www.sourcesecurity.com
Open in
urlscan Pro
2a02:e980:164::8c
Public Scan
Submitted URL: http://sourcesecurity.com/
Effective URL: https://www.sourcesecurity.com/
Submission: On November 07 via manual from US — Scanned from DE
Effective URL: https://www.sourcesecurity.com/
Submission: On November 07 via manual from US — Scanned from DE
Form analysis
3 forms found in the DOMName: navfrmProductSearch — GET /keyword-search.html
<form method="get" action="/keyword-search.html" name="navfrmProductSearch" id="navfrmProductSearch" autocomplete="off">
<input type="hidden" name="ie" value="UTF-8">
<input name="cx" type="hidden" value="008496319178451988125:2d_izq15sn4">
<input type="text" name="q" id="q_nav" class="form-control" aria-describedby="" placeholder="">
</form>
Name: frmProductSearch — GET /keyword-search.html
<form method="get" action="/keyword-search.html" name="frmProductSearch" id="frmProductSearch" autocomplete="off">
<input type="hidden" name="ie" value="UTF-8">
<input name="cx" type="hidden" value="008496319178451988125:2d_izq15sn4">
<span>
<input type="text" name="q" id="q" class="form-control" aria-describedby="" placeholder="">
</span>
</form>
<form class="white-color">
<h2 class="white-color">Subscribe to our Newsletter</h2>
<small>Stay updated with the latest trends and technologies in the security industry</small>
<div class="form-group mt-4">
<input type="email" class="form-control" aria-describedby="emailHelp" id="footer_sign_up_email" placeholder="Please enter your Email">
<a href="javascript:void(0);" class="btn btn-primary btn-lg mt-3 btn-block sign_up_link">Sign Up</a>
</div>
<p class="footer_member_logos">
<a target="_blank" href="https://dma.org.uk/company/notting-hill-media" rel="nofollow"><img loading="lazy" class="pr-3" height="100" src="https://www.sourcesecurity.com/img/dma-2020-white.png" alt="DMA"></a>
</p>
<style type="text/css">
.footer_member_logos:before {
display: none;
}
</style>
<p> SourceSecurity.com - Making the world a safer place<br> Copyright © Notting Hill Media Limited 2000 - 2022, all rights reserved<br><br> Our other sites: <br>
<a href="https://www.securityinformed.com" target="_blank" class="link" style="text-transform: none">SecurityInformed.com | </a>
<a href="https://www.thebigredguide.com" target="_blank" class="link" style="text-transform: none">TheBigRedGuide.com | </a>
<a href="https://www.hvacinformed.com" target="_blank" class="link" style="text-transform: none">HVACInformed.com | </a>
<a href="https://www.maritimeinformed.com" target="_blank" class="link" style="text-transform: none">MaritimeInformed.com </a>
</p>
</form>
Text Content
* Products CCTV * CCTV cameras * CCTV software * IP cameras * Digital video recorders (DVRs) * Dome cameras * Network video recorders (NVRs) * IP Dome cameras * CCTV camera lenses Access Control * Access control readers * Access control software * Access control controllers * Access control systems & kits * Audio, video or keypad entry * Electronic locking devices * Access control cards/ tags/ fobs * Access control system accessories Intruder Alarms * Intruder alarm system control panels & accessories * Intruder detectors * Intruder warning devices * Intruder alarm communicators * Intruder alarm accessories * Intruder alarm lighting systems Topics * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * ISC West Climax launches products that adopt SF1 Technology Anviz C2 Series biometric identification and RFID card access control & time attendance devices Dahua DH-IPC-HDW3849H-AS-PV 8 MP Smart Dual Illumination Active Deterrence Fixed-focal Eyeball WizSense Network Camera Hikvision released the evolutionary eDVR Series with eSSD technology * Companies Companies * Manufacturers * Distributors * Resellers / Dealers / Reps * Installers * Consultants * Systems integrators * Events / Training / Services * Manned guarding Companies by Product area * CCTV * Access control * Intruder alarm * IP networking products * Biometrics * Software * Digital video recording * Intercom systems Topics * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * ISC West * News News * Product news * Corporate news * Case studies * Events news Latest * DH2i partners with Software AG to achieve near-zero downtime within its own SQL Server Availability Group (AG) Kubernetes cluster * Capture the whole scene with Dahua Full-color Dual Lens 180° Panoramic Cameras * Rubrik releases research study - ‘The State of Data Security’ that reveals one-third of enterprises forced to change leadership due to a cyber-attack * RealWear launches a hands-free, voice-controlled thermal camera with FLIR Lepton module Topics * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * ISC West * Insights Insights * Expert commentary * Security beat * Round table discussions * Security bytes * Round Table Expert Panel * eMagazines * Year in Review 2020 * Year in Review 2019 Featured * Selling security technology to upper management: Here’s how * Organisations need a new approach to tackle hybrid cloud security challenges * What’s new in the integration of video and access control? * Managing the cybersecurity risks of operational technology in transportation Topics * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * ISC West * Markets Markets * Airports & Ports * Banking & Finance * Education * Hotels, Leisure & Entertainment * Government & Public Services * Healthcare * Remote Monitoring * Retail * Transportation * Industrial & Commercial Topics * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * ISC West Dahua highlights some of the campus applications of implementing AI technology in schools Hikvision provides their LED display solution to enhance visual experience at GEMS Modern Academy Puerto Rico protects more than 850 public schools with the help of Milestone Systems Software March Networks provides its Searchlight for Banking software to Danske Bank * Virtual events Virtual events * Video Surveillance * Access Control * Video Analytics * Security Storage * Video Management Systems * Integrated Systems Events * International security * Regional security * Vertical market * Technology areas * Conferences / seminars * Company sponsored Topics * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * ISC West Anatomy of a False Alarm Making physical security a critical pillar of your cybersecurity strategy Preventing Fan Violence: 7 Tips for Moving from Reactive to Proactive Security Improving real-time visualisation and collaboration in SCADA Operations * White papers White papers * Video Surveillance * Access Control * Video Analytics * Video Compression * Security Storage White papers by company * HID Global * Azena * Nedap Security Management * Milestone Systems * Eagle Eye Networks Other Resources * eMagazines * Videos Topics * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * ISC West Cybersecurity in the physical security world RFID for GMP/GLP environments Smart