Switzerland News
ThruVis is a highly sensitive camera that is mobile, discreet, and rapidly deployable G4S, a security company, has entered into a strategic partnership with AIM-listed technology specialist Digital Barriers, which will see G4S deploy the company’s ThruVis solution at major UK events to protect against the threat from concealed weapons and explosives. G4S will use ThruVis to provide enhanced security at public and private events to detect potential threats concealed unde...
Features such as height-adjustable tabletops and adjustable monitor options can fine-tune the workstation The security market is one of the most demanding AV applications. Each environment in the security field presents its own unique set of challenges and requirements that revolve around advanced AV systems and the operators that utilise them. For monitoring and control room operators, that means continuous vigilance with little to no downtime away from their stations. Becau...
If you want to cultivate new ideas among your employees, it is important to let them know that they are allowed to challenge the status quo The Americans asked for horses – Henry Ford gave them cars. In the beginning of the 20th century, he disrupted the transportation industry. He created a new market outmatching established leading companies, products and alliances. And he got the idea himself. Many of us want to disrupt our industries with new innovations that...
The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types of cables In general, there are four major types of cable. First is coaxial cab...
When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate...
There was another big trade show last week – the four-day Security Essen event in Germany. I didn’t attend, but several of my SourceSecurity.com colleagues report it was a busy show from start to finish, with the halls devoted to video/CCTV and access control dominating the show. The other halls were quieter, with smaller stands. Hot topics included big data, machine learning, mobile credentials, storage and an emphasis on solutions (rather than products). The exhibit hall was...
Send for Help provides personal alarms and mobile phone applications linked to an alarm receiving centre The Send for Help Group – the world’s largest lone worker protection provider, are pleased to announce record growth and profits for the financial year 2015/16. The figures, published in Send for Help Limited’s Annual Report found that for the year ending 31st March 2016, turnover was up 81% year-on-year and operating profits had also increased by 42% wit...
Lynch to serve as TE's CEO until the transition to Curtin, after which he will continue as Executive Chairman of the Board TE Connectivity announced that its Board of Directors has appointed Terrence Curtin to succeed Tom Lynch as the company's chief executive officer, effective March 9, 2017. Curtin was previously elected to TE Connectivity's (TE) Board of Directors at the company's annual general meeting held on March 2, 2016 and is currently TE's president. Lynch has serve...
The critical area of security has been addressed throughout the 17 specifications of Release 2 The full potential of the Internet of Things (IoT) advanced significantly as oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT, published a new landmark set of specifications, Release 2.Based on contributions from more than 200 member companies, Release 2 builds on oneM2M’s initial set of official specifications, which enable basic...
Components used in the new installation have been selected to allow easy and inexpensive expansion in the future Tasked with implementing a major upgrade to its client's security systems at the London HQ of one of the UK's leading information storage and management companies, Facilities Management company, FMS Limited, approached security expert Raysil for assistance. After evaluating the site's existing systems and finding them to be unsuitable for updating, Raysil recommende...
Partnership signifies the commitment Gallagher has to the Institute and security industry as a whole Gallagher Security (Europe) has become the Security Institute’s first corporate partner. Officially presented at the Security Institute's annual conference, held at the Amba Hotel, Marble Arch, London on 22nd September, 2016, the partnership signifies the commitment Gallagher has to the Institute and the security industry as a whole.Promoting standards of integrityOn rece...
Part 11 of our Security in Healthcare series The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system improvements at healthcare facilities. An independent, not-for-profit organisation, The Joint Commission accredits and certifies nearly 21...
The e-government and healthcare identification market is very much driven by individual projects Shipments of electronic government (e-government) credentials—including e-passports, e-identity cards, e-health cards and e-driving licenses, and others—are projected to reach 1 billion units in 2020, nearly doubling 2015 volume.Project-driven marketThe e-government and healthcare identification market is very much driven by individual projects. Whether these projects c...
The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide soluti...
Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this...
