Netherlands News
In a layered approach to security, the outermost layer increasingly might refer to an area outside a fence line. The sooner a facility is alerted to a possible threat, the better, and when a threat reaches inside a facility’s fence, it may be too late to mitigate it. Security directors need situational awareness that extends outside the facility and provides the ability to intercept intruders before they become a threat. Zones of interest, or buffer zones, outside a facility’s fence...
Spread of the Ebola virus beyond Western Africa has heightened concerns among healthcare professionals and the general public. In practical terms, healthcare facilities – including their security departments – are preparing to deal with whatever happens next as concerns about the disease continue. Even areas that are not a “hot zone” for Ebola virus exposure may face additional challenges, given uncertainty about the spread of the disease and a possible influx into hospit...
Nedap has demonstrated how security systems can be directly adjusted to meet new requirements Nedap responds to new challenges in the field of security with the use of software components in security systems. These challenges arise from changing laws and regulations – such as the Act on Privacy, proposed by the European Commission – and increasing external threats, such as hackers. Under the influence of these changes, Security Managers have to deal with a complete...
Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by movement in the areas where cameras are located. Event-driven video can be achieved by using intelligent motion detection or video contents analytics (VCA) on the camera, recorder or PC server. Recently, performance of VCA has improved; however, some conditions can still affect detection using the camera image. Tomo Ito, Business Development Man...
Customers sometimes look at how old or new a company is when having to decide between different security suppliers. But should they? There are several decision-influencing factors in the security industry. Other than the actual technical specifications of the security systems and solutions, there are several other factors people take into consideration such as customer service, technical support offered, product warranties and interoperability, just to name a...
AG Neovo is happy to announce the debut of its QF-28, a 4K ultra-high definition display that provides not only superior image clarity but also flexible viewing options. It promises to prove the definitive choice for professionals whose top priority is to capture exceptionally delicate images, down to the last detail, on their displays. The QF-28 brings nothing short of a revolution in resolution. With 3840 x 2160 pixel resolution, or four times those of a Full HD display, it delivers pictures...
If a security or video surveillance / CCTV system isn’t working, who’s to blame? Or more to the point, what’s to blame? Is the problem the malfunction of a specific device on the edge of the IP network, or is it a network or other system failure? How can an end user or dealer / installer know what the problem is? How can a camera manufacturer know if a call to their overworked tech support department is really about the manufacturer’s camera or cau...
At what time of day do you have most people in your building? Do you have enough parking spaces for your employees? Are there always enough first aiders in the building to meet safety requirements? Security systems provide a wealth of data, which can provide the answers to these questions and more. By extracting reports from your system, you can gather valuable information to increase safety or improve business processes. Wiebe Koopmans, owner of Linked Solutions, advises bus...
Information overload. That's how tradeshows can seem. You're being fed lots of information by several different people in a short amount of time. It can all be very overwhelming. So what do you do? It's relatively easy to create a plan for smaller shows. But with larger events such as Security Essen, IFSEC and ASIS, it's far easier to become overwhelmed by the amount of choices and options. With Essen and ASIS just behind us, we asked some of our panellists to reflect on the...
We are in the midst of tradeshow season. With Security Essen and ASIS International back to back this year, several manufacturers are present at both. ASIS is one of the largest security tradeshows in North America, but not nearly as huge as Security Essen. Some prefer Essen, and others prefer smaller shows like ASIS or IFSEC. We asked some of our panellists for their thoughts on smaller versus larger tradeshows. Let's see what they had to say.
A busy first day at the ASIS International Seminar and Exhibits in Atlanta ended with a surprise strategic announcement by one of the industry’s largest suppliers and one of its most successful up-and-comers. Axis Communications and Sightlogix announced a strategic agreement to sell both technologies cooperatively to end-user customers through dealer channels. Despite the broad product range Axis brings to market, the company does not have a perimeter security solution, which is the stren...
In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability Alliance (PSIA) is looking ahead to some new possibilities in its long-term roadmap. David Bunzel, PSIA executive director, shared with me some of the active discussions among alliance members about where the next wave of interoperability initiatives may lead. Integration of wireless locks is at the top of the list, a response to the growing and...
Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic security cooperative encompassing some 250 electronic security systems integrators, and aligning them with over 150 vendor partners. Multi-million-dollar manufacturers are taking advantage of economies of scale to drive down pricing of many of the components our industry uses, and lower prices are poised to have a long-term detrimental imp...
Just days before the ASIS International conference and exhibits in Atlanta, the global security market's attention last week has been focused on the big Security Essen 2014 trade show in Germany. With more floor space, exhibitors and attendees than ASIS, Security Essen highlights a wealth of technology resources to an eager international audience every two years. Several SourceSecurity.com staff members attended Security Essen last week, and my colleagues reported that the well-attended show ref...
With the FO400A window handle lock, security specialist ABUS adds a VdS-approved lock with integrated alarm to its range. These products bridge the gap between purely mechanical locks and locks which can be integrated into alarm systems. This window lock has two functions: while the lock provides effective mechanical resistance against intruders, the 110 dBA signal from the integrated alarm function scares away potential intruders. Intruder-resistant locks form the basis for effective window lo...
Simple look, powerful performance: the new hemispheric IP dome from ABUS can swivel, incline and zoom without mechanical camera movements – at up to 6 MPx resolution. 360° and 180° panoramic views are also possible. Sometimes one eye sees more than two: if required, the new hemispheric IP dome from ABUS, available as an indoor and outdoor model, can permanently provide a 360° or 2 x 180° view of everything that moves in its vicinity. Thanks to the up to 6 MPx resolution @...