surveillance in the workplace Improving City Mobility Using Connected Video Technology About us Advertise * Artificial intelligence (AI) * Mobile access * Counter terror * Cyber security * Robotics * More * ISC West * Thermal imaging * Intrusion detection * Body worn video cameras * Video analytics * Cloud security * COVID-19 * View all * * 6 * Selling security technology to upper management: Here’s how Dahua highlights some of the campus applications of implementing AI technology in schools Sponsored Hikvision provides their LED display solution to enhance visual experience at GEMS Modern Academy ASSA ABLOY’s Aperio wireless locks deployed by the University of St Andrews to meet sustainability goals FEATURED WHITE PAPERS Four areas to consider in frictionless access control Download The inevitability of The Cloud Download How to ramp up perimeter security with license plate reader technology Download Solve access control challenges in the healthcare sector Download The role of access control in a safe return to the workplace Download 10 step guide to staying ahead of emerging security threats Download 2021 Trends in Video Surveillance Download Exploring new vertical markets for professional security systems Download 5 security lessons for navigating COVID-19 Download Cyber security and high security in a business integrated world Download Physical access control in higher education Download Boosting on-site safety and security Download Optimise your business with analytics and AI Download How doorhandles and levers with antimicrobial treatment reduce disease spread Download Building a safe ecosystem for visitors post COVID-19 Download Smart security cameras: excellence in retail Download 5 reasons to integrate mobile technology into your security solution Download How analytics engines mitigate risk, ensure compliance and reduce cost Download Wireless security: Cut costs without cutting corners Download Beyond security: access control for multi-tenant sites Download Reducing the cost of video surveillance system deployment and operation Download How plate reader technology increases your perimeter security Download 3 reasons to migrate to a new access control system Download Schooling the market on education security Download Nine ways to make your retail security system work harder Download Financial institutions require future-ready physical security technologies Download H.265 High Efficiency Coding: Video compression for security applications Download How to overcome the storage challenges of adopting surveillance AI Download Physical security supports a future-proof cyber security strategy Download Three reasons for adopting open architecture access control solutions Download 5 steps to finding the right access control system for you Download Why outdated access control systems are a big problem Download Five things to consider for AI with video technology Download OSDP is the strongest access control for your business Download Is your access control as effective as you think? Download Cybersecurity in the physical security world Download RFID for GMP/GLP environments Download Smart surveillance in the workplace Download Improving City Mobility Using Connected Video Technology Download Public-Private Partnerships On Campus: What You Need To Know Download A More Secure Alternative to 125 kHz Proximity Cards Download 5 ways to strengthen physical security with an integrated system Download The critical role of access control in K-12 school security Download The benefits of Edge AI + Cloud for security systems Download Creating a secure and positive healthcare experience Download Video technology: making cities safer & improving lives Download 11 advantages of a combined system for access control and intrusion Download Integrated access control: reap the benefits of connected security Download A focus on video surveillance cybersecurity Download Three essential reasons to upgrade your access control technology in 2022 Download Charting the path to safe cities Download Assessing the total cost of ownership (TCO) of VMS and NVR systems Download Securing unmanned infrastructure at the network edge Download Achieving frictionless physical access control with AEOS Download The rise of ethical facial recognition Download 10 top insights in access, cloud and more Download Protecting Critical Infrastructure through facial recognition Download Top 5 ways to ensure visitor safety and security Download Moving to mobile: A guide for businesses switching to mobile access control Download 11 reasons video surveillance is moving to the cloud Download Smart and reliable rail and metro operations Download Simplified security for utilities & critical infrastructure Download School security moves to the cloud Download Cloud-based access control and occupancy management to safeguard workplaces Download Monitoring traffic flow: Everywhere, all the time Download Delivering smart, secure and healthy retail environments with the cloud Download Protecting your data against physical threats Download Best practices guide: analogue video to cloud Download Delivering a smart, secure and healthy workplace with cloud Download Six ways to eliminate costs, risks and disruption to your network Download Four areas to consider in frictionless access control Download The inevitability of The Cloud Download How to ramp up perimeter security with license plate reader technology Download Solve access control challenges in the healthcare sector Download The role of access control in a safe return to the workplace Download 10 step guide to staying ahead of emerging security threats Download 2021 Trends in Video Surveillance Download Exploring new vertical markets for professional security systems Download 5 security lessons for navigating COVID-19 Download Cyber security and high security in a business integrated world Download Physical access control in higher education Download Boosting on-site safety and security Download Optimise your business with analytics and AI Download How doorhandles and levers with antimicrobial treatment reduce disease spread Download Building a safe ecosystem for visitors post COVID-19 Download Smart security cameras: excellence in retail Download 5 reasons to integrate mobile technology into your security solution Download How analytics engines mitigate risk, ensure compliance and reduce cost Download Wireless security: Cut costs without cutting corners Download Beyond security: access control for multi-tenant sites Download Reducing the cost of video surveillance system deployment and operation Download How plate reader technology increases your perimeter security Download 3 reasons to migrate to a new access control system Download Schooling the market on education security Download Nine ways to make your retail security system work harder Download Financial institutions require future-ready physical security technologies Download H.265 High Efficiency Coding: Video compression for security applications Download How to overcome the storage challenges of adopting surveillance AI Download Physical security supports a future-proof cyber security strategy Download Three reasons for adopting open architecture access control solutions Download 5 steps to finding the right access control system for you Download Why outdated access control systems are a big problem Download Five things to consider for AI with video technology Download OSDP is the strongest access control for your business Download Is your access control as effective as you think? Download Cybersecurity in the physical security world Download RFID for GMP/GLP environments Download Smart surveillance in the workplace Download Improving City Mobility Using Connected Video Technology Download Public-Private Partnerships On Campus: What You Need To Know Download A More Secure Alternative to 125 kHz Proximity Cards Download 5 ways to strengthen physical security with an integrated system Download The critical role of access control in K-12 school security Download The benefits of Edge AI + Cloud for security systems Download Creating a secure and positive healthcare experience Download Video technology: making cities safer & improving lives Download 11 advantages of a combined system for access control and intrusion Download Integrated access control: reap the benefits of connected security Download A focus on video surveillance cybersecurity Download Three essential reasons to upgrade your access control technology in 2022 Download Charting the path to safe cities Download Assessing the total cost of ownership (TCO) of VMS and NVR systems Download Securing unmanned infrastructure at the network edge Download Achieving frictionless physical access control with AEOS Download The rise of ethical facial recognition Download 10 top insights in access, cloud and more Download Protecting Critical Infrastructure through facial recognition Download Top 5 ways to ensure visitor safety and security Download Moving to mobile: A guide for businesses switching to mobile access control Download 11 reasons video surveillance is moving to the cloud Download Smart and reliable rail and metro operations Download Simplified security for utilities & critical infrastructure Download School security moves to the cloud Download Cloud-based access control and occupancy management to safeguard workplaces Download Monitoring traffic flow: Everywhere, all the time Download Delivering smart, secure and healthy retail environments with the cloud Download Protecting your data against physical threats Download Best practices guide: analogue video to cloud Download Delivering a smart, secure and healthy workplace with cloud Download Six ways to eliminate costs, risks and disruption to your network Download ‹› MOBILE ACCESS ARTICLES How to prepare your security for a rapidly changing world You’re no psychic. You probably don’t have the power of clairvoyance. But guess what? When it comes to your security, none of that matters. You can still create future-proof security by properly equipping yourself. Here’s how. Understanding access control Security is changing faster than ever before. With new threats inside the workplace and smaller security teams taking on more tasks, IT and security personnel must automate their processes using new technology. One difficult aspect, however, is choosing the right technology. By analysing technological trends and assessing your current and future needs, you can preemptively find solutions. Ultimately, in the long run, these solutions will save you time and expense. Ultimately, in the long run, these solutions will save you time and expense But how do you distinguish a momentary trend from a long-term solution? Do you really need to pay extra money for that feature, or will you stop using it in a year? To properly invest in future-proof access control, IT and security teams must look at three different aspects of technology: Flexibility, Scalability, and Efficiency. Access control system Flexibility: Hardware It’s not the sexiest thing to talk about, but hardware is crucial to any security system. Readers, locks and controllers are the backbone of any access control system, and choosing the right hardware is essential when it comes to planning for the future. Broadly speaking, hardware falls into two categories: proprietary and non-proprietary. For those teams considering a new installation, choosing between proprietary access control and non-proprietary access control is a decision that will affect your organisation over the long term. Long-term unseen expenses Proprietary Hardware Pros: Upfront costs can be less expensive; One vendor for hardware and software. Cons: Locked into one vendor; Long-term unseen expenses. Imagine buying a microwave that only cooked foods produced by the microwave manufacturer Imagine buying a microwave that only cooked foods produced by the microwave manufacturer. In a booming economy, the manufacturer produces all sorts of tasty treats—popcorn, lasagna, pies. But when the economy takes a dip, the manufacturer scales back its production and announces it will only sell liver and onions. Now maybe you’re a liver and onions fan, but on the off chance you like variety in your diet, this would be a problem. Your microwave has been rendered useless and has essentially become a liver and onions cooking machine. Potential system vulnerabilities Like the microwave example, proprietary hardware leaves companies at the mercy of the manufacturer. If the manufacturer goes out of business, the system will cease to function, and customer support will be non-existent. Consequently, your security team will likely have to install an entirely new hardware system. Costly, right? Let’s consider a less dramatic scenario. What if a manufacturer, instead of closing, decides to scale back its operations? It provides less frequent updates and fewer new feature releases. Without these updates, your security becomes more vulnerable and outdated. In the long run, choosing proprietary hardware can end up costing teams a lot more than they are saving and expose potential system vulnerabilities. Non-proprietary hardware Pros: Free to switch software vendors; Long-term system flexibility. Cons: Upfront costs can be more expensive. Non-proprietary hardware gives teams the power to switch software providers at any point Where proprietary hardware fails, non-proprietary thrives. The most important aspect of a non-proprietary system is the flexibility it grants. Non-proprietary hardware gives teams the power to switch software providers at any point, without replacing the hardware. In the aforementioned microwave scenario, the customer was relegated to a life of liver and onions because of their proprietary microwave. However, had they chosen a non-proprietary microwave, then they could have