Network monitoring

The five questions bank security and IT leaders need to answer about cybersecurity

Organisations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organisations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth in cyber-attacks Additionally, cyber-threats have taken a...

Airbus deploys cybersecurity operations at the French Ministry of the Armed Forces

Airbus has been awarded the Symphonie contract by the French joint services directorate for defence infrastructure networks and information systems (DIRISI) for a period of seven years. It is part of the Descartes programme designed to modernise the telecommunication networks of the French Ministry of the Armed Forces. Transition from ISDN to VoIP Symphonie will offer 270,000 users at the Ministry of the Armed Forces a telephony service at 1,500 sites in metropolitan France, the overseas terri...

Why video management software is integral and interwoven into 2018’s security outlook

  The record-breaking attendance at the 2017 industry trade shows was a clear indication of a growing need for and interest in security. While cybersecurity was a main theme, with encryption and automatic-updating technology taking centre stage, customised solutions and visible examples of increased manufacturer’s support were also highlighted. These latter two are interwoven through activities such as manufacturer’s training seminars that highlight the advanced f...

ADT redefines security for home, person and network at CES 2018

ADT, a leading provider of security and automation solutions for homes and businesses, redefines security at this year’s Consumer Electronics Show (CES). For 143 years, ADT has been committed to making professionally-monitored security more accessible, believing everyone deserves to feel safe. Now, consumers can find protection not only at home, but on the go and within their digital network as well. “Advancements in technology has not only changed the way we live, but it has p...

VIVOTEK and Trend Micro announce partnership to tackle cybersecurity

VIVOTEK, the IP surveillance solution provider, and Trend Micro Incorporated, cybersecurity solutions, have announced a strategic partnership to offer cutting-edge cyber-defence solutions. With VIVOTEK’s experience in IP surveillance and Trend Micro’s extensive expertise in cybersecurity, the partnership enables users to enjoy higher levels of network security when deploying VIVOTEK’s network cameras, and strengthen defences in response to the emerging security challenges of th...

Morse Watchmans collaborates with Grinta Iberica to distribute products in Spain

Morse Watchmans, a producer of key management systems, announces an expansion of its ever-growing dealer network through the addition of Grinta Iberica of Barcelona, Spain. As the exclusive Morse Watchmans dealer in Spain, Grinta Iberica will carry the full line of Morse Watchmans products, in addition to having full product demos available at its corporate headquarters. The dealer’s parent company Grinta Venezuela has been a Morse Watchmans dealer for many years, and the expansion into S...

Round Table Discussions

Does the security market really understand the meaning of 'cloud?'

There’s a huge cloud hanging over the physical security market, but in a good way. Cloud-based systems, whether for video, access control or another category, are on the verge of taking the industry by storm. The benefits of that mythical “cloud” are well-known, or certainly well-touted, in the market. It’s almost as if the word “cloud” has become a buzzword that can mean different things, or at least whatever the customer wants it to mean (as long as they buy...

Are we talking enough about cybersecurity?

For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing...

What technology will have the greatest impact in the second half of 2017?

Technology is changing at a break-neck pace, and the security marketplace is currently being bombarded by a wealth of new capabilities and innovations. But what will be the impact? Which of the currently-hyped new innovations will have a major impact, and which will fade over time? And even acknowledging the long-term significance of various technologies, what can we expect to be the more immediate effect? We asked this week’s Expert Panel Roundtable: What new security technology is poised...