India News

ARA’s asymmetric sensor approach adds focus to perimeter security

Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...

Optimising building automation for good return on investment

Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realised through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new tech...

Hikvision highlights its latest smart innovations at Secutech India 2017

Hikvision, the supplier of innovative video surveillance products and solutions, will be showcasing their latest Smart innovations, products, and technologies suitable for Smart city, banking, Energy, intelligent traffic, education and building applications - at Secutech India, Mumbai, 6-8 April 2017. Illustrating that Hikvision is not simply a video surveillance manufacturer but a total end-to-end system solutions provider, the company will be showing their full range of products, and Pyronix...

Identiv to showcase Cisco-integrated ICPAM 3.0, Hirsch portfolio, and access readers at Secutech India 2017

During Secutech India, Identiv will provide live, hands-on demos of its products and solutions Identiv, Inc. has announced that it will present its portfolio of physical and logical access solutions at the 6th International Secutech Exhibition and Conference, which will be held between 6th-8th April 2017 at the Bombay Exhibition Centre in Mumbai. Secutech India is one of the largest professionally organised security shows in India and for five successful years, has been on th...

CodeLynx adapts Microsoft HoloLens headset for security systems on the go

“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual devices and controls In effect, a s...

Aligning physical and digital security in the Cloud

Organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile...

ISC West 2017: How will IT and consumer electronics influence the security industry?

The top influencing trends in the security industry at ISC West 2017 will be big data, cyber security and the Internet of Things More than a thousand companies will be showing off their latest and greatest technologies and services at this year’s ISC West in Las Vegas. With so much to look at and experience, will you be able to pinpoint the next big thing or things that will dominate the security market in 2017? A good way to predict those upcoming trends is to look at w...

Matrix introduces video surveillance license plate recognition solution to automate verification of vehicle

License plate of each vehicle will be verified against the database uploaded Automated verification of vehicles at entry/exit of the premises will help organisations reduce dependency on manpower, chances of data manipulation, and achieve higher productivity. Security personnel will have an option to validate and authorise entry/exit of any vehicle with pre-defined data such as name of the driver, contact number, email, company name, and so on, mapped against the license plate...

Secutech India 2017: Matrix to showcase video surveillance, time-attendance, and access control solutions

Matrix video surveillance solution is an open platform system that integrates with all third-party software Matrix, a manufacturer and provider of telecom and security solutions, is participating in Secutech India 2017, Mumbai, from 6th to 8th April, 2017. Matrix will be showcasing its video surveillance, time-attendance, and access control solutions at the event.Advanced video analytics Matrix offers an enterprise-grade video management system designed, engineered, and built...

BCDVideo powers retail solutions with award-winning Aurora Server Series

The retail security market buys almost exclusively on price; however, with higher-quality camera resolution being the new norm, there has been an increase in storage requirements. Simply put, white-box solutions that may have been sufficient a few years ago can no longer support modern surveillance demands. Video surveillance solutionsThe short-term savings associated with white-box servers quickly deteriorates into high long-term costs. Making an investment in a custom-built solution will not...

Climax Technology launches new integrations and features on Climax Home Portal Server Platform

Climax Technology is now offering integration with Amazon Echo, IFTTT, and voice reporting, available on Climax Home Portal Platform, to provide users with increased flexibility, control and greater peace of mind. Climax Home Portal Server Platform is an IP/GPRS-based security management solution designed to provide security professionals and home owners with new and convenient ways to manage home security and smart home automation services. Voice control with Alexa With the addition of Amazon...

Smartphones offer many advantages over cards and fobs for access control

Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control: 1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected. 2. Longer-distance communication, which allows readers to be mount...

Improving healthcare security with modern surveillance technologies

Through new technology, applications and analytics, video surveillance systems are helping to make hospitals a safer place Healthcare organisations face many challenges. Federal mandates associated with the Affordable Care Act (ACA), changing reimbursement models, an ageing population and competition are among the most concerning issues. Unfortunately, so are safety and security. However, video surveillance is helping. Through new technology, applications and analytics, v...

Artificial intelligence poised to make great strides in security industry

When most people think of the term artificial intelligence, science fiction films both old and new tend to come to mind. Whether it’s the military network Skynet becoming self-aware in The Terminator and wiping out the majority of mankind with nuclear weapons, or the hosts in Westworld developing consciousness and turning against their human masters, Hollywood tends to paint a grim picture of this area of technology. The reality is that artificial intelligence – or AI...

IronYun: How AI simplifies video search and lowers storage costs

Artificial intelligence and deep learning are poised to transform how video images are used and managed. In today’s surveillance systems, video from more and more cameras leave operators at risk of drowning in data, requiring hours of manual effort to track assets or persons of interest. They need more intelligent systems. Among the new tools is use of neural networks to create video analytics systems that are trained, not programmed. In effect, the systems have the ability to “lear...

How are smartphones impacting the physical security market?

Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly pl...

