Sweden News
President Trump has recently proposed a series of tariffs that could disrupt global trade and impact the global physical security market, among many others. He first proposed tariffs targeting aluminium and steel imports; in effect, the proposal would place a 25 percent tax on steel and a 10 percent tax on aluminium entering the United States. Rising prices, rising tariffs The resulting higher prices of imported aluminium and steel could raise the costs of a range of goods manufactured in the...
Despite the huge amount of video data collected, statistics show that only 10 percent of data is ever used and most loses its value within seconds of being generated. Why use such a limited amount of data? Many security organisations are focused on delivering the right information in case of an emergency or providing the correct evidence after a criminal act. Yet the fact is, a new video security system can be a large investment. Together with the service, maintenance and management costs assoc...
The challenge for a National Retail Banking Franchise was a problem with intruders cutting a hole in the roof during work hours when the security system deactivated. The intruders would come back the next morning when the security systems were deactivated from the night time security schedule to gain entrance to the facility and steal assets. With hundreds of facilities across the United States, this was a real challenge to overcome because each facility had varying security systems. The buildi...
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used fr...
Until recently, the convenience and security of “smart” electronic locks have been exclusively enjoyed by owners of homes, with renters largely being left out in the cold. Locked out by the temporary nature of their living arrangement, and not allowed to make structural changes to their temporary abodes, these renters have been unable to enjoy the many benefits of these connected devices. But today, smart lock capabilities are becoming available to renters and rental property owners...
At the Digital Signage Expo in Las Vegas, Userful, a provider of video wall software, has launched Userful Cloud, a powerful solution giving customers complete centralised remote control and automation of their video walls. One can now manage a multi-location deployment as a single system. Userful’s new cloud management allows remote operators to take control of the keyboard and mouse of that video wall just using their browser. They can also centrally manage content, schedule preset chan...
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many...
The year 2017 saw some of the worst natural disasters in North America, with Hurricanes Harvey and Irma wreaking havoc on Houston, Texas, and the Caribbean with force of which we haven’t seen before. While many people chose to evacuate these areas, many were left to deal with the devastation and first responders had the difficult job of assessing the damage, rescuing trapped victims and delivering food and supplies. AI-enabled drones and robotics to assess damage In addition, more than 1...
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyse VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications...
Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are incre...
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this wee...
Video surveillance as a service (VSaaS) is not just for commercial organisations. Federal, state and local governments can also realise benefits from the technology—and use it to deliver an integrated video surveillance system that addresses some of their unique security needs. Video Surveillance as a Service (VSaaS) What is VSaaS? Simply stated, it’s a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending...
Throughout the UK there are many examples of smart city transformation, with key industries including transport, energy, water and waste becoming increasingly ‘smart’. A smart city is a one that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and resident welfare. Smart access is an important step forward in providing technologically advanced security manag...
Advance Security Group believes Harriet, New Zealand’s first security robot, will change the security industry as the first employee, who never needs a holiday, doesn’t need sick days and can work 24 hours a day. Security robot - Harriet The security robot, Harriet is capable of seeing obstacles, recognising licence plates, uniforms and faces. Mike Marr of Advance Security Group, said “It won’t mean people lose their jobs but rather, offer up new opportunities. What it...
Most cities have at very least a plan and in most cases an existing program to make themselves safe cities. Increasingly, cities around the world are transitioning to become smart cities: urban areas where security solutions work in unison with other systems, extending the benefits of technology beyond security and into other city operations. Whilst this transformation has yet to become a widespread the next crucial transition—from smart city to cognitive city—is already appearing...
The large crowds that regularly flock to downtown Houston, Texas, known as GreenStreet, call for heightened security measures. However, the 570,000-square-foot mixed-use centre needed to balance a high level of security while maintaining an open and inviting environment that accommodates numerous businesses, delivery drivers, service providers and others who need open access to the property. With an eye towards improving both security and efficiency, the property’s owners decided it...
