Physical Security Information Management (PSIM)

Social media data provides security professionals with real-time situational awareness

Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this inform...

Qognify ISM, ACI and Situator Packaged Solutions on display at IFSEC 2018

Qognify will return to IFSEC International 2018 for the European introduction of its innovative new Packaged Solutions, alongside its extensive portfolio of award-winning VMS, PSIM and advanced video analytics solutions. Qognify’s Packaged Solutions, a library of pre-designed and pre-configured bundled solutions to address common and specific security-related challenges. Using the intelligent capabilities of the market-leading Qognify portfolio, including Situator, VisionHub and video and...

CNL Software showcases updates to IPSecurityCenter PSIM solution at IFSEC 2018

CNL Software, a pioneer in Physical Security Information Management (PSIM) software, announces that it will be showcasing the latest enhancements to its IPSecurityCenter PSIM solution as an ecosystem partner on the Milestone stand C340 at IFSEC International 2018. CNL Software will demonstrate how its PSIM technology helps law enforcement, government agencies and the military, owners and operators of public and private critical infrastructure, large corporations and school districts, colleges a...

HID Global attains ISO 27001 Certification for its HID Mobile Access software

HID Global, worldwide supplier of trusted identity solutions has announced that its award-winning HID Mobile Access solution is one of the industry’s first mobile access offerings to be ISO 27001 certified. A widely-known and accepted international security standard, ISO 27001 serves as an information security management systems framework that specifies security best practices, establishes controls to manage risk and protects data.  HID Mobile Access “Being a pioneer of ISO 27...

IFSEC 2018 announces Converged Security Centre powered by Vidsys for integrating physical and cyber security

IFSEC International 2018 will play host to a dedicated learning and demonstration area, where visitors will benefit from a real-time immersive experience of integrated physical and cyber security. Networked systems and applied technologies are presenting security management professionals with rising levels of information outputs and data, which are rapidly becoming core aspects of their business strategies. The business intelligence available from this deepening level of integration is now a cor...

Teleste Corporation unveils S-AWARE smart security platform at Securex 2018

Teleste Corporation will launch a new solution for situational awareness and incident management at Securex 2018 in Poland. The solution, called S-AWARE, has been designed to expand the scope of traditional security and operations control systems by harnessing them with a new layer of data analytics and intelligence. The solution provides operating personnel with a powerful tool to sharpen their decision-making process by taking advantage of versatile types of data from a variety of sources.&nb...

Round table discussions

What are the most valuable features of cloud security?

Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this wee...

What are the challenges of body-worn cameras for the security industry?

Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?

How does the IT department influence security purchases?

In recent years, information technology (IT) departments at end user companies have often been seen as adversaries of traditional security departments – or, at least, as a thorn in their side. One of the issues is territorial: As physical security products have migrated to use of Internet protocols and the network infrastructure, the IT and security departments have clashed – erm… make that interacted – more and more often. New realities such as cybersecurity have made i...