Airport security

Impact of sophisticated IT technologies on the security market

Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualisation and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being l...

Genetec to exhibit market-specific security solutions at ISC West 2018

At ISC West 2018, visitors to the Genetec Inc. booth #26065 will be able to learn about the company’s new range of market-specific solutions specifically developed to address the needs of airports, cities, educational institutions, retailers, and transportation customers. “By leveraging the growing availability of valuable yet untapped sources of data, these portfolios create a host of new opportunities for organisations to find synergies between their security, operations, and busi...

Qognify to unveil machine learning based Access Control Insights solution at ISC West 2018

Qognify, a big data solutions provider for physical security and operations, announced that it will introduce ACI, an Access Control Insights solution, during ISC West 2018. Using machine learning data analytics, Qognify ACI uses smart pattern recognition to transform data from access control systems into information that can be used to improve security and operations.  Access control systems (ACS) are a central component in security management, holding a wealth of data with significant op...

Princeton Identity hires security experts to promote biometric solutions

Princeton Identity Inc., a provider of the fastest, simplest and secure biometric security systems on the market, has announced that it has expanded its sales team with three regional sales managers. Lending their collective expertise in physical security each manager will oversee a specific U.S. sales region—Devon Felise, the East, Dennis Wilkerson, the West and Chris Jahnke, the Central region. Each manager will be responsible for developing manufacturer representative sales teams, esta...

eyevis UK launches control room and video wall demonstration unit in London venue

Control room, video wall and audio-visual experts, eyevis UK, have launched a new London demonstration venue to cope with increased demand for its technology. The move will allow a wide range of sectors, including CCTV, security and traffic control to see state-of-the-art products which can help them. Growing demand for product demonstrations The venue, at Woburn Place, a short walk from Euston Station, is operated on an appointment basis and clients can provide details of the issues they fac...

Hikvision's plug-in for Milestone XProtect enhances video surveillance and incident management

Hikvision, a global IoT solutions provider with video as its core technology, has announced a new plug-in for its thermal and speed dome cameras as a result of continuing collaboration with its strategic partner, Milestone Systems. This gives operators a better situational awareness through visual verification of alarms. Hikvision’s plug-in for Milestone XProtect enables the operator to view ‘bounding boxes’ in the XProtect Smart Client and to receive alarms from a Hikvision t...

Round Table Discussions

What are the security challenges of critical infrastructure facilities?

They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than fo...

Are we talking enough about cybersecurity?

For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing...

Should marketers seek to leverage violent incidents?

When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate...