Data Security

The Chertoff Group achieves SAFETY Act-approval for Security Risk Management Consulting Methodology

The Chertoff Group, a global security advisory firm that provides risk management, business strategy and merchant banking advisory services, today announced that its Security Risk Management Consulting Methodology has been approved as a designated SAFETY Act “qualified anti-terrorism technology.” The Chertoff Group is one of the only professional services companies in the world to have achieved SAFETY Act designation across all industries for its proven Security Risk Management Consu...

MOBOTIX demonstrates MOVE range with integrated security partners and solutions at IFSEC 2018

MOBOTIX (Stand C310) is showcasing its latest product line and technology partnerships that reflect an emerging culture of openness within the company. MOBOTIX welcomes 6 partners onto its booth to demonstrate a range of exciting new integrated solutions.  MOBOTIX MOVE camera line MOBOTIX is demonstrating the first public appearance of its new MOBOTIX MOVE line of cameras, the first ONVIF G compliant series. It is able to deliver three H.264 streams at the same time. The MOBOTIX MOVE seri...

Dahua’s panel discussion on GDPR focused on cybersecurity and AI applications at IFSEC 2018

Dahua Technology, a solutions provider in the global video surveillance industry, held a panel discussion over GDPR and cybersecurity, joined by TÜV Rheinland, an independent testing, inspection and certification organisation, and Synopsys, a software security and quality solution provider during IFSEC International on Tuesday afternoon. With General Data Protection Regulation (GDPR) having come into force and Cybersecurity awareness continuing to grow in the EU, Dahua Technology has reali...

SecuriThings’ Two-Click Deployment enables organisations to protect IP cameras against cyber-threats

SecuriThings, provider in IoT security, unveiled a new capability that enables system integrators to rapidly deploy the SecuriThings solution onto operating IP cameras for immediate monitoring and remediation. Using common video management software (VMS), SecuriThings agents are quickly uploaded to existing video surveillance deployments, with no additional configuration necessary. IP cameras are crucial components of any physical security or safe city deployment. However, these devices are vul...

Milestone highlights benefits of high-performance networked VMS at IFSEC 2018

Milestone Systems, the global number one open platform provider of networked video management software (VMS), will once again be exhibiting at IFSEC International 2018 in London, June 19-21 – Booth C340. The theme from Milestone this year is the benefits of high performance in business video systems, enabling Milestone community customers to do more with less, driving down the total cost of solutions. Milestone will be showing the highest performing VMS server at IFSEC; the combination of...

Advantages and pitfalls of electronic locking solutions

The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an in...

Round table discussions

Are integrators and end users overwhelmed by too many choices?

Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is alwa...

What role does social media play in promoting security?

Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What...

Has consolidation shifted to the security integrator/installer market?

Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered...