www.sourcesecurity.com Open in urlscan Pro
2a02:e980:164::8c  Public Scan

Submitted URL: http://sourcesecurity.com/
Effective URL: https://www.sourcesecurity.com/
Submission: On November 07 via manual from US — Scanned from DE

Form analysis 3 forms found in the DOM

Name: navfrmProductSearchGET /keyword-search.html

<form method="get" action="/keyword-search.html" name="navfrmProductSearch" id="navfrmProductSearch" autocomplete="off">
  <input type="hidden" name="ie" value="UTF-8">
  <input name="cx" type="hidden" value="008496319178451988125:2d_izq15sn4">
  <input type="text" name="q" id="q_nav" class="form-control" aria-describedby="" placeholder="">
</form>

Name: frmProductSearchGET /keyword-search.html

<form method="get" action="/keyword-search.html" name="frmProductSearch" id="frmProductSearch" autocomplete="off">
  <input type="hidden" name="ie" value="UTF-8">
  <input name="cx" type="hidden" value="008496319178451988125:2d_izq15sn4">
  <span>
    <input type="text" name="q" id="q" class="form-control" aria-describedby="" placeholder="">
  </span>
</form>

<form class="white-color">
  <h2 class="white-color">Subscribe to our Newsletter</h2>
  <small>Stay updated with the latest trends and technologies in the security industry</small>
  <div class="form-group mt-4">
    <input type="email" class="form-control" aria-describedby="emailHelp" id="footer_sign_up_email" placeholder="Please enter your Email">
    <a href="javascript:void(0);" class="btn btn-primary btn-lg mt-3 btn-block sign_up_link">Sign Up</a>
  </div>
  <p class="footer_member_logos">
    <a target="_blank" href="https://dma.org.uk/company/notting-hill-media" rel="nofollow"><img loading="lazy" class="pr-3" height="100" src="https://www.sourcesecurity.com/img/dma-2020-white.png" alt="DMA"></a>
  </p>
  <style type="text/css">
    .footer_member_logos:before {
      display: none;
    }
  </style>
  <p> SourceSecurity.com - Making the world a safer place<br> Copyright © Notting Hill Media Limited 2000 - 2022, all rights reserved<br><br> Our other sites: <br>
    <a href="https://www.securityinformed.com" target="_blank" class="link" style="text-transform: none">SecurityInformed.com  | </a>
    <a href="https://www.thebigredguide.com" target="_blank" class="link" style="text-transform: none">TheBigRedGuide.com  | </a>
    <a href="https://www.hvacinformed.com" target="_blank" class="link" style="text-transform: none">HVACInformed.com  | </a>
    <a href="https://www.maritimeinformed.com" target="_blank" class="link" style="text-transform: none">MaritimeInformed.com </a>
  </p>
</form>

Text Content

 * Products
   CCTV
    * CCTV cameras
    * CCTV software
    * IP cameras
    * Digital video recorders (DVRs)
    * Dome cameras
    * Network video recorders (NVRs)
    * IP Dome cameras
    * CCTV camera lenses
   
   Access Control
    * Access control readers
    * Access control software
    * Access control controllers
    * Access control systems & kits
    * Audio, video or keypad entry
    * Electronic locking devices
    * Access control cards/ tags/ fobs
    * Access control system accessories
   
   Intruder Alarms
    * Intruder alarm system control panels & accessories
    * Intruder detectors
    * Intruder warning devices
    * Intruder alarm communicators
    * Intruder alarm accessories
    * Intruder alarm lighting systems
   
   Topics
    * Artificial intelligence (AI)
    * Mobile access
    * Counter terror
    * Cyber security
    * Robotics
    * ISC West
   
   Climax launches products that adopt SF1 Technology
   
   Anviz C2 Series biometric identification and RFID card access control & time
   attendance devices
   
   Dahua DH-IPC-HDW3849H-AS-PV 8 MP Smart Dual Illumination Active Deterrence
   Fixed-focal Eyeball WizSense Network Camera
   
   Hikvision released the evolutionary eDVR Series with eSSD technology

 * Companies
   Companies
    * Manufacturers
    * Distributors
    * Resellers / Dealers / Reps
    * Installers
    * Consultants
    * Systems integrators
    * Events / Training / Services
    * Manned guarding
   
   Companies by Product area
    * CCTV
    * Access control
    * Intruder alarm
    * IP networking products
    * Biometrics
    * Software
    * Digital video recording
    * Intercom systems
   
   
   Topics
    * Artificial intelligence (AI)
    * Mobile access
    * Counter terror
    * Cyber security
    * Robotics
    * ISC West
   
   
 * News
   News
    * Product news
    * Corporate news
    * Case studies
    * Events news
   
   Latest
    * DH2i partners with Software AG to achieve near-zero downtime within its
      own SQL Server Availability Group (AG) Kubernetes cluster
    * Capture the whole scene with Dahua Full-color Dual Lens 180° Panoramic
      Cameras
    * Rubrik releases research study - ‘The State of Data Security’ that reveals
      one-third of enterprises forced to change leadership due to a cyber-attack
    * RealWear launches a hands-free, voice-controlled thermal camera with FLIR
      Lepton module
   
   Topics
    * Artificial intelligence (AI)
    * Mobile access
    * Counter terror
    * Cyber security
    * Robotics
    * ISC West

 * Insights
   Insights
    * Expert commentary
    * Security beat
    * Round table discussions
    * Security bytes
    * Round Table Expert Panel
    * eMagazines
    * Year in Review 2020
    * Year in Review 2019
   
   Featured
    * Selling security technology to upper management: Here’s how
    * Organisations need a new approach to tackle hybrid cloud security
      challenges
    * What’s new in the integration of video and access control?
    * Managing the cybersecurity risks of operational technology in
      transportation
   
   Topics
    * Artificial intelligence (AI)
    * Mobile access
    * Counter terror
    * Cyber security
    * Robotics
    * ISC West

 * Markets
   Markets
    * Airports & Ports
    * Banking & Finance
    * Education
    * Hotels, Leisure & Entertainment
    * Government & Public Services
   
    * Healthcare
    * Remote Monitoring
    * Retail
    * Transportation
    * Industrial & Commercial
   
   Topics
    * Artificial intelligence (AI)
    * Mobile access
    * Counter terror
    * Cyber security
    * Robotics
    * ISC West
   
   Dahua highlights some of the campus applications of implementing AI
   technology in schools
   
   Hikvision provides their LED display solution to enhance visual experience at
   GEMS Modern Academy
   
   Puerto Rico protects more than 850 public schools with the help of Milestone
   Systems Software
   
   March Networks provides its Searchlight for Banking software to Danske Bank

 * Virtual events
   Virtual events
    * Video Surveillance
    * Access Control
    * Video Analytics
    * Security Storage
    * Video Management Systems
    * Integrated Systems
   
   Events
    * International security
    * Regional security
    * Vertical market
    * Technology areas
    * Conferences / seminars
    * Company sponsored
   
   
   Topics
    * Artificial intelligence (AI)
    * Mobile access
    * Counter terror
    * Cyber security
    * Robotics
    * ISC West
   
   Anatomy of a False Alarm
   
   Making physical security a critical pillar of your cybersecurity strategy
   
   Preventing Fan Violence: 7 Tips for Moving from Reactive to Proactive
   Security
   
   Improving real-time visualisation and collaboration in SCADA Operations

 * White papers
   White papers
    * Video Surveillance
    * Access Control
    * Video Analytics
    * Video Compression
    * Security Storage
   
   White papers by company
    * HID Global
    * Azena
    * Nedap Security Management
    * Milestone Systems
    * Eagle Eye Networks
   
   Other Resources
    * eMagazines
    * Videos
   
   Topics
    * Artificial intelligence (AI)
    * Mobile access
    * Counter terror
    * Cyber security
    * Robotics
    * ISC West
   
   Cybersecurity in the physical security world
   
   RFID for GMP/GLP environments
   
   Smart surveillance in the workplace
   
   Improving City Mobility Using Connected Video Technology

About us Advertise
 * Artificial intelligence (AI)
 * Mobile access
 * Counter terror
 * Cyber security
 * Robotics
 * More
   * ISC West
   * Thermal imaging
   * Intrusion detection
   * Body worn video cameras
   * Video analytics
   * Cloud security
   * COVID-19
   * View all

 * 
 * 6
 * 




Selling security technology to upper management: Here’s how

Dahua highlights some of the campus applications of implementing AI technology
in schools

Sponsored

Hikvision provides their LED display solution to enhance visual experience at
GEMS Modern Academy

ASSA ABLOY’s Aperio wireless locks deployed by the University of St Andrews to
meet sustainability goals