eaten any meal. They wouldn’t be limited to the food options sold by the manufacturer. Non-proprietary hardware also accounts for much of the current marketplace. If your team currently uses non-proprietary hardware—Mercury Security, HID, Wavelynx, or STid-- but is considering switching to a cloud-based provider, then something called a software takeover could be useful. A software takeover is a process by which a new software provider replaces a former one, though no new hardware is installed. Scalability: on-prem or the cloud? Whether working for an enterprise, hospital or school district there is always potential for expansion. As an organisation grows or shrinks, so must its access control. At your latest ‘all-hands’ meeting, the CEO announces that you will be aggressively expanding At your latest ‘all-hands’ meeting, the CEO announces that you will be aggressively expanding. They want security to be up and running in three new countries by the end of the quarter. Luckily, you have just finished migrating from on-premises access control to the cloud. You handle scaling the operation with relative ease. IT and security teams must choose between cloud access control and legacy on-premises equipment. The greatest determination of scalability lies with the server. Cloud-based access control Pros: Easily scalable; Less regular maintenance; More secure; Integrations; Centralised storage. Cons: On-going subscription costs; Migrating from on-premises access control. When asked about the trends shaping the near future of access control, 38% of respondents said cloud hosting would be an important feature. Though this was a lower percentage compared to the responses at the beginning of Covid-19 (50% mentioned cloud), cloud security is poised to grow by as much as 13.7% each year. Connecting software stacks Here are some facts about cloud-based access control: Security: In the past, what held the cloud back were concerns about cyber security. But advances in security, including 256-bit encryption for data at rest and data in transit, have significantly improved the cloud. Integrations: Talk to any IT director who has already made the migration from on-prem to cloud, and they’ll mention ‘integrations.’ The cloud gives administrators the ability to more quickly connect their software stacks. Some popular integrations include visitor, video, identity, and notification management. Though integrating on-premises access control is possible, it takes significantly longer and is more costly than integrating with the cloud. Remote Access: Since COVID-19, IT and security professionals have been searching for remote ways to work. However, remotely connecting to an on-premises access control system often requires a VPN. The cloud allows teams to work remotely and access any of the buildings in their portfolio while off site. Physical access control Efficiency: Software Features Another important aspect of physical access control is its software features Another important aspect of physical access control is its software features. While the needs vary from industry to industry, some overlap exists. For instance, a global dashboard can give oversight across buildings on college campuses or offices of a national enterprise. A security team in New York can monitor the access events or provision a new employee in Tokyo. Broadly speaking, IT and security teams are looking for software that boosts day-to-day efficiency and is customisable. These features include: Custom Reports- Spreadsheets or PDFs that give you an aggregated view of access events that have occurred over a given period. Custom Roles- Administrators the ability to create an organisational framework by access permissions. Badges- Create branded physical or digital badges according to permission level. Emergency Add-ons- Custom door plans and Muster reporting can help in crisis situations. For example, if there is an active shooter, certain doors can be left open or locked automatically to prevent the shooter from gaining access to certain areas. Cloud access control has made it easier to implement new features. Ultimately, the cloud gives IT and security administrators more power to quickly request and deploy the features they find most worthwhile. Final thoughts on security With the rapid technological transformation brought about by cloud and mobile access control, it’s important that IT and security teams stay ahead of the curve. In order to decide which system is the right choice for you, it’s important to evaluate not only your current but also future needs. Creating a checklist of the most important features and deciding whether to host all the server yourself are two important steps to pinpointing the perfect access control system. For more information, ask access control providers for a free demo. HID to showcase their TSL RAIN RFID modules at Wireless IoT Tomorrow 2022 HID, the pioneer in trusted identity solutions, announces its first RAIN RFID reader modules featuring the company’s TSL technology and the innovative STORM command protocol that simplifies embedded software integration. The modules enable developers to create customised reader hardware designs that take full advantage of the superior performance of Impinj E710 and E910 reader chips and their ability to support next-generation RAIN tags. Handheld and wearable devices The HID TSL RAIN RFID reader module family includes three options for designing compact fixed readers, as well as readers used in mobile and battery-operated handheld and wearable devices. Applications include asset tracking/inventory management, automation, safety and compliance, personnel tracking, and authentication, in industries ranging from retail, healthcare, and hospitality to transport and logistics and warehouse and distribution. The family includes: TSL 3117 with a single antenna port, based on the Impinj E710 reader chip. TSL 3417 with four antenna ports, based on the Impinj E710 reader chip. TSL 3419 with four antenna ports, based on the Impinj E910 chip for Enterprise-grade fixed readers. UHF RFID reader modules There has been a gap in the market for reliable, high-performance UHF RFID reader modules" “There has been a gap in the market for reliable, high-performance UHF RFID reader modules that mid-volume manufacturers can integrate efficiently into their products,” said Dr. David Evans, Vice President Technology Solutions Business Unit. He adds, “We are meeting this need with a family of modules that build on over two decades of mobile RFID hardware experience to extract more performance into a smaller form factor than ever before. As an Impinj Gold partner and member of the Impinj Connected programme, we are incorporating the best-performing RAIN RFID reader chips on the market to supply class-leading performance in a ‘ready to go’ package.” Previous generation chipsets HID’s TSL reader modules exceed the read range, reader