United Arab Emirates News
Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...
The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...
Recycling ATMs, which can reuse deposited cash to supply withdrawals, are another way in which ATM-associated crime can be reduced With some 3 million automated teller machines (ATMs) around the world, they are bound to be seen as attractive targets by some criminals. Banks need to ensure customers do not fall prey to skimming and other malicious attacks from criminals, by having an effective ATM security in place. The advent of contactless technology has eliminated the need...
Millions of tons of cargo. Billions of dollars in goods. The activity of a small city with miles of perimeter fencing, uneven infrastructure, blind spots, and ever-changing weather conditions. Port security is no small task, yet increasingly, security operators are asked to assume more responsibilities with static, if not shrinking, budgets. As drivers of a global economy, the demands placed on port security continue to grow and with them, the challenges and complexity increase exponentially. L...
Healthcare organisations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organisations? What technologies are being embraced to increase security?
The city of the future needs smart, secure and resilient infrastructure solutions According to the United Nations, the world population will reach almost 8.5 billion by 2030. As populations grow, so do cities. Even now more than half of the world’s inhabitants live in urban areas, and more than one million move from the country to the city every week. This trend places enormous demands on people and infrastructures. Because only when communication, energy, safety, s...
Security cameras provide live, real-time videoto assist security personnel in spottingpotential or real problems Efficient security systems for parking structures deter criminal activities and anti-social elements from destroying property. Over the years, security companies have responded to this need and developed a range of security systems for parking facilities, such as audio intercoms, access cards and video analytic solutions. Systems integrators who want to add new ser...
There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The show is huge by Western standards – someone told me it's five times the size of ISC West in Las Vegas. But even more than the size of the show, it was the crowd that made an impression on this first-time visitor. Huge numbers of attendees and exhibitors Think of the mass of humanity you might exp...
Integration of new technologies in video surveillance will be under spotlight at the event The ongoing shift in demand from analogue to Internet protocol (IP) cameras in the Middle East is fuelling the region’s fast-growing physical security market, as global manufacturers prepare to launch their latest integrated security technologies at Intersec 2016. Growing at double the global rate, the Middle East’s physical security market – which was valued at $3 bil...
(Click to see larger image) The ASIS Foundation & the University of Phoenix College of Security and Justice's Enterprise Security Competency model Are you competent in your security job or profession? How do you know? According to research carried out by the ASIS Foundation, security has begun to evolve beyond guarding doors, checking IDs and screening briefcases and purses. Today, something called Enterprise Security Risk Management (ESRM) is subsuming the...
Major art heists often feature audacity that defeats even the most thorough security protocols Museum security, like art, is ever-changing. Traditional security practices like manned guarding alone are not sufficient to keep thieves at bay. Modern security technologies such as video surveillance, motions detectors, intruder alarms and other physical security devices also play an equally important role in securing museums and its art work. Regrettably, having all the...
EMDI will showcase latest solutions in disaster monitoring and relief, and emergency engineering rescue Governments in the Middle East and North Africa (MENA) region are ramping up efforts to enhance emergency response and disaster prevention services, as the rise in natural disasters in the region outpaces the global average and more sophisticated solutions become available on the market. In the past three decades, natural disasters have affected more than 40 million people...
Conley’s security officers must study for and acquire a Certified Protection Officer (CPO) certification After nearly 40 years of a sustained and concentrated effort to transition the security industry to the security profession, Tom Conley is still beating his “security profession drum” at full volume. He still hopes that the security industry-to-profession movement will one day be a reality. He sees himself as an eternal optimist embarking on a feat of...
The IP surveillance market is taking anunusually long time to reach maturity, partiallydue to lack of industry standards Video surveillance has been a growth industry ever since the release of the first IP security camera in the mid-1990s. Generally, high-growth industries are immature, meaning they have not yet reached a state of equilibrium. This is particularly true in the IP video surveillance market where many new companies enter the market takin...
Historically, biometrics applications have often been thought of as specialised, high-tech and used predominantly in governmental markets. Everyday systems have tended toward card readers and keypads, while biometrics have been associated with high-security applications. Today, however, biometrics are much more mainstream. Fingerprint readers, in particular, are as near as our smart phones. Many other biometric applications are also becoming more common in a wide variety of markets. We asked thi...
Derren Lu, CEO of Synology Inc and Scott Lee,Senior Manager of Software DevelopmentGroup for Surveillance Synology – a company founded by two former Microsoft employees – began as a storage solution provider and grew to include surveillance in its product offerings. While many security companies in Taiwan are voicing their concerns over falling sales, Synology is seeing its products grabbing shares in the security market and the sales figures are continuing to grow...
Home security devices are evolving and expanding their offered features, providing new opportunities for the security industry Home security isn’t just home security anymore. These days cameras, door and window alarms are just pieces of the web–enabled “smart home.” And, the home is getting smarter, as service providers begin to merge home security systems with home automation. The added value of these additional features is now drawing more potential c...
Discussions in our industry about cyber-threats to physical security systems, including IP video, often centre around hypotheticals. How might a hacker gain access to a video camera feed? How might he or she enter the larger enterprise system through a software vulnerability related to physical security? We all know assessing threats often involves considering the hypothetical, of course, but we should also seek to learn from actual events in the past. In relation to vulnerabilities of video su...
The vision of a utopian urban future restsheavily on the success of Open Dataand a Cloud Computing paradigm Confronting urban challenges using technology requires the private sector to work in tandem with governments to enable "smart cities." In fact, one report predicts the number of safe cities worldwide will quadruple in the next decade. It’s a topic that is increasingly top-of-mind. For example, the Safe Cities Asia 2015 conference in Singapore in May brought to...
Problems caused by physical systems in terms of cyber-attack are quite extensive, damaging systems and assets Security experts of various disciplines agree that physical systems are increasingly being leveraged in attacks on organisational networks and supply chains. Many manufacturers maintain that security (including that of security systems) is the responsibility of the end user, which would be fine if they were only expected to maintain security and not create th...
The security industry’s continued migration to networked IP-based systems ensures that PoE will be integral in their design and installation Power over Ethernet (PoE) has without question become the de facto choice of security installers for delivering power to security and access control devices. This should come as no surprise given PoE’s ability to reduce labour and installation costs by delivering power and data over a single cable, thereby increasing overall t...
People using computers to surf the Internet is "so 20th century". Today, the big trend involves machines using the Internet to communicate, exchange and analyse data in what has widely become known of as the Internet of Things. Various security devices are among the IoT components, and how devices connect effectively using the Internet – even devices not related to security – will constitute a large part of the future business of security integrators and installers, whether in the re...
NVRs make it easy to benefit from HD solutions and integrations to access control, alarm systems, intercoms and other technologies Developments in the IP video camera market have a direct impact on the other components in a system. With the emergence of higher definition cameras – whether 4K cameras or 8K or even higher – the market now needs back-end devices that can perform the decoding work. Also, more intelligence is needed, including smart functions such as pe...
7K cameras are best suited for large openspaces such as stadiums and city centres,capturing the finest details in their footage With several manufacturers now offering 4K CCTV cameras, Avigilon, based in Vancouver, British Columbia, raised the bar in April 2015 with the launch of their 7K HD Pro surveillance solution. The 30-megapixel camera is the latest addition to the company’s Professional Series, an innovative model Avigilon believes will drive competition in the se...
With more physical security systems using Internet protocol and being connected to the enterprise IT network, it’s not surprising that the corporate IT department is more involved than ever in the buying decision – for better or worse. Does the IT department bring valuable resources to the table, or are they an impediment to the sales and integration process? It’s not a new issue, but an increasingly important one as the industry changes. We asked this week’s Expert Panel...
Automation is another hallmark of PIAM solutions, which can perform a wide variety of processes that are prone to error if performed manually Security departments in organisations face a number of threats from both internal and external sources, thus forcing security personnel to remain vigilant and aware of the growing number and scope of new and emerging risks. The most powerful weapon in this seemingly endless battle is data. Every organisation has it – probably more...
NVRs come preinstalled with latest software releases to minimise setup time Looking for a perfect marriage of hardware and software for a video management system application? A preconfigured network video recorder (NVR) appliance may fit the bill. Consider these advantages of going the NVR appliance route, as suggested by vendor companies contacted by SourceSecurity.com. 1. Greater freedom of deployment NVRs provide more application flexibility – because the recorders...
Organised by IXG, the conference put across variety of issues facing general aviation including security, aviation legislation, etc. The Aviation Security Conference 2015 was held at the Hilton Dubai Jumeirah Resort, UAE on 16th - 17th September 2015, featuring the leading stakeholders and thought leaders of global aviation industry. The conference organised by Information Exchange Group (IXG) put across a variety of issues facing general aviation including airport and airline...
Hikvision USA’s ascension from virtual obscurity to the upper tier of manufacturers in the U.S. market is being built on the Chinese company’s huge manufacturing capacity – they turn out 50,000 to 60,000 surveillance cameras every day from factories in China. The large capacity enables Hikvision to achieve economies of scale. In effect, they can make high quality video surveillance products at a lower price, a capability that will continue to serve them well as they begin compe...
The open and exposed nature of rail yards exposes railway assets to tremendous risk The importance of rail transportation in driving the U.S. economy cannot be overstated. In recognition of this, America’s railroads are investing in the infrastructure and technology necessary to improve security for the tracks, bridges, tunnels and other vital components that make up this critical transportation network. The unique security requirements of these assets present a nu...
Browse security news
Featured products
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download- UAE Security companies
- UAE Manufacturers
- UAE Distributors
- UAE Resellers / Dealers / Reps
- UAE Installers
- UAE Consultants
- UAE Systems integrators
- UAE Events / Training / Services
- UAE Manned guarding
- UAE Training organisations
- UAE Associations / regulatory bodies
- UAE Event organisers
- UAE Media
- UAE Services
- UAE Recruitment / personnel