FEATURED WHITE PAPERS

Four areas to consider in frictionless access control

Download

The inevitability of The Cloud

Download

How to ramp up perimeter security with license plate reader technology

Download

Solve access control challenges in the healthcare sector

Download

The role of access control in a safe return to the workplace

Download

10 step guide to staying ahead of emerging security threats

Download

2021 Trends in Video Surveillance

Download

Exploring new vertical markets for professional security systems

Download

5 security lessons for navigating COVID-19

Download

Cyber security and high security in a business integrated world

Download

Physical access control in higher education

Download

Boosting on-site safety and security

Download

Optimise your business with analytics and AI

Download

How doorhandles and levers with antimicrobial treatment reduce disease spread

Download

Building a safe ecosystem for visitors post COVID-19

Download

Smart security cameras: excellence in retail

Download

5 reasons to integrate mobile technology into your security solution

Download

How analytics engines mitigate risk, ensure compliance and reduce cost

Download

Wireless security: Cut costs without cutting corners

Download

Beyond security: access control for multi-tenant sites

Download

Reducing the cost of video surveillance system deployment and operation

Download

How plate reader technology increases your perimeter security

Download

3 reasons to migrate to a new access control system

Download

Schooling the market on education security

Download

Nine ways to make your retail security system work harder

Download

Financial institutions require future-ready physical security technologies

Download

H.265 High Efficiency Coding: Video compression for security applications

Download

How to overcome the storage challenges of adopting surveillance AI

Download

Physical security supports a future-proof cyber security strategy

Download

Three reasons for adopting open architecture access control solutions

Download

5 steps to finding the right access control system for you

Download

Why outdated access control systems are a big problem

Download

Five things to consider for AI with video technology

Download

OSDP is the strongest access control for your business

Download

Is your access control as effective as you think?

Download

Cybersecurity in the physical security world

Download

RFID for GMP/GLP environments

Download

Smart surveillance in the workplace

Download

Improving City Mobility Using Connected Video Technology

Download

Public-Private Partnerships On Campus: What You Need To Know

Download

A More Secure Alternative to 125 kHz Proximity Cards

Download

5 ways to strengthen physical security with an integrated system

Download

The critical role of access control in K-12 school security

Download

The benefits of Edge AI + Cloud for security systems

Download

Creating a secure and positive healthcare experience

Download

Video technology: making cities safer & improving lives

Download

11 advantages of a combined system for access control and intrusion

Download

Integrated access control: reap the benefits of connected security

Download

A focus on video surveillance cybersecurity

Download

Three essential reasons to upgrade your access control technology in 2022

Download

Charting the path to safe cities

Download

Assessing the total cost of ownership (TCO) of VMS and NVR systems

Download

Securing unmanned infrastructure at the network edge

Download

Achieving frictionless physical access control with AEOS

Download

The rise of ethical facial recognition

Download

10 top insights in access, cloud and more

Download

Protecting Critical Infrastructure through facial recognition

Download

Top 5 ways to ensure visitor safety and security

Download

Moving to mobile: A guide for businesses switching to mobile access control

Download

11 reasons video surveillance is moving to the cloud

Download

Smart and reliable rail and metro operations

Download

Simplified security for utilities & critical infrastructure

Download

School security moves to the cloud

Download

Cloud-based access control and occupancy management to safeguard workplaces

Download

Monitoring traffic flow: Everywhere, all the time

Download

Delivering smart, secure and healthy retail environments with the cloud

Download

Protecting your data against physical threats

Download

Best practices guide: analogue video to cloud

Download

Delivering a smart, secure and healthy workplace with cloud

Download

Six ways to eliminate costs, risks and disruption to your network

Download

Four areas to consider in frictionless access control

Download

The inevitability of The Cloud

Download

How to ramp up perimeter security with license plate reader technology

Download

Solve access control challenges in the healthcare sector

Download

The role of access control in a safe return to the workplace

Download

10 step guide to staying ahead of emerging security threats

Download

2021 Trends in Video Surveillance

Download

Exploring new vertical markets for professional security systems

Download

5 security lessons for navigating COVID-19

Download

Cyber security and high security in a business integrated world

Download

Physical access control in higher education

Download

Boosting on-site safety and security

Download

Optimise your business with analytics and AI

Download

How doorhandles and levers with antimicrobial treatment reduce disease spread

Download

Building a safe ecosystem for visitors post COVID-19

Download

Smart security cameras: excellence in retail

Download

5 reasons to integrate mobile technology into your security solution

Download

How analytics engines mitigate risk, ensure compliance and reduce cost

Download

Wireless security: Cut costs without cutting corners

Download

Beyond security: access control for multi-tenant sites

Download

Reducing the cost of video surveillance system deployment and operation

Download

How plate reader technology increases your perimeter security

Download

3 reasons to migrate to a new access control system

Download

Schooling the market on education security

Download

Nine ways to make your retail security system work harder

Download

Financial institutions require future-ready physical security technologies

Download

H.265 High Efficiency Coding: Video compression for security applications

Download

How to overcome the storage challenges of adopting surveillance AI

Download

Physical security supports a future-proof cyber security strategy

Download

Three reasons for adopting open architecture access control solutions

Download

5 steps to finding the right access control system for you

Download

Why outdated access control systems are a big problem

Download

Five things to consider for AI with video technology

Download

OSDP is the strongest access control for your business

Download

Is your access control as effective as you think?