Bluetooth Smart creates new ways to open doors and gates The latest generation of access control systems offers more secure and sophisticated credentials, and new credential form factors including mobile devices that offer a more secure and convenient way to open doors and parking gates. Mobile access control also delivers a simple and user-friendly secure identity management process, and a platform for integrated, multi-layered physical access control (PACS) and IT security s...
I love Wikipedia, not just because I use it every day, but also because it reflects the value that can be created when a large community works together. When each member of a community contributes a small part, the result is monumental. I saw an estimate somewhere that it would take a million pages to print out Wikipedia. Is there an opportunity to leverage video in the same way; that is, to tie together the capabilities of millions to create a central repository that could be useful? Consider...
Surveillance cameras in public places and private properties are rather ubiquitous these days, but what is less obvious is whether a camera is a "dummy" camera or not. Installing fake surveillance cameras to use as a deterrent is a common tactic used when the price of a real security camera falls outside of one's budget. But when should dummy cameras be used? What are the implications this poses? Let's see what some of our panellists think.
The Silver Comet Trail is a 61-mile hiking and biking trail west of Atlanta that follows a route previously travelled by the Silver Comet passenger train from 1947 to 1969. I heard about the train when I was growing up but was never a passenger. As an adult, I have been on the Silver Comet Trail a couple of times; it’s mostly level and great for biking (or walking). The former route of the railroad tracks has been paved over, extending through a beautiful, natural environment that feels li...
When Apple makes a new product announcement, the whole technology world takes note. Such was the case last week when the tech giant introduced its sleek and shiny new iPhone 6 and iPhone 6 Plus. Almost as an encore, the company also unveiled the stylish and versatile Apple Watch, which will be available in early 2015. We have all seen the impact of mobile devices on systems and technologies used in physical security, so any new smart phone products have the potential to impact our market. In th...
You can expect to pass through tight security checks in environments, such as airports and government buildings, which are greater targets for terrorist attacks or other forms of violence. You don't expect to pass through the same level of security checks in neighbourhood shops and schools. It's a simple rule that there will be more security systems in places where there's a greater need for them. Generally speaking, there isn't such a high need for very high end securi...
SureView Systems announces they have successfully integrated the mobiDEOS UCNE range of cloud and network-enabled surveillance systems into Immix, the company’s video based automation software. Immix® delivers a single platform to manage video surveillance/CCTV, intrusion and fire alarms, access control, and VoIP audio. The mobiDEOS UCNE system enables legacy CCTV systems to be quickly and simply connected through the device and onto Immix for remote monitoring across many locations t...
Teleste will showcase its new range of EoC devices, based on Entropic's latest MoCA 2.0 chipset design Teleste Corporation, a leading provider of video and broadband technologies and services, has made the next big evolutionary step with MoCA® (Multimedia over Coax Alliance) technology. Teleste is the first company in Europe to bring to market a whole new range of EoC (Ethernet over Coax) devices, based on Entropic's latest MoCA 2.0 chipset design. The new MoCA 2.0 pr...
AEOS from Nedap is the first software-based security management platform. AEOS, which we developed in-house, uses generic controllers. Via Nedap's software, AEOS controllers can accommodate functionality for access control, intrusion detection, video management and locker management. All functionality and authorisations are stored on the controller level of the system. So your platform’s functionality is established by loading and configuring the appropriate AEOS software components. When...
In today's world of mobile devices, the number of apps available to the general public is increasing daily - apps that are designed to make our lives simpler and help us be more efficient. With about three-quarters of the world's population having access to a mobile device, it's no surprise that the range of different types of apps available today is so wide and varied. For the general public, there's an app for nearly everything. You can do your banking, order groceries, find th...
Law enforcement and pure problem-solvingskills will play less of a role for the futuresecurity director Much effort has been put down in the professionalisation of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalisation and academisation of security practice as well as a recently updated standard (ANSI/ASIS...
If a video surveillance system is installed using public funds, should the resulting video therefore be accessible to the public? A poll in the United Kingdom suggests the majority of Britons think it should. 64 percent of 1,345 people surveyed believe that British taxpayers, who pay for cameras placed in public places, should have access to the video feeds through live web streaming. The survey was conducted by installer CCTV.co.uk. There could be advantages to providing public access to vide...
Maintaining a high level of customer service can be a challenging experience when an acquisition takes place.This issue is of particular relevance to the security industry, where merger and acquisition activity continues to rise. We asked some of our Expert Panellists to share their thoughts on how both the acquired company as well as the company making the acquisition can retain the focus on their customers throughout the integration process. Here’s what they had to say.
Many oil and gas companies utilise independent systems for incident management, crisis management and security It’s no secret that the security and fire industry is home to hundreds of suppliers, each competing for a slice of a global $100+ billion market. In niche industries such as oil and gas, where IHS sizes the market for security and fire equipment and services to be more than $1 billion, increased competition has prompted some suppliers to move beyond the integrat...
Browse security news
Featured products
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download- Netherlands Security companies
- Netherlands Manufacturers
- Netherlands Distributors
- Netherlands Resellers / Dealers / Reps
- Netherlands Installers
- Netherlands Consultants
- Netherlands Systems integrators
- Netherlands Events / Training / Services
- Netherlands Manned guarding
- Netherlands Training organisations
- Netherlands Associations / regulatory bodies
- Netherlands Event organisers
- Netherlands Media
- Netherlands Services
- Netherlands Recruitment / personnel