sensitivity, and tag throughput of alternative modules in a compact, easy-to-integrate form factor. The key features of these modules are a result of a combination of TSL RFID design experience and Impinj’s reader chip and include: High sensitivity (>-90dbm). Fast tag acquisition rate (>1300 tags/sec). Up to 50% lower power consumption than previous generation chipsets. Broad compatibility with latest generation UHF sensor chips which include the measurement of temperature, humidity, strain, acceleration, and more. TSL reader modules These new HID TSL reader modules reduce reader design complexity, time-to-market, and development costs through its STORM protocol that enables complex tag operations to be executed using simple, but powerful pre-configured command sets. HID provides extensive support for developers using a wide range of host devices and development environments including a dedicated developer kit for the new modules. HID will be exhibiting its new TSL RAIN RFID modules at the Wireless IoT Tomorrow show from October 19-20, 2022, in Booth #20 at the Rhein-Main Congress Centre in Wiesbaden, Germany. DH2i partners with Software AG to achieve near-zero downtime within its own SQL Server Availability Group (AG) Kubernetes cluster DH2i® the provider of always-secure and always-on IT infrastructure solutions, and Software AG Government Solutions, announces they have entered into a partnership. A trusted provider of FedRAMP solutions, Software AG Government Solutions, will integrate DH2i’s DxEnterprise (DxE) Smart High Availability Clustering software into its FedRAMP authorised cloud to achieve near-zero downtime within its own SQL Server Availability Group (AG) Kubernetes cluster. Software AG Government Solutions will offer the combined solution to its U.S. federal, state, and local government customers, as well as its aerospace and defence industry clients. Modern cloud technologies The Federal Risk and Authorisation Management Program (FedRAMP) is a government-wide program that provides a standardised approach to security assessment, authorisation, and continuous monitoring for cloud products and services. FedRAMP empowers agencies to use modern cloud technologies, with emphasis on security and protection of federal information, and helps accelerate the adoption of secure, cloud solutions. Using DxEnterprise to manage our SQL Server AGs in Kubernetes enables us to deliver zero downtime" “Container use is growing exponentially for digital transformation projects in the government, aerospace, and defence industries – particularly the use of stateful containers for databases such as Microsoft SQL Server. This growing stateful database container use is also generating a hard production deployment requirement for database-level high availability (HA) in Kubernetes,” said Jeff Estes, Senior Director, Systems Engineering, Software AG Government Solutions. “Using DxEnterprise to manage our SQL Server AGs in Kubernetes enables us to deliver zero downtime for our customers running our Alfabet software.” Critical IT challenges DxEnterprise enables an enterprise’s true digital transformation (DX) by speeding the adoption of highly available stateful containers and providing SQL Server Availability Group (AG) support for SQL Server containers in Kubernetes clusters. “Software AG Government Solutions is an organisation known across all branches of Government for delivering only the most trusted and real-world proven technologies backed by expertise that enables customers to virtually eliminate investment risk while solving complex and critical IT challenges. It is therefore an enviable seal of approval for them to deploy DxEnterprise software as part of their FedRAMP-certified solutions,” said Don Boxley, CEO and Co-Founder, DH2i. Multi-cloud environments DxEnterprise smart high availability clustering software features & benefits: HA for SQL Server Availability Groups in Kubernetes—with automatic failover, an industry first. This enables customers to deploy stateful containers to create new and innovative applications. Near-zero recovery time objective (RTO) failover for instances and containers at the database-level– enables operations to deliver better products and services more efficiently and resiliently at a lower cost to the business. Distributed Kubernetes AG clusters across availability zones/regions, hybrid cloud and multi-cloud environments—with built-in secure multi-subnet Zero Trust Network Access (ZTNA) tunnel technology. This enables customers to rapidly adapt to changes in market conditions and consumer preferences. Intelligent health & performance QoS monitoring with alerts for SLA assurance and simplified system management. Mix and match support for Windows and Linux; bare-metal, virtual, cloud servers – maximises IT budget ROI. Secure cloud environments Deploying SQL Server AGs in Kubernetes remains a hurdle that organisations struggle to overcome For those attending the upcoming 2022 PASS Data Community Summit, taking place at the Seattle Convention Centre, November 15-18, please join Jeff Estes, Senior Director, Systems Engineering, Software AG Government Solutions for his presentation: Deploying SQL Server AGs in EKS for Secure Federal Government Cloud Services - November 16, 6:45 am - 7:55 am; Room 608-609. The use of containers in the Federal Government is exploding as it looks for better ways to improve the performance, scalability, and portability of their applications in secure cloud environments. Despite the promise of containers, deploying SQL Server AGs in Kubernetes remains a hurdle that organisations struggle to overcome. Join Jeff Estes of Software AG Government Solutions for breakfast to learn how he used DH2i’s DxEnterprise to jump the hurdle and deploy highly available SQL Server Availability Groups (AGs) in EKS certified for FedRAMP. Rubrik releases research study - ‘The State of Data Security’ that reveals one-third of enterprises forced to change leadership due to a cyber-attack IT and security leaders must address, on average, one cyber-attack per week according to a new study released titled, ‘The State of Data Security’ by Rubrik Zero Labs (Rubrik, Inc.). Rubrik, the zero trust data security company, gathered insights from more than 1,600 security and IT leaders, including CISOs, CIOs, VPs and Directors across 10 countries. The findings exposed rising security risks for organisations, resulting in widespread damage to organisations and their IT and security teams. Key findings of ‘The State of Data Security’ research study by Rubrik Zero Labs include: Cyber-attacks continue to surge in volume and impact: Nearly every leader surveyed experienced a cyber-attack over the past year, and on average faced 47 attacks in that timeframe — or nearly one cyber-attack per week. 52% reported a data breach and 51% reported facing a ransomware attack in the past year. Only 5% of organisations were able to return to business continuity or normal operations within one hour of discovering a cyber-attack. 