Download

Cybersecurity in the physical security world

Download

RFID for GMP/GLP environments

Download

Smart surveillance in the workplace

Download

Improving City Mobility Using Connected Video Technology

Download

Public-Private Partnerships On Campus: What You Need To Know

Download

A More Secure Alternative to 125 kHz Proximity Cards

Download

5 ways to strengthen physical security with an integrated system

Download

The critical role of access control in K-12 school security

Download

The benefits of Edge AI + Cloud for security systems

Download

Creating a secure and positive healthcare experience

Download

Video technology: making cities safer & improving lives

Download

11 advantages of a combined system for access control and intrusion

Download

Integrated access control: reap the benefits of connected security

Download

A focus on video surveillance cybersecurity

Download

Three essential reasons to upgrade your access control technology in 2022

Download

Charting the path to safe cities

Download

Assessing the total cost of ownership (TCO) of VMS and NVR systems

Download

Securing unmanned infrastructure at the network edge

Download

Achieving frictionless physical access control with AEOS

Download

The rise of ethical facial recognition

Download

10 top insights in access, cloud and more

Download

Protecting Critical Infrastructure through facial recognition

Download

Top 5 ways to ensure visitor safety and security

Download

Moving to mobile: A guide for businesses switching to mobile access control

Download

11 reasons video surveillance is moving to the cloud

Download

Smart and reliable rail and metro operations

Download

Simplified security for utilities & critical infrastructure

Download

School security moves to the cloud

Download

Cloud-based access control and occupancy management to safeguard workplaces

Download

Monitoring traffic flow: Everywhere, all the time

Download

Delivering smart, secure and healthy retail environments with the cloud

Download

Protecting your data against physical threats

Download

Best practices guide: analogue video to cloud

Download

Delivering a smart, secure and healthy workplace with cloud

Download

Six ways to eliminate costs, risks and disruption to your network

Download
‹›




MOBILE ACCESS ARTICLES

How to prepare your security for a rapidly changing world


You’re no psychic. You probably don’t have the power of clairvoyance. But guess
what? When it comes to your security, none of that matters. You can still create
future-proof security by properly equipping yourself. Here’s how. Understanding
access control Security is changing faster than ever before. With new threats
inside the workplace and smaller security teams taking on more tasks, IT and
security personnel must automate their processes using new technology. One
difficult aspect, however, is choosing the right technology. By analysing
technological trends and assessing your current and future needs, you can
preemptively find solutions. Ultimately, in the long run, these solutions will
save you time and expense. Ultimately, in the long run, these solutions will
save you time and expense But how do you distinguish a momentary trend from a
long-term solution? Do you really need to pay extra money for that feature, or
will you stop using it in a year? To properly invest in future-proof access
control, IT and security teams must look at three different aspects of
technology: Flexibility, Scalability, and Efficiency. Access control system
Flexibility: Hardware It’s not the sexiest thing to talk about, but hardware is
crucial to any security system. Readers, locks and controllers are the backbone
of any access control system, and choosing the right hardware is essential when
it comes to planning for the future. Broadly speaking, hardware falls into two
categories: proprietary and non-proprietary. For those teams considering a new
installation, choosing between proprietary access control and non-proprietary
access control is a decision that will affect your organisation over the long
term. Long-term unseen expenses Proprietary Hardware Pros: Upfront costs can be
less expensive; One vendor for hardware and software. Cons: Locked into one
vendor; Long-term unseen expenses. Imagine buying a microwave that only cooked
foods produced by the microwave manufacturer Imagine buying a microwave that
only cooked foods produced by the microwave manufacturer. In a booming economy,
the manufacturer produces all sorts of tasty treats—popcorn, lasagna, pies. But
when the economy takes a dip, the manufacturer scales back its production and
announces it will only sell liver and onions. Now maybe you’re a liver and
onions fan, but on the off chance you like variety in your diet, this would be a
problem. Your microwave has been rendered useless and has essentially become a
liver and onions cooking machine. Potential system vulnerabilities Like the
microwave example, proprietary hardware leaves companies at the mercy of the
manufacturer. If the manufacturer goes out of business, the system will cease to
function, and customer support will be non-existent. Consequently, your security
team will likely have to install an entirely new hardware system. Costly, right?
Let’s consider a less dramatic scenario. What if a manufacturer, instead of
closing, decides to scale back its operations? It provides less frequent updates
and fewer new feature releases. Without these updates, your security becomes
more vulnerable and outdated. In the long run, choosing proprietary hardware can
