Data Security - News
A new NW Security study of 103 medium and large-sized firms across England with existing CCTV systems, found that where an external security systems installer, integrator, or security management company is involved, some key video analytics has been much more widely adopted and deployed. Automatic Number Plate Recognition (ANPR) Automatic Number Plate Recognition (ANPR) is already deployed in nearly two-thirds (62%) of existing CCTV systems across the country where security systems management...
For business owners, their business is more than just their livelihood, it's the culmination of years spent dreaming and planning. With that in mind, it only makes sense to protect the business with the smartest security system on the market. A report by security market analysts, Omdia has highlighted the potential growth of an integrated physical security as a service (PsaaS) system. Omdia forecasts that the global PsaaS market was estimated to be worth US$ 1.5 billion in 2020. The market for...
Staff is the most important and expensive resource for most businesses. Business owners are aware that they should manage their workforce more effectively to get the most out of their investment as the price increases of labor. Today, sophisticated time and attendance solutions can manage everything you need remotely. The cloud-based solution can secure data and provide advanced control and access to rota planning and time management. In this article, Anviz talks about 5 reasons why a user shou...
Business is more than just a livelihood–it's the culmination of years spent dreaming and planning. With that in mind, it only makes sense to protect the business with the smartest security system on the market. Reported by security market analysts from Omdia have highlighted the potential growth of integrated physical security as a service (PsaaS) system. Omdia forecasts that the world PsaaS market was estimated to be worth $1.5 billion in 2020. The market for integrated PSaaS solutions w...
Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., a provider of cybersecurity solutions globally, has published its latest Global Threat Index for July 2021. Researchers report that while Trickbot is still the most prevalent malware, Snake Keylogger, which was first detected in November 2020, has surged into second place following an intense phishing campaign. Keylogger and credential stealer Snake Keylogger is a modular .NET keylogger and...
Ontic (Ontic Technologies), the protective intelligence software innovator, which is digitally transforming how companies actively identify, investigate, assess, watch and manage physical security threats, has announced the successful completion of its System and Organizational Controls (SOC) 2 Type 2 examination and HIPAA security compliance assessment. Commitment towards data security Ontic is committed to conducting business in a fair, lawful, and transparent manner, while protecting data p...
Dallmeier electronic, one of the pioneering manufacturers of video information technology, presents an extensive portfolio of different interfaces for integrating third-party systems in its HEMISPHERE® software platform. The very close integration and a variety of data exchange and control capabilities enable users to make the most of optimal information flows and efficient work processes. Not all integrations are alike To accessing third-party systems, many video management systems a...
Group337, a team of experts focused on activating the companies, brands, and people in the security industry through insights, intuition, and ideas, has announced the completion of a new industry report titled, ‘Securing the Supply Chain’. ‘Securing the Supply Chain’ report The ‘Securing the Supply Chain’ industry report, completed in collaboration with BoxLock, examines the Total Addressable Market (TAM) for access control technology within the supply chain...
APAC CIO Outlook, the publication connecting the IT Enterprise Community in the Asia Pacific, has selected Xerafy as the ‘25 Most Promising Data Centre Solution Providers’ for its 2016 edition on data centre solutions. Data centre security and efficiency are a top priority for IT organisations. Keeping an accurate inventory of data centre assets and their service history is a key part of corporate IT strategy. RFID helps companies manage their data centre assets better, and Xerafy i...
Data centres have utilised barcodes and paper inventory to keep track of IT Assets. The combination of physical labour and human error causes excessive inventory time and widens the possibility of inventory omissions with a productivity cost and monetary loss. At the end of each fiscal quarter, financial institutions, large scale manufacturers, and content delivery network providers need to account for every server that is currently in service, has been moved, replaced, needs replacement, and a...
ASSA ABLOY acquires Capitol Door Service, a pedestrian door distributor, and service company in California, Nevada, and Arizona. "I am very pleased to welcome Capitol Door Service into the ASSA ABLOY Group. I welcome this complementary addition, specialising in entrance automation, to our business,” says Nico Delvaux, President, and CEO of ASSA ABLOY. Strong market position “Capitol Door Service with its strong market position will further strengthen our geographic coverage in Wes...
Abnormal Security, the provider of the cloud-native email security platform that leverages behavioural data science to stop modern email attacks, announces the appointment of Anita Grantham as Chief People Officer. Grantham leads all aspects of Abnormal’s talent and culture strategy, including employee experience, recruiting, rewards, retention, and career development. Abnormal protects 100% of the employees at 5% of the Fortune 500. Grantham enables Abnormal to continue expanding worldwi...
Genetec, Milestone Systems and Motorola Solutions have grown to become the ‘Big 3’ suppliers of video surveillance software, video analytics and managed services. According to a new report from Novaira Insights, the global market for video surveillance software and managed services was worth US$ 2.2 billion in 2020, with around 69% of this outside China. However, the supply base outside China is very different to that of the Chinese domestic market. Global video surveillance market...
TDS (Time Data Security Ltd.), a globally renowned provider of smart workplace products, including visitor management, life safety and access control software solutions, has announced the release of V-Receptionist, a virtual-receptionist solution for more safely and efficiently managing visitors, to multiple locations across a super enterprise. TDS V-Receptionist TDS V-Receptionist enhances the visitor experience, reduces administrative burden and costs, and future proofs and standardises an o...
Videonetics, the provider of AI & DL powered Unified Video Computing Platform (UVCP™) announces the integration of its Intelligent VMS 3.0 with COM-SUR, the CCTV video footage auditing, smart backup, and standardised intelligent incident reporting software. The technology integration empowers users to carry out auditing and review of CCTV video feeds in real-time, creating exceptional intelligent incident reports for quick escalation and resolution of an incident with a unified, futur...
CloudSense, provider of the Configure, Price, Quote (CPQ) engine, empowers leading brands to launch, sell and manage the entire B2B customer lifecycle for sophisticated products, subscriptions, and services. With the latest release (R34) of its category-defining SaaS platform, CloudSense has taken another step towards helping Communications, Media, and Utility companies to increase the speed and efficiency of serving their customers. Highlights of the new release Bulk Subscriber Management,...
Ava Security, the globally renowned pioneer in unified security solutions, announced the launch of its new Cloud Connector A750 product, to make customers' existing cameras smart with uniquely scalable real-time AI (Artificial Intelligence), adding cloud-based management and analytics to existing systems and devices. Ava Cloud Connector A750 The new A750 is the fifth model in the Cloud Connector range, with Ava Security expanding its portfolio, so as to meet its customers’ growing securi...
Hikvision’s HikCentral Professional platform provides a centralised software solution to remotely view and manage all facets of an organisation’s integrated physical security systems. The advanced platform delivers vast integration and management capabilities for video surveillance, access control, video intercom and various specialty solutions, such as under vehicle surveillance, along with a host of embedded intelligent analytics and system analysis tools. HikCentral Professional...
Crossword Cybersecurity Plc (Crossword), the technology commercialisation company that is focused on cyber security and risk management, is pleased to announce, subsequent to its oversubscribed 5.0 million pounds fundraising, the acquisition of the whole of the share capital of Stega UK Limited (Stega), the threat intelligence and monitoring company, referred to in Crossword’s announcement of 28 July 2021, has completed the transaction. Stega acquisition The Stega acquisition offers Cros...
Security and IT teams have recently been facing a tidal wave of highly publicised breaches stemming from unpatched vulnerabilities, such as the attacks originating from a zero-day Windows printer spooler vulnerability dubbed ‘PrintNightmare’ (CVE-2021-34527). These software vulnerabilities are a major threat vector that security teams need to address. They are excited to announce the launch of the vulnerability management module for VMware Carbon Black Cloud Endpoint. By adding vuln...