48% of IT and security leaders reported to be concerned about data breaches (25%) or ransomware events (23%), as the top threat for the year ahead. Organisations are losing confidence in their ability to withstand attacks: 92% of respondents are concerned they will be unable to maintain business continuity, if they experience a cyber-attack. One-third believed their board has little to no confidence in their organisation’s ability to recover critical data and business applications, after a cyber-attack. 76% of survey respondents reported their organisation is likely to consider paying a ransom, following a cyber-attack. 11% of IT and security leaders said they had not adequately addressed vulnerabilities from previous cyber events. The weight of cybercrime is taking a toll: 96% of respondents reported experiencing significant emotional or psychological consequences, following a cyber-attack, ranging from worries over job security (43%) to loss of trust among colleagues (37%). About one-third of leaders surveyed said their IT and SecOps teams were either somewhat or not at all aligned, when it came to defending their organisations. Cyber-attacks cause major impacts against global organisations It’s clear from this research that cyber-attacks continue to produce large impacts against global organisations" “It’s clear from this research that cyber-attacks continue to produce large impacts against global organisations and the effects are compounding,” said Steven Stone, the Head of Rubrik Zero Labs, adding “In addition to this rise in frequency and impacts of cyber events, the individuals on the front lines are taking a psychological hit on their well-being. Trust is down and anxiety is up.” Steven Stone continues, “Without a proactive and reliable approach to defend against modern cyber threats and strengthen confidence in an organisation’s ability to resolve these cyber events, these impacts - both human and organisational - will continue to worsen and feed each other. The good news is we’re also seeing pragmatic, proven strategies in this same space paying off and we can build off these approaches.” Need to enhance cyber security “We often overlook the psychological dimension of cyber-attacks and the chaos that tends to follow after discovering an incident,” said Chris Krebs, the Former Director of CISA and Founding Partner of the Krebs Stamos Group LLC, adding “The bad guys sure have figured it out, though, with criminals and state actors alike trying to generate emotional responses when they attack, as evidenced by the increase in criminal extortion efforts and hack and leak campaigns.” Chris Krebs continues, “In the end, IT and security leaders alike tend to take the blame for these cyber-attacks. One of the most effective techniques I’ve seen to prepare for these types of attacks is to accept you’re going to have a bad day at some point, and your job is to ensure that it doesn’t become a ‘worse day’. This is why we need defenders across the spectrum to come together - sharing best practices, learnings after attacks, simulations, frameworks - so that we’re collectively strengthening our defenses and minimising the psychological impact brought on by an attack.” ‘The State of Data Security’ research study ‘The State of Data Security’ research study comes from Rubrik Zero Labs, the company’s new cyber security research unit formed to analyse the global threat landscape, report on emerging data security issues, and give organisations research-backed insights and best practices, in order to secure their data against increasing cyber events. SEARCH FOR PRODUCTS Search from our vast range of products (37,635) CCTV Access Control Intruder Alarms FEATURED PRODUCTS Nexcom NViS 1482 DoorKing's ProxPlus™ Card Readers Dahua DHI-LCH65/75/86-MC410-B 65/75/86'' UHD Smart Interactive Whiteboard Doorking 1620 Surface Mount Lane Barrier Anviz New Smart Surveillance Management Platform Dahua IPC-PFW8840-A180 4×2MP WizMind Multi-Sensor Panoramic Network IR Bullet Camera Dahua ARD1731-W2 Wireless PIR-Camera Nexcom NViS 14162 Desktop SoC NVR with Intel® Elkhart Lake Platform Built-in 16-Port PoE Secu365 - A cloud-based security SaaS platform Dahua DH-PSDW82442M-A270-D440 6×4MP Multi-Sensor Panoramic + PTZ WizMind Network Camera Climax launches products that adopt SF1 Technology Anviz C2 Series biometric identification and RFID card access control & time attendance devices Dahua DH-IPC-HDW3849H-AS-PV 8 MP Smart Dual Illumination Active Deterrence Fixed-focal Eyeball WizSense Network Camera Hikvision released the evolutionary eDVR Series with eSSD technology Programmable electronic keys can lighten the workload for facility managers Dahua DHI-LPH65/75/86-MT440-C 65/75/86'' UHD Smart Interactive Whiteboard Pelco Sarix® Multi Pro Camera series Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform Hikvision unveils the industry's first "True 8K" NVRs Delta Scientific DSC550 Open Frame Barrier Nexcom NViS 1482 DoorKing's ProxPlus™ Card Readers Dahua DHI-LCH65/75/86-MC410-B 65/75/86'' UHD Smart Interactive Whiteboard Doorking 1620 Surface Mount Lane Barrier Anviz New Smart Surveillance Management Platform Dahua IPC-PFW8840-A180 4×2MP WizMind Multi-Sensor Panoramic Network IR Bullet Camera Dahua ARD1731-W2 Wireless PIR-Camera Nexcom NViS 14162 Desktop SoC NVR with Intel® Elkhart Lake Platform Built-in 16-Port PoE Secu365 - A cloud-based security SaaS platform Dahua DH-PSDW82442M-A270-D440 6×4MP Multi-Sensor Panoramic + PTZ WizMind Network Camera Climax launches products that adopt SF1 Technology Anviz C2 Series biometric identification and RFID card access control & time attendance devices Dahua DH-IPC-HDW3849H-AS-PV 8 MP Smart Dual Illumination Active Deterrence Fixed-focal Eyeball WizSense Network Camera Hikvision released the evolutionary eDVR Series with eSSD technology Programmable electronic keys can lighten the workload for facility managers Dahua DHI-LPH65/75/86-MT440-C 65/75/86'' UHD Smart Interactive Whiteboard Pelco Sarix® Multi Pro Camera series Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform Hikvision unveils the industry's first "True 8K" NVRs Delta Scientific DSC550 Open Frame Barrier ‹› EDITOR’S PICKS How can security address challenges in the government market? What will be the impact of 'hot desking' on the security marketplace? With fewer employees working in the office, and more of them working from home, it is no longer necessary for each employee to have their ‘own’ desk. Rather, desks may be used by various people at different times, as needed on an ad hoc basis. This arrangement, known as ‘hot desking,’ maximises space efficiency and reduces unneeded office space. We asked this week’s Expert Panel Roundtable: What will be the impact of ‘hot desking’ on the security marketp... What do you accomplish by attending