Switzerland News
Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...
Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realised through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new tech...
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual devices and controls In effect, a s...
Organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile...
The top influencing trends in the security industry at ISC West 2017 will be big data, cyber security and the Internet of Things More than a thousand companies will be showing off their latest and greatest technologies and services at this year’s ISC West in Las Vegas. With so much to look at and experience, will you be able to pinpoint the next big thing or things that will dominate the security market in 2017? A good way to predict those upcoming trends is to look at w...
The retail security market buys almost exclusively on price; however, with higher-quality camera resolution being the new norm, there has been an increase in storage requirements. Simply put, white-box solutions that may have been sufficient a few years ago can no longer support modern surveillance demands. Video surveillance solutionsThe short-term savings associated with white-box servers quickly deteriorates into high long-term costs. Making an investment in a custom-built solution will not...
Climax Technology is now offering integration with Amazon Echo, IFTTT, and voice reporting, available on Climax Home Portal Platform, to provide users with increased flexibility, control and greater peace of mind. Climax Home Portal Server Platform is an IP/GPRS-based security management solution designed to provide security professionals and home owners with new and convenient ways to manage home security and smart home automation services. Voice control with Alexa With the addition of Amazon...
Kjell & Company has become Sweden’s leading home electronics accessories retailer. As part of its ongoing improvement process, it is updating its security infrastructure with the use of state-of-the-art intruder alarm solutions from Vanderbilt International. For those in Sweden and Norway looking to purchase mobile phone and tablet accessories, electrical items for the home, cables and connectors, gadgets and other components, Kjell & Company is the place to visit. A household nam...
Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control: 1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected. 2. Longer-distance communication, which allows readers to be mount...
Through new technology, applications and analytics, video surveillance systems are helping to make hospitals a safer place Healthcare organisations face many challenges. Federal mandates associated with the Affordable Care Act (ACA), changing reimbursement models, an ageing population and competition are among the most concerning issues. Unfortunately, so are safety and security. However, video surveillance is helping. Through new technology, applications and analytics, v...
When most people think of the term artificial intelligence, science fiction films both old and new tend to come to mind. Whether it’s the military network Skynet becoming self-aware in The Terminator and wiping out the majority of mankind with nuclear weapons, or the hosts in Westworld developing consciousness and turning against their human masters, Hollywood tends to paint a grim picture of this area of technology. The reality is that artificial intelligence – or AI...
Artificial intelligence and deep learning are poised to transform how video images are used and managed. In today’s surveillance systems, video from more and more cameras leave operators at risk of drowning in data, requiring hours of manual effort to track assets or persons of interest. They need more intelligent systems. Among the new tools is use of neural networks to create video analytics systems that are trained, not programmed. In effect, the systems have the ability to “lear...
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly pl...
Changes in our industry’s technologies are reflected in the language we use. Over the years, more than one industry trend has been tied to associated buzzwords – for better or worse. As the technologies change, so does the language. We asked this week’s Expert Panel Roundtable: What are the industry’s newest “buzzwords” and what do they reflect about the changing market?
The central library is the first public building to be completed in the new Europaviertel (Europe Quarter) currently under development in Stuttgart. This cube-shaped 20,000-square-metre building is thus state-of-the-art in terms of both architecture and security technology. Library security system The Korean architect Eun Young Yi designed the building envelope to feature a double façade with glass bricks and entrances on all four sides, creating the new central library as an inspiratio...
The new scanner can quickly screen large groups of people without needing them to stop or slow down Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. The QinetiQ SPO-NX SPO-NX...
The implementation of a video surveillance system would enhance both the security of staff and products In 1998, with a passion for music the DJ Bax brothers started renting and selling DJ, PA and lighting equipment from their attic. Today the company turns over more than 100 million Euros, employees over 400 staff and stocks more than 600 brands with countless musicians, DJs and producers choosing to order their gear from Bax-shop both online and in-store, making it one of th...
A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. “For responders, the police department doesn’t have to manage cameras, but has the instant availability of a camera feed,” says Kathleen Grigg...
