy

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that ca...

GSX 2018 continues 63-year tradition as an integrated trade show

GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organisations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. b...

Fidano announces successful completion of annual SOC 1 Type 2 examination to reaffirm dedication to security compliance

Fidano, a software and business solutions provider for the payment processing industry, has successfully completed a rigorous fifth annual examination of its policies and procedures, under the System and Organization Controls (SOC) 1 Type 2 standards, demonstrating its ongoing commitment to data security at all levels of its operations. SOC 1 Type 2 standards examination The demanding third-party examinations that led to the achievement were administered by the professional IT assurance and co...

KnowBe4 completes rigorous SOC 2 Type 2 data security exam under 360 Advanced

KnowBe4, a provider of security awareness training and simulated phishing, has completed a rigorous third-party audit of its data security procedures and processes under the System and Organisation Controls 2 (SOC 2) Type 2 standards. KnowBe4 completed the SOC 2 Type 1 examination in April, and immediately initiated action to achieve a SOC 2 Type 2 status. The examination that led to compliance with the demanding SOC 2 Type 2 data security standards was administered by the professional IT compl...

Ava Group Company solution protects major military closed data network from threat of tampering and tapping

Ava Group a provider of risk management services and technologies, announces that an Ava Group Company solution has been selected to protect a major military closed data network from the threat of tampering and tapping. The project to deploy its fibre optic intrusion detection and location solution is valued at around US $11M and asserts Ava Group’s status as a pioneer in data network protection. Ava Group Chief Executive Officer, Chris Fergus states: “We are proud that the Future F...

Five cyber security threats your enterprise must address

By now your organisation should know the drill. To keep your enterprise safe from unauthorised access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vu...

What is driving the growth of cloud systems in physical security?

The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?

Matrix COSEC Field Visit Management web-based field employees’ portal improves field operation

In today’s era of globalisation, it is important to have talented and skilled employees in different locations. To significantly improve field operation, managing and analysing your team deployed in the field is a key task. Whether it is logistics, hospitality, construction or retail industries, it is essential to have effective communication with workers to keep up their morale and for better planning of field employees. With the traditional system, it becomes a herculean task to manage r...

What is the value of physical security data?

We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Pa...

Developing Solutions provides dsTest v5.1 to all current customers with active support agreements

Developing Solutions, Inc. dsTest v5.1 is available to all current customers with active support agreements. It is available for downloading from the Developing Solutions secure support website. All features available in v5.0 are carried forward into v5.1. In addition to the continued support and development for 3G and 4G core network testing, dsTest v5.1 will include the initial releases of 5G core services for the N2, N8, N10, N13, N12, N11, and N4 reference points. Implementing automated te...

Matrix eliminates need of a server for central monitoring & management with cascading feature

Cost of a server is one of the major concerns while considering a Multilocation Video Surveillance solution. Moreover, there is complexity of operating the server from a central location while monitoring different locations. Matrix Video Surveillance solution has a special feature called Cascading, which eliminates the need of a server for centralised management and monitoring. Cascading is a feature of adding multiple devices on a single network in a User Interface (UI) so that all devices can...

Arecont Vision Costar delivers megapixel camera solutions for banking and financial services

Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about...

Arecont Vision Costar leadership plans for growth

It has been an eventful few months for Arecont Vision, which has gone through Chapter 11 bankruptcy and, ultimately, was acquired by Costar Technologies Inc. What emerged is a new company, Arecont Vision Costar, poised for future growth unfettered by previous debt. For insights into what’s next for the newly minted company, we posed several questions to Jim Pritchett, CEO, Costar Technologies Inc., and Raul Calderon, President, Arecont Vision Costar. Q. Please relate how Costar came to...