a security trade show? The security trade show season is resuming this fall with the GSX show in the United States and Security Essen in Germany, among other upcoming industry events. The return of trade shows is gathering momentum following the COVID lockdowns and cancellations with plenty more shows coming soon. But how useful is attending industry trade shows? We asked this week’s Expert Panel Roundtable: What do you accomplish by attending a security industry show? What impact are robots and/or drones having on the security industry? Robots have been used in security patrol applications for decades, although developments in artificial intelligence (AI), video analytics, sensors and communications are expanding robot capabilities to new heights. Suddenly, robots are the latest thing in security. In addition, drones have become ubiquitous for numerous applications, including security. We wondered how well the security industry is embracing these newer technologies. We asked this week’s Expert Panel Roundtable: What impac... How are edge devices transforming security? The Internet of Things (IoT) is driving innovation in the security marketplace, just as it is in almost every other market. IoT devices, also known as ‘edge devices’, provide sensing, processing ability, software, and other technologies to connect and exchange data. The most common edge devices in the world of IP security are video cameras, which are becoming more intelligent and capable of processing the data they collect. We asked this week’s Expert Panel Roundtable: How are... Security beat Larry Anderson Editor Milestone partner summit pledges rapid growth and responsible technology Milestone Systems wants to double its revenue in the next five years while also setting a... Managing the cybersecurity risks of operational technology in transportation Operational technology (OT) uses hardware and software to monitor and control physical pro... Vibrant GSX 2022 includes new products, new approaches to security The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example... ROUND TABLE DISCUSSIONS Selling security technology to upper management: Here’s how Obtaining needed funding for security technology improvements often requires going to senior management with a hat in hand. But requests for more security funding from the C-suite may fall on deaf ears unless a security professional can make a compelling case for the needed expenditures. It starts with learning to speak in terms that resonate with upper management and also involves carefully analysing the benefits of security investments to the broader enterprise. We asked this week’s Expert Panel Roundtable: How can the security department effectively “sell” the need for technology to upper management? What’s new in the integration of video and access control? Integration of access control and video has been a reality for decades. The combination of our industry’s dominant technologies provides a one-two punch when it comes to maximising the security benefits of a system. Access control tracks ‘events,’ while video provides visibility into those events. But the benefits of integrating video and access control are far from static. Rather, today’s systems are becoming even more valuable as they incorporate elements such as artificial intelligence (AI) and the cloud. Regarding integration of video and access control, we asked this week’s Expert Panel Roundtable a simple question: What’s new? How can the industry address cybersecurity concerns of cloud systems? Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry address cybersecurity concerns of cloud-based systems? LATEST VIDEOS * Intelligent Residential Solution in Hyde Park – Dahua * Suprema introduces X-Station 2, a versatile intelligent terminal * Access control: 5 minutes with Genea's Mike Maxsenti * Video Management Systems: 5 Minutes With Exacq's Steve Donovan * Frictionless access control: 5 minutes with Rick Focke Tyco Software House * Nedap introduces AEOS authorisation model for better access management * Cybersecurity - Nedap Security Management * What Will You Enable? | NVT Phybridge Explainer Video | IP Made Simple * Hikvision #SeeClear campaign overview launch CASE STUDIES Hikvision provides their LED display solution to enhance visual experience at GEMS Modern Academy In order to turn its auditorium into a multi-purpose venue, and to improve the general visual experience, Dubai's GEMS Modern Academy replaced their legacy projection system with a massive LED wall from Hikvision. The renovated auditorium has become a popular venue for students, staff, and the community. Challenge: Turning the school auditorium into a multi-purpose performance venue. With the numerous approaches to the entertainment available, and with audiences' surging demand for rich, high-quality content display and immersive sound and video. As a result, venues such as showrooms, studios, auditoriums, and lecture halls are dabbling in a host of new technologies and applications to achieve the ‘wow factor’ audiences are looking for. Visual display systems GEMS Modern Academy is one of these venues. Offering Curriculum to children from kindergarten to grade 12, GEMS is one of the top ten schools in Dubai. Its large auditorium holds 500 seats for school events and can be rented out for private events on weekends. Originally, the auditorium had a large projection screen on the stage to display presentations, images, and videos. However, every element in the environment could take away from the image quality, from sunlight coming in through windows to the whiteness of the screen, the distance from the projector, the age of the system, and more. Offering Curriculum to children from kindergarten to grade 12, GEMS is one of the top ten schools in Dubai Ritesh Dhanak, Head of the IT team at GEMS Modern Academy said, "The projector system was not good enough with the ambient lighting. In order to create a better experience in our auditorium, and to pave the way for it to become a community hub, we need to do a complete upgrade to our live audio, stage lighting and visual display systems.” Remarkably refined images To achieve this, Mr. Dhanak worked with Almoe AV Systems, a renowned distributor and solutions provider of professional audio visual & IT products in the UAE. Almoe helped the school to upgrade the auditorium's touch control systems, matrix switchers, stage lighting, and speaker systems. For the most crucial part of the solution – the visuals – they worked with Hikvision to install a new LED display. The solution: A massive Hikvision LED wall and movable LED side-walls. LED displays offer many advantages, including flexibility and modularity. Therefore, the school decided to install a massive LED screen at a width of 12.48 metres, a height of 4.86 metres, and a pixel pitch of 2.5 mm at the centre of the auditorium stage. The massive LED wall is made up of nine pieces