Successful critical thinkers are judged by results that almost always involve deliberation and intuition, logic and creativity Security and safety practitioners responding to evolving threats make decisions every day based on uncertainty, insufficient information, and too few resources for textbook solutions. Unsurprisingly, Chief Security Officers report that critical thinking, decision making, and communications skills are key characteristics for job success. But do we reall...
Open systems are great at providing freedom for end user customers. But does the term “open system” mean the same thing throughout the industry? In the bad old days before the introduction and broad acceptance of open systems, security vendors produced proprietary systems that used only their own hardware and software. This locked in a customer to a specific vendor’s product line, and if another vendor offered a better product, the only way to get it was to switch to that vendo...
Climax Technology introduces its VST-862P-F1, Pet-Immune Camera PIR Sensor, a new addition to Climax next generation family of PIR Camera Sensors leveraging the power of Climax F1 Technology. VST-862P-F1 is a pet-immune, passive infrared (PIR) motion sensor camera maintaining the peak performance of F1 models with long RF communication range, enhanced penetration and sensitivity rate, increased data quality transfer speed, and advanced dynamic speed adjustment algorithm. The VST-862P-F1 offers...
University Hospital Frankfurt is the largest public health facility in the Hesse region, delivering medical care and education through 32 clinics and 20 research institutes. Extensive new construction, expansion and renovation in multi-phase stages have been under way since 2001. The goal is to create a flagship healthcare organisation equipped for the 21st century.As part of the overhaul, hospital managers sought a new secure locking system for a recently completed large building. They turned t...
Real-time search analytics addresses one of the most important control room tasks - locating a person of interest If you have been to any of the many security industry tradeshows this year you will undoubtedly have seen and heard the phrase ‘next generation video analytics’. Is it just a catchy marketing phrase or is there more substance behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mys...
Pass∞ can be completely backward-compatible with existing computer system and could be added to all systems immediately The University of Surrey has developed an innovative ‘all in one’ password system that will allow users to use their face, eyes or fingerprints – alongside or instead of word-based systems – on their work or home computers. Pass∞ improves passwords The new technology, named Pass∞ (Pronouced PassInfinity), can be com...
Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a mode...
Cultural and hospitality venues are attractive targets for terrorists due to their public accessibility Over the past 40 years there have been numerous attacks carried out against cultural and hospitality venues in the furtherance of religious, ideological, criminal or political beliefs. By default, cultural and hospitality venues are attractive targets for terrorists due to their public accessibility, the volumes of visitors and guests or because of what the venue represents;...
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large,...
Dahua Technology, a world-leading manufacturer and supplier of video surveillance products headquartered in Hangzhou, China has delivered an IP-based security solution for SANASA Development Bank in Sri Lanka. Founded in 1997, SANASA Development Bank (SDB) is a unique financial institution, committed to rising the standard of living for low income Sri Lankan families with its range of microfinance activities. SDB is a national cooperative bank, with over 82 branches covering all of Sri Lanka. A...
Customers are increasingly requesting both mechanical and electronic services for their doors In most buildings, security is a hybrid solution of both mechanical and electronic security products. Locksmiths take care of the mechanical door hardware and the integrators focus on the electronic security technology. However, for consumers, this traditional division of labour means they must deal with two different companies for the same door - one to design, install and service a...
Cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management Facility managers and security operations staff are often bombarded with calls from multiple tenants, across several sites — each with unique needs — but traditionally they had no insight or control on the spot. Now, cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management — enablin...
Browse security news
Featured products
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
One system, one card
DownloadEnhancing physical access control using a self-service model
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadHow to implement a physical security strategy with privacy in mind
Download- Switzerland Security companies
- Switzerland Manufacturers
- Switzerland Distributors
- Switzerland Resellers / Dealers / Reps
- Switzerland Installers
- Switzerland Consultants
- Switzerland Systems integrators
- Switzerland Events / Training / Services
- Switzerland Manned guarding
- Switzerland Training organisations
- Switzerland Associations / regulatory bodies
- Switzerland Event organisers
- Switzerland Media
- Switzerland Recruitment / personnel
- Switzerland Services