Convergence India 2017 announces innovative products and services on display

Convergence India 2017 is a veritable non-stop feast of knowledge with innovative solutions on display Every year technology czars and start-ups alike descend on New Delhi to either showcase the amazing products and solutions or to clinch deals behind the scene at Convergence India. Connecting with industry leaders, hitting the show floor, and listening to highly sought after industry experts, the three-days spent at Convergence India are energising for participants. Converg...

Convergence India 2017 focuses on connectivity

Convergence India 2017 and IoT India expo 2017 was a record-breaker in terms of participation and attendance Convergence 2017 was all about connectivity – both in the form of the technologies displayed and launched and in the face-to-face business networking taking place throughout the show. Convergence India 2017, the 25th anniversary of South Asia’s largest gathering of innovation and connectivity in the ICT, broadcast and digital media industries, concluded. Di...

Convergence India 2017 to witness innovative technologies and new product launches

Convergence India 2017 and Internet of Things India 2017 expo are unveiling the future of being connected The Convergence India 2017 expo and Internet of Things India 2017 expo (IoT India 2017) opened its doors, celebrating the 25th anniversary of South Asia's most influential and relevant trade event for the ICT, broadcast, and digital media industries. Ground-breaking technologies on display The expo runs through Friday, February 10, in Pragati Maidan, New Delhi,...

VIVOTEK VAST used in successful IP surveillance project at Varun Beverages Ltd.

With the IP surveillance system, VIVOTEK has brought Varun Beverages on par with the evolving security landscape VIVOTEK has extended its IP surveillance services by improving the efficiency of daily operations at soft drinks franchise Varun Beverages Ltd. Prior to this, Varun Beverages had experienced a number of different issues, despite being under analogue surveillance. These issues included everything from theft to the operational inefficiency of workers. By helping Varu...

What are the security industry’s newest buzzwords?

Changes in our industry’s technologies are reflected in the language we use. Over the years, more than one industry trend has been tied to associated buzzwords – for better or worse. As the technologies change, so does the language. We asked this week’s Expert Panel Roundtable: What are the industry’s newest “buzzwords” and what do they reflect about the changing market?

Matrix to showcase its enterprise-grade telecom and security solutions at DEFCOM India 2017

Matrix will demonstrate COSEC DOOR FMX as a high-performance door controller with multispectral sensor Matrix, a well-known manufacturer of telecom and security solutions is participating in DEFCOM India 2017, organised on 23rd and 24th March, 2017, in New Delhi. DEFCOM is an ICT event, where defence personnel get a glimpse of the modern communication technologies. Matrix, with a strong history of offering robust hardware to armed forces, will showcase its diversified range o...

QinetiQ demonstrates new privacy-protecting body scanner for crowded places

The new scanner can quickly screen large groups of people without needing them to stop or slow down Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. The QinetiQ SPO-NX SPO-NX...

Gunshot localisation solution ShotPoint triggers VMS in case of active shooters

A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. “For responders, the police department doesn’t have to manage cameras, but has the instant availability of a camera feed,” says Kathleen Grigg...

Key critical thinking skills for security professionals

Successful critical thinkers are judged by results that almost always involve deliberation and intuition, logic and creativity Security and safety practitioners responding to evolving threats make decisions every day based on uncertainty, insufficient information, and too few resources for textbook solutions. Unsurprisingly, Chief Security Officers report that critical thinking, decision making, and communications skills are key characteristics for job success. But do we reall...

What is an open system? Is there a consensus in the marketplace of the definition of “open?”

Open systems are great at providing freedom for end user customers. But does the term “open system” mean the same thing throughout the industry? In the bad old days before the introduction and broad acceptance of open systems, security vendors produced proprietary systems that used only their own hardware and software. This locked in a customer to a specific vendor’s product line, and if another vendor offered a better product, the only way to get it was to switch to that vendo...

Climax Technology announces next generation VST-862P-F1 camera PIR sensor with F1 Technology

Climax Technology introduces its VST-862P-F1, Pet-Immune Camera PIR Sensor, a new addition to Climax next generation family of PIR Camera Sensors leveraging the power of Climax F1 Technology. VST-862P-F1 is a pet-immune, passive infrared (PIR) motion sensor camera maintaining the peak performance of F1 models with long RF communication range, enhanced penetration and sensitivity rate, increased data quality transfer speed, and advanced dynamic speed adjustment algorithm. The VST-862P-F1 offers...

Next generation video analytics: separating fact from fiction

Real-time search analytics addresses one of the most important control room tasks - locating a person of interest If you have been to any of the many security industry tradeshows this year you will undoubtedly have seen and heard the phrase ‘next generation video analytics’. Is it just a catchy marketing phrase or is there more substance behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mys...

Increased power grid security tackles natural and man-made threats

Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a mode...

Protecting cultural and hospitality venues from terrorist attacks

Cultural and hospitality venues are attractive targets for terrorists due to their public accessibility Over the past 40 years there have been numerous attacks carried out against cultural and hospitality venues in the furtherance of religious, ideological, criminal or political beliefs. By default, cultural and hospitality venues are attractive targets for terrorists due to their public accessibility, the volumes of visitors and guests or because of what the venue represents;...

Related videos

Find Lost Wallet with Dahua WizSeek

Dahua Traffic Signal Controller Highlight

CLIQ Connect