Italy News

Fitness World’s security is in good health with Vanderbilt SPC system

Vanderbilt SPC intruder alarm system’s flexibility meant that it could be used throughout the entire Fitness World estate Fitness World’s buildings are designed to be accessible and safe places for its members to train. Security is a high priority for the company and ensuring that only authorised members and personnel can enter the building is vital. Flexible intruder alarm system Vanderbilt SPC intruder alarm system’s built-in flexibility meant that it cou...

Bluetooth Low Energy drives access control innovation

Since the introduction of smartphones with downloadable applications, vendors have been trying to replace the traditional plastic identification (ID) card with a mobile phone application. People might lose or misplace an ID card, but most people immediately recognise if they are without their mobile phone. Mobile ID badges for access control Bluetooth Low Energy iBeacon technology Technical challenges of mobile ID apps The logical extension is to replace or augment the traditional corpor...

MOBOTIX IP camera solution secures Italian Ministry of Economy and Finance

To the lay person they appear to be simple LED light spots going back to the original style of illumination of the old 1800s palace (1876) that currently houses the Italian Ministry of Economy and Finance, and that historically represents the first great building of the newly reborn Roman capital, as commissioned by the former Minister Quintino Sella. Hidden in plain sight The carefully hidden technology, however, transforms each of the 20 light points (appropriately designated “Roma lig...

HID Global EasyLobby software streamlines visitor access control for property management company

The software is used by employees to obtain visitor passes and by security officers to monitor the system To protect these tenants, Trinity provides CCTV and access control to all buildings. In addition, security officers patrol in the loading docks. However, Trinity wanted to enhance the existing security by providing a visitor management system through which tenants could approve or deny visitor access. Trinity wanted a visitor management system that provided reliability, re...

Getting to know Scott Schafer, Chairman-elect of the Security Industry Association

Scott Schafer was formerly Arecont Vision's Executive Vice President, and serves as the Chairman-elect on the Executive Committee and Board of Directors of the Security Industry Association. Scott started out in the IT industry with NCR, where his teams introduced many breakthrough technologies including the first commercial notepad computer. After joining Pelco in 2004, Scott moved on to Arecont Vision. How did you come to work in the security industry? I was recruited by David McDonald, the...

Vanderbilt video & access control solution secures Bank Pekao in Poland

Based in Poland, Bank Pekao is one of the largest financial institutions in Central and Eastern Europe. Security is a paramount concern for the organisation, which is why it has chosen to implement Vanderbilt’s cutting edge video and access control technology across a large part of its estate. Leading financial institution Over the last 85 years Bank Pekao has become one of the leading organisations of its kind within Central and Eastern Europe. This Polish financial institution is consi...

Eagle Eye Networks acquires Panasonic CameraManager, expands European presence

Cloud-based video systems are becoming more common in the market, growing faster than on-site recording systems. One of the largest companies in the cloud video sector, Eagle Eye Networks is aggressively expanding its offerings to the fast-growing market, and its geographic reach, with acquisition of Panasonic’s cloud-based video business, including the CameraManager and NuboCam brands. Expanding Eagle Eye Networks' coverage in Europe The acquisition will expand Eagle Eye Networks’...

IFSEC 2017: Collaboration and customer-centric solutions stand out

With global events putting security at the forefront of everyone’s minds, IFSEC International 2017 was a chance for the industry to come out in force. Over 600 exhibitors and numerous seminars kept visitors informed on the latest innovations in security products, solutions and best practice. Despite the challenging heatwave, exhibitors were raring to go for the three mercifully air-conditioned days of the exhibition. SourceSecurity.com took to the show floor to check out what exhibitors we...

IFSEC 2017: Big data and artificial intelligence more than buzzwords

A growing emphasis on the impact of data – storing it, analysing it, and getting more value from it – was a common theme at this year’s IFSEC. Throughout the three days of the show at London’s ExCeL exhibition centre last week, there were many conversations about the growing benefits of the data generated by today’s physical security systems. Industry embraces deep learning & artificial intelligence Video analytics increasingly critical Access control provi...