Matrix Comsec launches PRASAR UCS Pure IP Solution on Dhow Cruise for Dubai market

Matrix, a manufacturer of enterprise grade Telecom and Security solutions, works relentlessly towards betterment of its Telecom and Security solutions portfolio. Recently, on Independence Day, they launched thier Pure IP Solution for Enterprises – PRASAR UCS in the most unique fashion. First of its kind, PRASAR UCS was launched in the Dubai market on the Dhow Cruise at the Marina. Their chief agenda for conducting this event was to establish PRASAR as a one-stop solution that made scalabi...

Matrix Comsec to host its maiden event Insight in Indonesia on 13th September 2018

Matrix, manufacturer and believer of ‘Made in India’ Telecom and Security solutions, has been a host of a number of its maiden event Insight. This event has been conducted and used as a platform to spread the company’s reach in different markets, getting in touch with partners and prospective system integrators. Matrix Insight Indonesia 2018 Matrix is all set for yet another Insight event in Indonesia. The event will be hosted at the Shangri-La Hotel, Kota BNI, Jln. Jend. Sud...

ASIS International develops active assailant best practices for security professionals

When an active assailant strikes, it’s over fast, and most of the damage happens before help arrives. Responding appropriately can save lives, and it takes training and practice to know what to do as a tragedy unfolds: Where can I hide? Can I get out? Where do I run? If you hear shots or see someone with a knife, your training empowers the best response, and thorough and repetitive training avoids being paralysed by panic. Standards on workplace violence ASIS International is a member of...

Matrix to showcase pure IP communication server at Channel Live’18, NEC Birmingham

Matrix, global telecom and security products manufacturer, in its maiden participation at Channel Live’18 will be unveiling its latest telecom solutions. PRASAR UCS IP-based server Matrix is set to explore United Kingdom’s enterprise Telecom and Security market with its most anticipated launch, Pure IP-based Unified Communication Server – PRASAR UCS. Along with this, Matrix will also be giving a sneak peek into their upcoming enterprise Telecom and Security solutions like Vid...

The evolution of facial recognition: from body-cams to video surveillance

Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies arou...

Wireless electronic locks: opportunities for security integrators

Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realised in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labour costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportu...

Which security vertical markets are impacted by seasonal changes in demand?

The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?

GITAM University secures campus with Matrix video management & surveillance solutions

GITAM University is a renowned research and innovation driven university in India. The university has three campuses - its main campus at Visakhapatnam with off campuses at Hyderabad and Bengaluru. During the last 36 years it has steadily evolved into a world class university, recognized for the experiential learning it offers, its competent and compassionate faculties, the stellar research laboratories, academic vibrancy and cosmopolitan culture. Known for its creative dynamism and flexibility,...

How to choose the right storage card for video surveillance systems

With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data...

What’s new “on the edge” of security and video surveillance systems?

By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...

Preventing workplace violence: considering the instigator's perspective

A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their...

ForeSight Medical, LLC attains HITRUST CSF Certification to manage risk, enhance security posture and meet compliance requirements

ForeSight Medical, LLC, a renowned provider of surgical and implant cost-containment services, has announced that their ForeSight and Encompass applications have earned certified status for information security by HITRUST. HITRUST CSF Certified status HITRUST CSF Certified status demonstrates that the organisation’s ForeSight and Encompass applications have met key regulations and industry-defined requirements and is appropriately managing risk. This achievement places ForeSight Medical,...

Six reasons security integrators should adopt cloud technology today

As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...

360 Advanced, Inc. assist Silvervine achieve compliance with SOC 1 data security standards

Silvervine, Inc. has demonstrated its continued commitment to data security and privacy by completing a meticulous outside audit of its System and Organization Controls 1 (SOC 1) Type 2 standards. The detailed examination that led to the achievement was administered by the IT assurance and compliance staff at 360 Advanced, a respected national Qualified Security Assessor, HITRUST CSF Assessor and CPA firm based in St. Petersburg, Fla. Assurance and operational visibility Companies that comple...

Related videos

Find Lost Wallet with Dahua WizSeek

Dahua Traffic Signal Controller Highlight

CLIQ Connect