end up costing teams a lot more than they are saving and expose potential system
vulnerabilities. Non-proprietary hardware Pros: Free to switch software vendors;
Long-term system flexibility. Cons: Upfront costs can be more expensive.
Non-proprietary hardware gives teams the power to switch software providers at
any point Where proprietary hardware fails, non-proprietary thrives. The most
important aspect of a non-proprietary system is the flexibility it grants.
Non-proprietary hardware gives teams the power to switch software providers at
any point, without replacing the hardware. In the aforementioned microwave
scenario, the customer was relegated to a life of liver and onions because of
their proprietary microwave. However, had they chosen a non-proprietary
microwave, then they could have eaten any meal. They wouldn’t be limited to the
food options sold by the manufacturer. Non-proprietary hardware also accounts
for much of the current marketplace. If your team currently uses non-proprietary
hardware—Mercury Security, HID, Wavelynx, or STid-- but is considering switching
to a cloud-based provider, then something called a software takeover could be
useful. A software takeover is a process by which a new software provider
replaces a former one, though no new hardware is installed. Scalability: on-prem
or the cloud? Whether working for an enterprise, hospital or school district
there is always potential for expansion. As an organisation grows or shrinks, so
must its access control. At your latest ‘all-hands’ meeting, the CEO announces
that you will be aggressively expanding At your latest ‘all-hands’ meeting, the
CEO announces that you will be aggressively expanding. They want security to be
up and running in three new countries by the end of the quarter. Luckily, you
have just finished migrating from on-premises access control to the cloud. You
handle scaling the operation with relative ease. IT and security teams must
choose between cloud access control and legacy on-premises equipment. The
greatest determination of scalability lies with the server. Cloud-based access
control Pros: Easily scalable; Less regular maintenance; More secure;
Integrations; Centralised storage. Cons: On-going subscription costs; Migrating
from on-premises access control. When asked about the trends shaping the near
future of access control, 38% of respondents said cloud hosting would be an
important feature. Though this was a lower percentage compared to the responses
at the beginning of Covid-19 (50% mentioned cloud), cloud security is poised to
grow by as much as 13.7% each year. Connecting software stacks Here are some
facts about cloud-based access control: Security: In the past, what held the
cloud back were concerns about cyber security. But advances in security,
including 256-bit encryption for data at rest and data in transit, have
significantly improved the cloud. Integrations: Talk to any IT director who has
already made the migration from on-prem to cloud, and they’ll mention
‘integrations.’ The cloud gives administrators the ability to more quickly
connect their software stacks. Some popular integrations include visitor, video,
identity, and notification management. Though integrating on-premises access
control is possible, it takes significantly longer and is more costly than
integrating with the cloud. Remote Access: Since COVID-19, IT and security
professionals have been searching for remote ways to work. However, remotely
connecting to an on-premises access control system often requires a VPN. The
cloud allows teams to work remotely and access any of the buildings in their
portfolio while off site. Physical access control Efficiency: Software Features
Another important aspect of physical access control is its software features
Another important aspect of physical access control is its software features.
While the needs vary from industry to industry, some overlap exists. For
instance, a global dashboard can give oversight across buildings on college
campuses or offices of a national enterprise. A security team in New York can
monitor the access events or provision a new employee in Tokyo. Broadly
speaking, IT and security teams are looking for software that boosts day-to-day
efficiency and is customisable. These features include: Custom Reports-
Spreadsheets or PDFs that give you an aggregated view of access events that have
occurred over a given period. Custom Roles- Administrators the ability to create
an organisational framework by access permissions. Badges- Create branded
physical or digital badges according to permission level. Emergency Add-ons-
Custom door plans and Muster reporting can help in crisis situations. For
example, if there is an active shooter, certain doors can be left open or locked
automatically to prevent the shooter from gaining access to certain areas. Cloud
access control has made it easier to implement new features. Ultimately, the
cloud gives IT and security administrators more power to quickly request and
deploy the features they find most worthwhile. Final thoughts on security With
the rapid technological transformation brought about by cloud and mobile access
control, it’s important that IT and security teams stay ahead of the curve. In
order to decide which system is the right choice for you, it’s important to
evaluate not only your current but also future needs. Creating a checklist of
the most important features and deciding whether to host all the server yourself
are two important steps to pinpointing the perfect access control system. For
more information, ask access control providers for a free demo.

HID to showcase their TSL RAIN RFID modules at Wireless IoT Tomorrow 2022


HID, the pioneer in trusted identity solutions, announces its first RAIN RFID
reader modules featuring the company’s TSL technology and the innovative STORM
command protocol that simplifies embedded software integration. The modules
enable developers to create customised reader hardware designs that take full
advantage of the superior performance of Impinj E710 and E910 reader chips and
their ability to support next-generation RAIN tags. Handheld and wearable
devices The HID TSL RAIN RFID reader module family includes three options for
designing compact fixed readers, as well as readers used in mobile and
battery-operated handheld and wearable devices. Applications include asset
tracking/inventory management, automation, safety and compliance, personnel
tracking, and authentication, in industries ranging from retail, healthcare, and
hospitality to transport and logistics and warehouse and distribution. The
family includes: TSL 3117 with a single antenna port, based on the Impinj E710
reader chip. TSL 3417 with four antenna ports, based on the Impinj E710 reader
chip. TSL 3419 with four antenna ports, based on the Impinj E910 chip for
Enterprise-grade fixed readers. UHF RFID reader modules There has been a gap in
the market for reliable, high-performance UHF RFID reader modules" “There has
been a gap in the market for reliable, high-performance UHF RFID reader modules
that mid-volume manufacturers can integrate efficiently into their products,”
said Dr. David Evans, Vice President Technology Solutions Business Unit. He
adds, “We are meeting this need with a family of modules that build on over two
decades of mobile RFID hardware experience to extract more performance into a
smaller form factor than ever before. As an Impinj Gold partner and member of
the Impinj Connected programme, we are incorporating the best-performing RAIN
RFID reader chips on the market to supply class-leading performance in a ‘ready
to go’ package.” Previous generation chipsets HID’s TSL reader modules exceed
the read range, reader sensitivity, and tag throughput of alternative modules in
a compact, easy-to-integrate form factor. The key features of these modules are
a result of a combination of TSL RFID design experience and Impinj’s reader chip
and include: High sensitivity (>-90dbm). Fast tag acquisition rate (>1300
tags/sec). Up to 50% lower power consumption than previous generation chipsets.
Broad compatibility with latest generation UHF sensor chips which include the
measurement of temperature, humidity, strain, acceleration, and more. TSL reader
modules These new HID TSL reader modules reduce reader design complexity,
time-to-market, and development costs through its STORM protocol that enables
complex tag operations to be executed using simple, but powerful pre-configured
command sets. HID provides extensive support for developers using a wide range
of host devices and development environments including a dedicated developer kit
for the new modules. HID will be exhibiting its new TSL RAIN RFID modules at the
Wireless IoT Tomorrow show from October 19-20, 2022, in Booth #20 at the
Rhein-Main Congress Centre in Wiesbaden, Germany.

DH2i partners with Software AG to achieve near-zero downtime within its own SQL
Server Availability Group (AG) Kubernetes cluster


DH2i® the provider of always-secure and always-on IT infrastructure solutions,
and Software AG Government Solutions, announces they have entered into a
partnership. A trusted provider of FedRAMP solutions, Software AG Government
Solutions, will integrate DH2i’s DxEnterprise (DxE) Smart High Availability
Clustering software into its FedRAMP authorised cloud to achieve near-zero
downtime within its own SQL Server Availability Group (AG) Kubernetes cluster.
Software AG Government Solutions will offer the combined solution to its U.S.
federal, state, and local government customers, as well as its aerospace and
defence industry clients. Modern cloud technologies The Federal Risk and
Authorisation Management Program (FedRAMP) is a government-wide program that
provides a standardised approach to security assessment, authorisation, and
continuous monitoring for cloud products and services. FedRAMP empowers agencies
to use modern cloud technologies, with emphasis on security and protection of
federal information, and helps accelerate the adoption of secure, cloud
solutions. Using DxEnterprise to manage our SQL Server AGs in Kubernetes enables
us to deliver zero downtime" “Container use is growing exponentially for digital
transformation projects in the government, aerospace, and defence industries –
particularly the use of stateful containers for databases such as Microsoft SQL
Server. This growing stateful database container use is also generating a hard
production deployment requirement for database-level high availability (HA) in
Kubernetes,” said Jeff Estes, Senior Director, Systems Engineering, Software AG
Government Solutions. “Using DxEnterprise to manage our SQL Server AGs in
Kubernetes enables us to deliver zero downtime for our customers running our
Alfabet software.” Critical IT challenges DxEnterprise enables an enterprise’s
true digital transformation (DX) by speeding the adoption of highly available
stateful containers and providing SQL Server Availability Group (AG) support for
SQL Server containers in Kubernetes clusters. “Software AG Government Solutions
is an organisation known across all branches of Government for delivering only
the most trusted and real-world proven technologies backed by expertise that
enables customers to virtually eliminate investment risk while solving complex
and critical IT challenges. It is therefore an enviable seal of approval for
them to deploy DxEnterprise software as part of their FedRAMP-certified
solutions,” said Don Boxley, CEO and Co-Founder, DH2i. Multi-cloud environments
DxEnterprise smart high availability clustering software features & benefits: HA
for SQL Server Availability Groups in Kubernetes—with automatic failover, an
industry first. This enables customers to deploy stateful containers to create
new and innovative applications. Near-zero recovery time objective (RTO)
failover for instances and containers at the database-level– enables operations
to deliver better products and services more efficiently and resiliently at a
lower cost to the business. Distributed Kubernetes AG clusters across
availability zones/regions, hybrid cloud and multi-cloud environments—with
built-in secure multi-subnet Zero Trust Network Access (ZTNA) tunnel technology.
This enables customers to rapidly adapt to changes in market conditions and
consumer preferences. Intelligent health & performance QoS monitoring with
alerts for SLA assurance and simplified system management. Mix and match support
for Windows and Linux; bare-metal, virtual, cloud servers – maximises IT budget
ROI. Secure cloud environments Deploying SQL Server AGs in Kubernetes remains a
hurdle that organisations struggle to overcome For those attending the upcoming
2022 PASS Data Community Summit, taking place at the Seattle Convention Centre,
November 15-18, please join Jeff Estes, Senior Director, Systems Engineering,
Software AG Government Solutions for his presentation: Deploying SQL Server AGs
in EKS for Secure Federal Government Cloud Services - November 16, 6:45 am -
7:55 am; Room 608-609. The use of containers in the Federal Government is
exploding as it looks for better ways to improve the performance, scalability,
and portability of their applications in secure cloud environments. Despite the
promise of containers, deploying SQL Server AGs in Kubernetes remains a hurdle
that organisations struggle to overcome. Join Jeff Estes of Software AG
Government Solutions for breakfast to learn how he used DH2i’s DxEnterprise to
jump the hurdle and deploy highly available SQL Server Availability Groups (AGs)
in EKS certified for FedRAMP.

Rubrik releases research study - ‘The State of Data Security’ that reveals
one-third of enterprises forced to change leadership due to a cyber-attack


IT and security leaders must address, on average, one cyber-attack per week
according to a new study released titled, ‘The State of Data Security’ by Rubrik
Zero Labs (Rubrik, Inc.). Rubrik, the zero trust data security company, gathered
insights from more than 1,600 security and IT leaders, including CISOs, CIOs,
VPs and Directors across 10 countries. The findings exposed rising security
risks for organisations, resulting in widespread damage to organisations and
their IT and security teams. Key findings of ‘The State of Data Security’
research study by Rubrik Zero Labs include: Cyber-attacks continue to surge in
volume and impact: Nearly every leader surveyed experienced a cyber-attack over
the past year, and on average faced 47 attacks in that timeframe — or nearly one
cyber-attack per week. 52% reported a data breach and 51% reported facing a
ransomware attack in the past year. Only 5% of organisations were able to return
to business continuity or normal operations within one hour of discovering a
cyber-attack. 48% of IT and security leaders reported to be concerned about data
breaches (25%) or ransomware events (23%), as the top threat for the year ahead.
Organisations are losing confidence in their ability to withstand attacks: 92%
of respondents are concerned they will be unable to maintain business
continuity, if they experience a cyber-attack. One-third believed their board
has little to no confidence in their organisation’s ability to recover critical
data and business applications, after a cyber-attack. 76% of survey respondents
reported their organisation is likely to consider paying a ransom, following a
cyber-attack. 11% of IT and security leaders said they had not adequately
addressed vulnerabilities from previous cyber events. The weight of cybercrime
is taking a toll: 96% of respondents reported experiencing significant emotional
or psychological consequences, following a cyber-attack, ranging from worries
over job security (43%) to loss of trust among colleagues (37%). About one-third
of leaders surveyed said their IT and SecOps teams were either somewhat or not
at all aligned, when it came to defending their organisations. Cyber-attacks
cause major impacts against global organisations It’s clear from this research
that cyber-attacks continue to produce large impacts against global
organisations" “It’s clear from this research that cyber-attacks continue to
produce large impacts against global organisations and the effects are
compounding,” said Steven Stone, the Head of Rubrik Zero Labs, adding “In
addition to this rise in frequency and impacts of cyber events, the individuals
on the front lines are taking a psychological hit on their well-being. Trust is
down and anxiety is up.” Steven Stone continues, “Without a proactive and
reliable approach to defend against modern cyber threats and strengthen
confidence in an organisation’s ability to resolve these cyber events, these
impacts - both human and organisational - will continue to worsen and feed each
other. The good news is we’re also seeing pragmatic, proven strategies in this
same space paying off and we can build off these approaches.” Need to enhance
cyber security “We often overlook the psychological dimension of cyber-attacks
and the chaos that tends to follow after discovering an incident,” said Chris
Krebs, the Former Director of CISA and Founding Partner of the Krebs Stamos
Group LLC, adding “The bad guys sure have figured it out, though, with criminals
and state actors alike trying to generate emotional responses when they attack,
as evidenced by the increase in criminal extortion efforts and hack and leak
campaigns.” Chris Krebs continues, “In the end, IT and security leaders alike
tend to take the blame for these cyber-attacks. One of the most effective
techniques I’ve seen to prepare for these types of attacks is to accept you’re
going to have a bad day at some point, and your job is to ensure that it doesn’t
become a ‘worse day’. This is why we need defenders across the spectrum to come
together - sharing best practices, learnings after attacks, simulations,
frameworks - so that we’re collectively strengthening our defenses and
minimising the psychological impact brought on by an attack.” ‘The State of Data
Security’ research study ‘The State of Data Security’ research study comes from
Rubrik Zero Labs, the company’s new cyber security research unit formed to
analyse the global threat landscape, report on emerging data security issues,
and give organisations research-backed insights and best practices, in order to
secure their data against increasing cyber events.


