Netherlands News

Boon Edam launches BoonAssist TQ manual revolving door

Boon Edam Inc. announces the launch of BoonAssist TQ, a new manual revolving door that provides an ease of use previously not available in manual revolving doors. BoonAssist TQ offers the unique combination of three features: “push and go” power assistance, speed control, and positioning, also known in the industry as quarter pointing. The new door was developed in response to customers asking for a revolving door that offers comfort, intuitive operation and safety, where an automat...

Vanderbilt preparing to finalise acquisition from Siemens

The sale of Siemens’ Security Products to Vanderbilt is expected to close by the end of March, and already the owner-to-be is making good progress to form a new stand-alone company. Notably, the pending transaction is not a sale of company shares but rather a sale of assets, in this case product lines in the access control, CCTV and intrusion categories. In effect, a company is being created to manage those assets, and Vanderbilt has been working for the last several months to create the...

Networking basics for security professionals: Network switch bandwidth limitations

Any part of a transmission infrastructure has a dramatic impact on system performance We often view network switches as transparent transmission products. What goes in comes out. In reality, nothing is further from the truth. In this article, Neil Heller - Vice President, Vigitron, Inc. highlights that any part of a transmission infrastructure has a dramatic impact on transmission and, therefore, on system performance. At the very least a network switch can be viewed as a piec...

Camera apps usher in a new era in surveillance system design

Of the many benefits offered by new and advanced IP video surveillance cameras, the ability to easily customise these devices with third party apps has the potential to change the landscape in video surveillance system design and implementation. By providing the ability to customise individual cameras with the specific functionality desired for every specific camera location, camera apps not only increase functionality where needed, they deliver tremendous savings on a system-wide...

What are the current limitations of cloud-based systems? How will the situation change over the next five years?

There’s a cloud hanging over the security market. Or rather, The Cloud is portending great change for our market (and other markets, too). But with all the talk about cloud-based systems, limitations still linger along the path to optimum implementation in the security market. We asked our panelists to reflect on those limitations and look ahead five years to how the situation is likely to change. From bandwidth and connectivity challenges, to geographic limitations and even a need to chan...

The Internet of Things: what does it mean to installers and integrators?

loT will assist installers and integrators to position themselves as total solution providers and professional connectivity consultants to consumers  The buzz over the Internet of Things (loT) isn’t likely to subside anytime soon, given recent developments over consumer adoption of network-connected technologies. According to the 2014 State of the Internet of Things Study from Accenture Interactive, 69 percent of consumers plan to buy an in-home device in the next...

VuWall to demonstrate new series of VuWall2 version 2.5 at ISE in Amsterdam

This latest release is designed to address the needs of markets including security and control room, presentation and digital signage VuWall Technology announces its participation at ISE on February 10-12, 2015 in Amsterdam RAI, NL with its new series of products based on VuWall2 version 2.5. This latest release is an extended product line designed to address the needs of specific markets including security and control room, presentation and digital signage. By matching s...

Need help choosing an access control system?

Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, SourceSecurity.com asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market. AMAG: Easy migration, simple pricing model AMAG’s Symmetry platform includes access control, photo ID badging, visitor management and digital video server software, all standard in an integrated solution. The pricing model...

Challenges of convergence with fire systems

The obstacles preventing convergence with fire systems appear substantial The IT network began as a dedicated structure within a building or facility. From this starting point, we have seen telephones, HVAC, access control and increasingly CCTV/video residing on the same platform. If today’s facility managers were offered a new building with separate networks for each type of subsystem, they would react with incredulity. The exception is fire protection, where the life-...

US electric grid: Exposing complexities that make it vulnerable

The smarter the grid becomes, the more risks it will encounter Hollywood collided with couch-dwelling gamers this Christmas because of the hack on Sony’s computer system, allegedly committed by North Korea. Immediately, security experts began to wonder if a nation state or a terrorist group might try and hit the U.S. electric grid. The answer is likely yes, but it wouldn’t be the first time or the last, and the grid, smart or not, is extremely complex and interwove...