of P2.5 Fine Pixel Pitch LED Display Units (DS-D4425FI-CAF). The wall delivers an outstanding colour gamut and contrast ratio to create remarkably refined images. Massive centre screen The two side-screens are used as backdrops, and can be easily removed when they are not needed For the setup, GEMS Modern Academy preferred to make the two sides of the screen removable to ensure flexibility on the stage, as well as to have multiple videos broadcasted on the screens simultaneously. Four smaller side-screens were designed to be 2 metres wide and 5 metres high, with a pixel pitch of 2.9 mm. They were installed on the two sides of the massive centre screen. Each side-wall was composed of four P2.9 Indoor Rental LED Displays (DS-D4429RI-CAF). The two side-screens are used as backdrops, and can be easily removed when they are not needed. The LED walls are managed using Hikvision’s Video Wall Controller (DS-C10S-S11T), which supports up to 3840 x 2160 resolution at 30 Hz from multiple signal sources (VGA, DVI, HDMI, SDI, YpbPr, DP, and HDBaseT). This enables the school faculty to easily manage multiple video and audio inputs and outputs. Excellent visual experience The benefits: Excellent visual experience for audiences makes the auditorium a popular venue for students, staff, and the community. Hikvision's LED wall has vastly improved the visual performance of lectures and events held at the auditorium. With an extremely bright and clear image displayed, the screen loses none of its sharpness, colour, or coherence, even when viewed at an angle or when the auditorium is brightly lit. The LED wall provides high-quality visuals, and is perfect for our large auditorium" "The LED wall provides high-quality visuals, and is perfect for our large auditorium," said Mr. Dhanak, adding "Unlike with the old system, we don't have to dim the lights in the auditorium during lectures, presentations, or live performance, and this allows students to take notes, remain more attentive and, for remote viewers joining via web conferencing, see the auditorium clearly." Ambient lighting conditions In the end, the video wall displays excellent visuals, adapts to ambient lighting conditions, and offers unique flexibility with the removable side-walls. As a result, Hikvision's LED display solution has turned the auditorium into a venue that fits all kinds of events. Since the LED screens have been installed, the school has hosted a large number of events at the auditorium, such as school lectures, stage plays, and musical performance. In addition, the venue has also been rented out for many private events such as public presentations and speeches. Impressively, the venue has also been used to host a TED Talk, one of the most popular lecture platforms in the world. Mr. Dhanak concluded, "With a large multi-purpose auditorium providing such excellent visual experience to the audience, events at GEMS Modern Academy are now on a different level and our auditorium is a much sought after event space in the community." Read more Puerto Rico protects more than 850 public schools with the help of Milestone Systems Software Dahua highlights some of the campus applications of implementing AI technology in schools March Networks provides its Searchlight for Banking software to Danske Bank Popular case studies LiveView Technologies collaborates with local law enforcement, government officials and retaile... Penncrest School District expands ZeroEyes’ A.I.-based gun detection platform deployment to all... Hanwha Techwin provides their Wisenet cameras to enhance security at the Assan Port Commvault simplifies and automates cloud protection for Kubernetes workloads View more FEATURED SECURITY COMPANIES ‹› COMPANY IN PROFILE List your company Increase your online visibility and get found by relevant security professionals. Submit free listing now UPCOMING EVENTS Hypersonic Defense 2022 * 8 - 9 Nov, 2022 * Huntsville, United States of America (USA) Cyber Intelligence Africa 2023 * 17 - 18 Jan, 2023 * Johannesburg, South Africa Cyber Intelligence Europe 2023 * 28 - 1 Feb, 2023 * Bern, Switzerland INTER AIRPORT SOUTHEAST ASIA (IASEA) 2023 * 1 - 3 Mar, 2023 * Singapore, Singapore ‹› List your event for free MOBILE ACCESS DH2i partners with Software AG to achieve near-zero downtime within its own SQL Server Availability Group (AG) Kubernetes cluster * Rubrik releases research study - ‘The State of Data Security’ that reveals one-third of enterprises forced to change leadership due to a cyber-attack * Matrix presents its enterprise grade solutions covering security and telecom at Matrix Partner Connect 2022 - Lucknow * UK Government approves nine Entrust Solutions for G-Cloud 13 framework, including nShield as a Service * Akto secures $4.5M in seed round to build the world’s first plug-n-play API security platform INTERNET OF THINGS (IOT) Capture the whole scene with Dahua Full-color Dual Lens 180° Panoramic Cameras * Rubrik releases research study - ‘The State of Data Security’ that reveals one-third of enterprises forced to change leadership due to a cyber-attack * Matrix presents its enterprise grade solutions covering security and telecom at Matrix Partner Connect 2022 - Lucknow * Ajax Systems enters the Uruguay market with MICROFAL S.A. as the official distributor * UK Government approves nine Entrust Solutions for G-Cloud 13 framework, including nShield as a Service VIDEO ANALYTICS DH2i partners with Software AG to achieve near-zero downtime within its own SQL Server Availability Group (AG) Kubernetes cluster * RealWear launches a hands-free, voice-controlled thermal camera with FLIR Lepton module * Matrix presents its enterprise grade solutions covering security and telecom at Matrix Partner Connect 2022 - Lucknow * Siemens expands Industrial Edge and continues to drive OT and IT integration * Teledyne FLIR launches compact thermal camera for use in hot working zones Follow us Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos Topics Artificial intelligence (AI) Mobile access Counter terror Cyber security Robotics ISC West Thermal imaging Intrusion detection Body worn video cameras About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy See this on SecurityInformed.com SUBSCRIBE TO OUR NEWSLETTER Stay updated with the latest trends and technologies in the security industry Sign Up SourceSecurity.com - Making the world a safer place Copyright © Notting Hill Media Limited 2000 - 2022, all rights reserved Our other sites: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com × SUBSCRIBE TO OUR NEWSLETTER -------------------------------------------------------------------------------- SIGN UP NOW FOR FULL ACCESS TO SOURCESECURITY.COM CONTENT DOWNLOAD DATASHEET DOWNLOAD SOURCESECURITY.COM PRODUCT TECH SPEC × Updated Privacy and Cookie Policy We have updated our Privacy Policy for GDPR. We also use cookies to improve your online experience, Cookie Policy Got it