Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organisations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emergi...
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorised access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a...
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity thr...
The latest Device Pack 9.8 update for hardware support in Milestone XProtect Video Management Software implements local storage for body-worn cameras and adds support for SRTP (Secure Real-time Transport Protocol) on Axis devices. Milestone Systems, the premier global provider of open platform networked video management system (VMS), has released Device Pack 9.8 for partners and customers using Milestone XProtect video solutions. The bi-monthly device packs contain software updates for XProtect...
The advent of cloud technology and the move toward a digitally connected world is leading towards massive growth in the way data gets generated, stored and managed. The demand for cloud based solutions is rising and the market is growing rapidly. COSEC VYOM is a People Mobility Management solution, based on cloud technology that allows users to use application, hardware and infrastructure as a service. Cloud based time and attendance system addresses solutions to the outlined issues of producti...
HID Global, global provider of trusted identity solutions, has announced that the government of Argentina has selected HID Global to upgrade its ICAO electronic passport to a newer generation that will reduce costs, improve security and enhance the reliability of data reading at border control points. Enhanced data security and vetting The Argentine government is transitioning its electronic booklet from a printed antenna to a new copper wire antenna, which is more reliable, having a s...
How SecuriThings boosts cybersecurity across multiple IoT devices
- Physical and cyber security precautions when travelling
- Device Pack 9.8 update for hardware support in Milestone XProtect VMS adds support for SRTP on Axis devices
- Matrix's COSEC VYOM is an authenticated multi-tenant cloud based People Mobility Management solution
- Argentina selects HID Global to deliver new electronic cover for its passport
Bosch installs integrated access control solution at the Mall of Switzerland in Ebikon
- Pulse Secure's advanced network access control system safeguards Entegrus's IT infrastructure
- Qognify Situator enables the Gatwick Airport Integrated Security project
- CriticalArc’s SafeZone emergency response app safeguards FCC Group's employees across geographies
- Matrix’s integrated security solution safeguards Ellams' Nairobi manufacturing plant