Arecont Vision camera captures robber’s face: Image "couldn’t be clearer"

“The quality couldn’t be clearer – something the police hope will help capture the criminal you are about to see.” The local news report then shows an image from the surveillance camera video of an ATM robbery in Arlington, Texas. The video depicts a black Kia automobile rolling up to a Wells Fargo ATM, and the 21-year-old female driver makes a withdrawal. The video then shows a robber sneaking around the ATM and surprising the victim. He’s holding a cell phone in...

Caught on camera: Arecont Vision dome camera spots woman forced into car trunk at gunpoint

"The only witness is a surveillance camera which caught the young man staring directly into the lens." Arecont Vision released footage of their surveillance camera installed at Wells Fargo drive-in ATM in Arlington, Texas of a robbery and kidnapping which was released to several media outlets. See more megapixel cameras from Arecont Vision here.

Barix to exhibit its latest forward-compatible IPAM302 module at ISE 2015

IPAM302 module ensures that OEMs can freely build a product today and easily replace the module in field moving forward IP audio and control specialist Barix has long had a strong OEM business, with the company’s IPAM module series at the core of tens of thousands of devices deployed worldwide today. At ISE 2015, Barix will exhibit its latest module, the IPAM302, for vendors and systems integrators seeking cost-efficient, openly programmable modules to build their own IP...

BCDVideo releases SMARTcontrol Management Software for its video recorder and access control server platforms

BCDVideo announced the release of their SMARTcontrol Management Software (SMS). SMS is an evolution in health monitoring for physical security technology for both BCDVideo’s video recorder and access control server platforms. BCDVideo will be making this a standard no-charge feature on its entire Nova Series platform, effective in February. SMS is a comprehensive, easy-to-use program which serves as a mission-control centre inside the product. Its key feature is that it sends alerts based...

Cannabis and Security: The road ahead for the legalisation of recreational marijuana

The stigma of the cannabis industry still hangs in the balance Final installment of 4-part series: The legalisation of recreational marijuana use in Colorado and Washington, along with it medical use in about 23 other states, has created an industry made up mostly of small mom-and-pop operators. “While the revenues in this industry are big, the number of people involved is pretty small,” said one security industry insider. That’s about to change as Wall Stre...

Overcoming obstacles to implementing hosted video surveillance

Hosted video surveillance, or cloud video, has been utilised in small markets over the past few years and is just now really being pushed as a viable alternative to traditional onsite DVR’s.  Most of the major surveillance companies are marketing cloud products.  Some of these cloud products represent true hosted video surveillance and others are a play on word with ‘cloud access’ being the marketing ploy. True cloud or hosted video streams real-time vid...

How to succeed at security outsourcing

To succeed at outsourcing, the relationship between the organisation and the outsourcing company has to be an equal partnership Can you save money on security by outsourcing? Maybe, maybe not, according to William J. Powers III, CIPM II, CIPI. “Considering the way I approach outsourcing, I’m not sure if it saves money,” says Powers. As director of facilities at the Sterling and Francine Clark Art Institute in Williamstown, Mass., Powers oversees facilities,...

Eyes on the prize: Taking full advantage of continued revenue growth

The systems integration industry is abuzz. Access control is super-hot, and the product category continues to grow. IP video surveillance specifications are moving along at break-neck speed. New technology categories in the security market – energy management, home automation and interactive services – are helping savvy dealers and systems integrators grow their businesses. But do these companies really know how to take full advantage of all the possibilities for...

What is the most underutilised technology in the security marketplace and why?

We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximise the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilising existing technology capabilities are a waste of money, aren’t they?

Efficient hospital security prevents possible mass shooting

Good security basics enabled a security response before the shooting started  Mass shootings by emotionally disturbed individuals and terrorists have led authorities and security professionals to search for means of prevention. “Analysing an actual incident in which a potential shooter was stopped seconds before becoming active can illustrate how solid security basics can help prevent catastrophe,” says Drew Neckar, CPP, CHPA, regional director of security wi...