IFSEC 2017 Day 2: Exhibitors shift focus from products to solutions

Exhibitors at this year’s IFSEC are thinking outside the box in terms of how they communicate their value proposition and how they interface with customers. In the process, some are rethinking how big trade shows like IFSEC fit with their goals. Panasonic's approach to the 'race to the bottom' Thomas Lausten, MOBOTIX new CEO How Gallagher benefits from IFSEC without exhibiting Panasonic Systems Communications Europe Panasonic Systems Communications Europe is one of several compani...

IFSEC 2017 Day 1: Trade show highlights changing security needs in Europe

Has there ever been a better time for a security trade show in Europe? Shifting threats such as terrorism and a volatile political climate serve as reminders every day of the importance of security in our lives, and even the role of technology. IFSEC opened in London on Tuesday at the ExCeL centre, covering every aspect of security, from access control and video surveillance to home automation and perimeter security. Amid sweltering heat, attendees came to find the latest-and-greatest innovatio...

HID Global’s Smart Employee ID provides secure access control at Nissan Europe

Nissan selected HID Global’s Smart Employee ID because it was the only field-proven solution that could scale to 100,000 users Nissan Europe facilitates the design, engineering, manufacture and sale of Nissan cars from locations across 34 European countries. The company’s headquarters are in Trappes, Paris and employs over 12,500 staff.  Search for a solution In 2001, Nissan Japan implemented a physical access solution which allowed its employees to securely...

What are the security challenges of healthcare facilities?

Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundt...

Milestone releases XProtect Essential+ as free VMS product

Milestone Systems, the global open platform company in networked video management software (VMS), has released XProtect Essential+ as a free entry product to the company’s portfolio. “XProtect Essential+ is a game changer for our open platform community. Essential+ allows anyone to start right. Any user can now benefit from the power of add-on solutions from our partners,” says Bjørn Skou Eilertsen, Chief Technical Officer, Milestone Systems. “Developers can use...

Avoid damaging network breaches with reevaluated cybersecurity

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer...

Getting to know Kim Loy, Director of Marketing at Vanderbilt Industries

Kim Loy is the Director of Marketing for Vanderbilt Industries. She was previously a member of the ONVIF Steering Committee and has also served as the Vice President of Global Marketing - Video Line of Business at Pelco by Schneider Electric. Kim has more than 20 years of marketing and management success within the security and surveillance industry, and has worked in the capacity of VP of Global Marketing as well as General Manager of the Security Business Unit for Xtralis. She has also he...

Milestone Systems ranked number one global VMS provider in 2017 - IHS Markit

Milestone Systems, the open platform community in networked video management software (VMS), not only retained the number one global position but also holds the number one spot in both Europe/Middle East/Africa (EMEA) and Asia/Pacific (APAC) and ranks number three in Americas. “Milestone continues its growth with an increase in net revenue of 18 % in 2016 over the year before and has significantly exceeded the overall market growth. Our continued focus on co-creation of revenue and innova...

VIVOTEK and Technet Informatics develop onboard monitoring system for ocean-going vessels

A maritime nation since antiquity, today Greece is one of the centres of the world shipping industry. At over 250 billion euros annually, shipping accounts for more than six percent of the country’s GDP and employs nearly three-hundred thousand people. In an industry of this immense scale, onboard security is a primary concern. The challenge: to install a shipside surveillance system able to withstand all weather conditions at sea. Seaborne surveillance systems The demands on a seaborne...

Arecont Vision megapixel camera technology used in transportation infrastructure and facilities

Airports, harbours, ports, railways, pipelines, highways, and bridges make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the infrastructure for the transshipment of people, freight, and cargo. Overall and targeted situational awareness These facilities require increasing levels of security and leverage Arecont Vision megapixel camera technology to deliver both over...

Safety and security checklist for National Safety Month

According to the FBI’s most recent data, there were almost eight million property crime offences in the United States in 2015, while the Occupational Health and Safety Administration (OSHA) estimates roughly two million employees per year are affected by some form of workplace violence. Don’t let your business become part of these statistics. June is National Safety Month, so it’s the perfect time to reassess your facility security measures and look for improved and effic...

University bomb hoax highlights printer security vulnerabilities

Colleges and universities have been targeted in the last several weeks with a series of bomb threats received via campus printers and fax machines. Targeted institutions included Vanderbilt University, the University of Southern California, the University of Virginia and the University of Detroit Mercy, among others. Businesses were also among the targets. Around 100 organisations in all received print-outs, faxes or emails demanding that a $25,000 ransom be paid to a Brazilian citizen to avoi...

Not an afterthought: The significance of security control room aesthetics

Security control rooms should be functional and durable, and their aesthetics should incorporate matching colours that are conducive to a 24/7 operating environment—not too much contrast and easy on the eyes. Another factor driving aesthetics is an enterprise’s desire to create a ‘showpiece’ to demonstrate a commitment to security for shareholders and other stakeholders. “Everyone wants to have a good-looking control room and a cost-effective design,” says Ma...

Mobile communications make the public an additional sensor on the field

Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need...

Technology evolution leads to changes in security control room furniture

Technology is changing the look and function of today’s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company’s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. Need for inte...

Download: Do you know the weakest link of your access control system?

In end-to-end security, it’s important to consider that the chain is only as strong as its weakest link. That is why it is essential that an access control system is always evaluated in its entirety, to discover where the weakest link can be found.   It is not uncommon for access control systems to be installed and then used for the longest time possible without any attention to updating the system’s intrinsic security features. There are many systems in the field that are...

What technology will have the greatest impact in the second half of 2017?

Technology is changing at a break-neck pace, and the security marketplace is currently being bombarded by a wealth of new capabilities and innovations. But what will be the impact? Which of the currently-hyped new innovations will have a major impact, and which will fade over time? And even acknowledging the long-term significance of various technologies, what can we expect to be the more immediate effect? We asked this week’s Expert Panel Roundtable: What new security technology is poised...

Consultants' Forum: The consultant-manufacturer relationship in the physical access control market

Manufacturers depend on consultants to get their technologies specified in customer projects. Consultants often depend on manufacturers to provide them current information about the technologies that are the building blocks of their projects. It’s a symbiotic relationship, but not always a perfect one. We recently gathered three consultants to discuss what they want from manufacturers, and a representative of HID Global to add a manufacturer’s perspective. Manufacturers also look to...

Building advanced connected solutions for modern security threats

Did you hear the one about the bear that nearly caused a nuclear catastrophe? It was around midnight on October 25 1962, in the midst of the Cuban Missile Crisis. A guard at Volk US Air Force Base – home to a number of armed nuclear bombers – spotted a shadowy figure apparently attempting to scale the fence. The supposed Soviet saboteur tripped the alarm, which was fatefully miswired. As a result, the klaxon was accidentally sounded, triggering a manoeuvre to scramble US inter...

Cyber security’s balancing act between utility and protection

Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis. Every second of every day, sensors are digitising the real world, creating information and transporting it across multiple networks and interfaces to a broadening audience. While there is obvious utility being gleaned from this process, from our vantage point here in the physical security space, information sharing and tra...

Cyber criminals are ready to attack your business: Are you ready to defend it?

Just when you think you have seen the worst that cyber criminals have to throw at you, they are back with more sophisticated, and in some cases, more severe threats. Understanding emerging and evolving cyber threats is the first step in helping to protect your organisation. The next, and most important, step is shoring up your defence technologies with the proper training, education and deployment. To help prepare for what may be coming next, let’s take a look at what are already shaping u...

Related videos

Find Lost Wallet with Dahua WizSeek

Dahua Traffic Signal Controller Highlight

CLIQ Connect