Better-performing video systems provide better security. Today’s end users demand systems with optimum performance, providing smooth video streams, higher resolutions, efficient storage, better analysis and quick access to stored images. Here are several technologies driving greater video surveillance capabilities: Innovations in image processing to boost system performance Higher resolutions are a challenge for video management systems, but new tools are mee...
48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...
The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...
The packages have been strictly designed based on the plug & play concept and are less complex than the large-scale Unlimited Enterprise Solution package Small Enterprise Solutions and Medium Enterprise Solutions – with these two packages, the Swiss provider of professional biometric systems (TBS) introduces two powerful and versatile solutions for small and medium-sized enterprises. The two new packages extend TBS’s proven biometric access and time recording...
For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable intelligence. Today, its real-world specifications provide an in-depth analysis of video and integrated physical security data, deepening the gathering of intelligence and lessening risk at the protected premises. The entire realm of situational awareness continues to transition as intelligence is gleaned from new points, with this trend only...
CSR applies to the security industry in many different ways and can be practised by small or large businesses What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different companies – Axis Communications and FGH Security – each put CSR at the heart of their operations. Corporate Social Responsibility means different things to different people, and is often used as a catchall for one...
The Design Centre will provide support for developing networking infrastructure solutions Vigitron, a provider of networking infrastructure solutions for security applications and Barox Kommunikation, a company for transmission technology, announce the establishment of a Design Centre service operating under both companies collaborative group, Vigitron Central Europe. Support for developing networking infrastructure The Design Centre will provide support for developing netwo...
Although Access Control Systems have been in the Fermax catalogue for many years, the company has just made an important jump with a new range of solutions FERMAX fully explores Access Control Systems with a new catalogue that includes a wide range of solutions. With new products for small, medium or large facilities, professionals can purchase modules designed to control a single entrance or access control able to manage every detail in a hospital, analogue technologies or th...
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio® to extend its installed Gallagher Command Centre access control system. Energy saving wireless solutions The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 ensuite rooms separated into flats for between 8 and 13 postgraduates—the...
A perceived benefit of buying direct is to save money as opposed to paying a middleman Security companies have multiple options to purchase security products today – online, manufacturer direct, or from the vast array of security products and electrical supply networks dotting the landscape. Because there are numerous options, and costs may not vary drastically, the final decision on where to purchase ultimately boils down to service and additional support these channels...
MACE supports Bluetooth, NFC, QR-codes to identify people with virtual credentials, stored in a MACE app Just a few months ago, Nedap Identification Systems launched MACE: the mobile access control platform. This platform enables the use of smartphones to identify people based on Bluetooth, NFC or QR-codes. Nedap’s MACE will now make its Security Essen debut. Virtual credentials for access control With the introduction of this platform, Nedap responds to the global shi...
Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...
IoT-based platforms, software analytics, and personal protection devices feature in the Accolades winners ASIS International, an organisation for security professionals worldwide, has selected its ASIS 2016 Accolades Award winners. ASIS Accolades Award recognises the security industry's most innovative new products, services, and/or solutions featured at the ASIS International Annual Seminar and Exhibits (ASIS 2016), taking place Sept 12-15 at the Orange County...
Along with access control, the NanoQuest offers a secure method of controlling devices such as intruder alarm panels, lighting and heating Nortech’s NanoQuest compact standalone proximity card reader and access controller now includes an RS232 data output to enable third party equipment to monitor the use of cards and fobs presented to the reader. The NanoQuest is able to manage up to 500 users and autonomously control access to secure areas or restrict the use of equip...
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/...
Browse security news
Featured products
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
One system, one card
DownloadEnhancing physical access control using a self-service model
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadHow to implement a physical security strategy with privacy in mind
Download- Switzerland Security companies
- Switzerland Manufacturers
- Switzerland Distributors
- Switzerland Resellers / Dealers / Reps
- Switzerland Installers
- Switzerland Consultants
- Switzerland Systems integrators
- Switzerland Events / Training / Services
- Switzerland Manned guarding
- Switzerland Training organisations
- Switzerland Associations / regulatory bodies
- Switzerland Event organisers
- Switzerland Media
- Switzerland Recruitment / personnel
- Switzerland Services