SMP Robotics announces that jointly with its US-Canada Master distributor company Robotics Assistance Device (RAD), carried out an deployment of autonomous security robot S5.1 on the territory of the logistics centre in Nevada. The security robot S5.1 patrols the route along with the warehouses and parking lot with cargo trailers. The robot drives daily from 9 pm to 6 am, its task is to stop at specified points along the route and observe what is happening around. The length of the patrolled ro...
With a history dating back to the 1850s, the Sioux City Public Museum has evolved from its original focus on natural science to a broader emphasis on preserving the area’s heritage, offering a variety of educational programmes, events, and historical exhibitions valued at more than $2 million. Having outgrown its former location in a prominent Victorian-era mansion, the museum moved to a new downtown site in April 2011—a modern, open-concept building that has become known as one of t...
A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. What is jackpotting? ATM j...
In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organisations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global ente...
The manufacturers behind today’s security technologies are a varied bunch. There are large manufacturers with deep pockets and plenty of resources. And there are smaller manufacturers who are nimble, can react faster to changing market conditions and to whom each customer represents a hard-fought win. There are also plenty of manufacturers in the middle ground. But what impact does the size of a company have on the quality of its products? We took the question to this week’s Expert P...
While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilised the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones for effective surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate...
PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisat...
More than 85% of transport networks across Western Europe are planning to install IP cameras in the near future. That’s according to a recent survey commissioned by Axis Communications, the market leader in network video and audio technology, in partnership with the global public transport organisation - The Union Internationale des Transports Publics (UITP). Globally, the transport industry has led the way in using network video for both security and commercial applications. IP video sur...
Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world." Science fiction becomes reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie Th...
The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products. With the physical...
Organisations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organisations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth in cyber-attacks Additionally, cyber-threats have taken a...
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our indus...
Honeywell has announced the release of its smart building technology, Command and Control Suite Release 200 (CCS R200), which connects building personnel with data analytics to help drive operational improvements and efficiencies. CCS R200 builds on the original Command and Control Suite by offering more user interfaces to bring building performance data to key personnel, when and where they need it—from building operators and managers to security incident response teams—helping to...
BCDVideo, producer of purpose-built IP video storage solutions, announced the signing of an Original Equipment Manufacturing (OEM) agreement with Dell EMC OEM Solutions. The collaboration enhances BCDVideo’s product portfolio with the inclusion of end-to-end solutions featuring Dell EMC Server, Storage and Networking platforms, along with Dell commercial client products. Dell EMC has demonstrated a strong commitment to providing security integrators unparalleled access to a wide range of...
Browse security news
- By event
- Milipol Asia-Pacific 2024
- ISC West 2024
- GISEC Global 2024
- India Cyber Revolution Summit 2024
- The Fire Safety Event 2024
- The Security Event 2024
- The Security Event Birmingham 2024
- Disasters Expo Europe 2024
- Angola Cyber Revolution Summit 2024
- World CyberCon META 2024
- 3rd Annual National Congress on Counter UAS Technology
- View more
Featured products
Related videos
Siemens Sony partnership accelerates digital transformation through immersive engineering
Top-of-the-line intercom systems by DNAKE
IDIS launches efficient AI-powered security camera range
Precision and intelligence: LiDAR's role in modern security ecosystems
DownloadAre you ready for an on-site emergency?
DownloadIntegrating IT & physical security teams
DownloadHikvision NVR 5.0 and full line hardware storage solution
DownloadFacial recognition
Download- Sweden Security companies
- Sweden Manufacturers
- Sweden Distributors
- Sweden Resellers / Dealers / Reps
- Sweden Installers
- Sweden Consultants
- Sweden Systems integrators
- Sweden Events / Training / Services
- Sweden Manned guarding
- Sweden Training organisations
- Sweden Associations / regulatory bodies
- Sweden Event organisers
- Sweden Media
- Sweden Recruitment / personnel
- Sweden Services