Fast-paced innovation is the order of the day. This is especially true for businesses operating in the telecom industry – an industry known for its disruptive, transformative nature. Frequently facing issues in optimising networks and upgrading technology, telecom companies, or telcos need to continually reinvent themselves to stay ahead of the competition and provide a better experience to end-users. State-of-the-art technology Enabling business transformation for both telco...
Bell Canada and Google Cloud today announced a strategic partnership to power Bell’s company-wide digital transformation, enhance its network and IT infrastructure, and enable a more sustainable future. This new, multi-year partnership will combine Bell’s 5G network leadership with Google’s expertise in multi-cloud, data analytics, and artificial intelligence (AI), to deliver next-generation experiences for Bell customers across Canada. Initiatives to increase efficienc...
Security and Safety Things GmbH has announced that it now offers 100 unique video analytic applications in its Application Store, further strengthening its position as the largest open platform application store for smart security cameras in the world. The Security & Safety Things’ (S&ST) Application Store now features 100 ready-to-use apps that offer video analytic solutions for retail, manufacturing and logistics, commercial office space, parking and stadium environments, with m...
SALTO Systems, a manufacturer of electronic access control solutions, has appointed Scott Ziebell as Regional Sales Manager for the Plain States Region. Based in Kansas, Ziebell oversees sales activity and territory growth in Kansas, Missouri, Nebraska, Iowa, South Dakota, North Dakota, Minnesota, and Western Wisconsin. He reports to SALTO Senior Regional Sales Manager Joe Buist. Provide excellent support “Scott has an impressive history in sales and SALTO is thrilled to have him managi...
TRENDnet Inc. (TRENDnet), a globally renowned company in reliable SMB and consumer networking, and surveillance solutions, has announced the introduction of TRENDnet Hive, an advanced network cloud manager that is designed to save users on both - cost and time, by simplifying and centralising network management and monitoring. Easy remote access Hassle-free remote access and management is made possible with TRENDnet’s reliable cloud service (and free mobile companion app, which is...
Vectra AI, a pioneer in threat detection and response released the findings of the PaaS & IaaS Security Survey Report. The report compiled the answers of 317 IT executives all using AWS, 70% coming from an organisation of 1,000+ employees. The findings show a rapid expansion and reliance on AWS services while simultaneously showcasing security blind spots within many organisations. Findings of the survey As digital transformation efforts continue, the survey found that AWS is becomin...
Figures show one in ten employees will have their security username or password compromised by cybercriminals. For people operating access and security systems, preventing this kind of cyber breach is even more important. Tim Northwood, director of Inner Range, discusses how Two Factor Authentication (2FA) provides an extra layer of cyber security for customers. Benefits of 2FA Two Factor Authentication (2FA), which is offered by Inner Range’s intelligent integrated access and security...
Vector Flow, Inc., the innovator of AI and data-driven physical security solutions, announces that their Security Operations Centre (SOC) Automation Suite is proven to reduce false and nuisance alarms by over 80% in real-world applications. This enormous reduction in false alarms not only dramatically improves SOC efficiency and productivity, it lets SOC operators focus on real alarms and provide improved services. Juniper Networks, a pioneer in networking solutions company, deployed the SOC Au...
In May, the Whitehouse issued an Executive Order on improving the Nation’s cybersecurity, which laid the groundwork for the nation’s response to the latest security breaches and sought to address the persistent and increasingly sophisticated malicious cyber campaigns threatening the public sector, the private sector, and ultimately the American people. The order is aimed at improving the Government’s efforts to identify, deter, protect against, detect, and respond to these act...
ONVIF, the global standardisation initiative for IP-based physical security products, has announced that it will end its support for Profile Q early next year since it contains certain specifications that are no longer consistent with current cyber security best practices. Profile Q Profile Q was developed to provide an easy setup of a conformant device on an IP network. It requires a Profile Q conformant device to allow anonymous access to all ONVIF commands, during the setup process in the f...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download