Access control keeps schools safe

Schools are beefing up their security, with access control their go-to technology Schools are back in session after the winter break, but security is a 24/7 matter any time of year. K-12 and upper education are on high alert, dealing with increased incidents of violence, crime and vandalism. Access control is often the chosen technology of this vertical market, pairing well with CCTV, emergency communications and lockdown. Integrators and dealers who understand the nuances of...

IP Solutions provide multiple layers of access control at transit hubs

Airports, metro systems and other transportation centres must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to match specific risk levels by incorporating PIN and biometric verification for higher security. HID Global’s IP-based networ...

Dealer/Integrators face obstacles in the transportation sector, but it’s worth it

The security landscape continues to evolve in new, complex ways for transportation customers Dealers looking to enter – or to expand their presence in – the transportation vertical must adapt to the unique needs of each transportation agency customer. Issues such as limited budgets/resources, aging technologies, operational challenges and safety issues must all be considered when designing a system to best meet an agency’s needs. Integrators should seek to i...

“Phoning In:” Smart phones using NFC can replace cards

NFC can strengthen security by turning smart phones into physical and logical access control credentials The trouble with access control cards is that people lose them, lend them to friends who use the cards, or lose them, or lend them to someone else. Losing a card is bad enough, but people that lose cards often make it worse: “When someone loses an access fob or card, he or she doesn’t always tell the security department right away,” says Paul Timm, pr...

Cloud-based monitoring services: redefining technology’s reach

A growing number of users look to add cloud-based functionality to their surveillance toolkits In today’s market, both end users and resellers seek new technologies to make security programs more effective, while also helping business and employees be more efficient. Cloud-based monitoring services are gaining a significant amount of attention as an emerging solution to meet these needs. Maria Cambria, Vice President, Technical Center of Excellence, DVTEL says that end u...

North Central Security Services provides access control solutions to HOPE Family Health

Leading Tennessee-based security firm helps TN Non-Profit Health Facility Keep Patients Safe & Secure North Central Security Services (NCSS), a leading provider of security and monitoring services, is pleased to announce that it has been selected as the security company providing access control technology for HOPE Family Health, a non-profit delivering quality and affordable medical and mental healthcare to Tennessee residents who are either uninsured or in vulnerable popu...

British Security Industry Association survey highlights strong Middle East demand for UK security solutions

The survey also sought to discover which vertical markets were leading the way in taking up solutions offered by BSIA Export Council member companies New research carried out on behalf of the British Security Industry Association's Export Council in the lead-up to the recent Intersec 2015 exhibition in Dubai serves to underline the strong demand being seen in the Middle East marketplace for the latest security systems and solutions from UK businesses, despite the backdrop of i...

Axis Communications adds Andrew Martin to northern European senior management team

Andrew Martin joins Axis Communications as a retail business development manager Axis Communications, the global market leader in network video has made a positive start to the New Year with a key appointment to its northern European senior management team.   Andrew Martin, joins Axis as a retail business development manager and will be based in Watford. Following a successful early career with West Yorkshire Police, Andrew has worked in retail  security, loss...

ASSA ABLOY's Aperio™ protects Ahoy, the leading event complex in the Netherlands

Ahoy Rotterdam offers a stage for live communication, business and entertainment. With its unique combination of the Arena (for up to 15.000 visitors) a Congress & Meeting Centre and six Exhibition & Event halls. A team of 250 employees, partners and preferred suppliers want to enrich people's day or life: with a fine feeling, a wonderful memory, an inspiring idea, a business opportunity or maybe even a new friendship! Ahoy strives to create such a memorable experience for you. Harro v...

Avigilon acquires fundamental patents covering video analytics

ObjectVideo shook the industry a few years ago by launching a series of lawsuits against the industry’s big players, claiming infringement of ObjectVideo’s patents on the basic technologies of video analytics. Some of the targeted companies fought back, but in the end most opted to make the issue go away by signing a licensing agreement with ObjectVideo. The latest twist in the story is major video supplier Avigilon’s acquisition of those patents – and of the 19 related...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems

Latest Netherlands companies