SEARCH FOR PRODUCTS

Search from our vast range of products (37,635)


CCTV

Access Control

Intruder Alarms


FEATURED PRODUCTS

Nexcom NViS 1482

DoorKing's ProxPlus™ Card Readers

Dahua DHI-LCH65/75/86-MC410-B 65/75/86'' UHD Smart Interactive Whiteboard

Doorking 1620 Surface Mount Lane Barrier

Anviz New Smart Surveillance Management Platform

Dahua IPC-PFW8840-A180 4×2MP WizMind Multi-Sensor Panoramic Network IR Bullet
Camera

Dahua ARD1731-W2 Wireless PIR-Camera

Nexcom NViS 14162 Desktop SoC NVR with Intel® Elkhart Lake Platform Built-in
16-Port PoE

Secu365 - A cloud-based security SaaS platform

Dahua DH-PSDW82442M-A270-D440 6×4MP Multi-Sensor Panoramic + PTZ WizMind Network
Camera

Climax launches products that adopt SF1 Technology

Anviz C2 Series biometric identification and RFID card access control & time
attendance devices

Dahua DH-IPC-HDW3849H-AS-PV 8 MP Smart Dual Illumination Active Deterrence
Fixed-focal Eyeball WizSense Network Camera

Hikvision released the evolutionary eDVR Series with eSSD technology

Programmable electronic keys can lighten the workload for facility managers

Dahua DHI-LPH65/75/86-MT440-C 65/75/86'' UHD Smart Interactive Whiteboard

Pelco Sarix® Multi Pro Camera series

Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform

Hikvision unveils the industry's first "True 8K" NVRs

Delta Scientific DSC550 Open Frame Barrier

Nexcom NViS 1482

DoorKing's ProxPlus™ Card Readers

Dahua DHI-LCH65/75/86-MC410-B 65/75/86'' UHD Smart Interactive Whiteboard

Doorking 1620 Surface Mount Lane Barrier

Anviz New Smart Surveillance Management Platform

Dahua IPC-PFW8840-A180 4×2MP WizMind Multi-Sensor Panoramic Network IR Bullet
Camera

Dahua ARD1731-W2 Wireless PIR-Camera

Nexcom NViS 14162 Desktop SoC NVR with Intel® Elkhart Lake Platform Built-in
16-Port PoE

Secu365 - A cloud-based security SaaS platform

Dahua DH-PSDW82442M-A270-D440 6×4MP Multi-Sensor Panoramic + PTZ WizMind Network
Camera

Climax launches products that adopt SF1 Technology

Anviz C2 Series biometric identification and RFID card access control & time
attendance devices

Dahua DH-IPC-HDW3849H-AS-PV 8 MP Smart Dual Illumination Active Deterrence
Fixed-focal Eyeball WizSense Network Camera

Hikvision released the evolutionary eDVR Series with eSSD technology

Programmable electronic keys can lighten the workload for facility managers

Dahua DHI-LPH65/75/86-MT440-C 65/75/86'' UHD Smart Interactive Whiteboard

Pelco Sarix® Multi Pro Camera series

Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform

Hikvision unveils the industry's first "True 8K" NVRs

Delta Scientific DSC550 Open Frame Barrier

‹›




EDITOR’S PICKS

How can security address challenges in the government market?

What will be the impact of 'hot desking' on the security marketplace?


With fewer employees working in the office, and more of them working from home,
it is no longer necessary for each employee to have their ‘own’ desk. Rather,
desks may be used by various people at different times, as needed on an ad hoc
basis. This arrangement, known as ‘hot desking,’ maximises space efficiency and
reduces unneeded office space. We asked this week’s Expert Panel Roundtable:
What will be the impact of ‘hot desking’ on the security marketp...

What do you accomplish by attending a security trade show?


The security trade show season is resuming this fall with the GSX show in the
United States and Security Essen in Germany, among other upcoming industry
events. The return of trade shows is gathering momentum following the COVID
lockdowns and cancellations with plenty more shows coming soon. But how useful
is attending industry trade shows? We asked this week’s Expert Panel Roundtable:
What do you accomplish by attending a security industry show?

What impact are robots and/or drones having on the security industry?


Robots have been used in security patrol applications for decades, although
developments in artificial intelligence (AI), video analytics, sensors and
communications are expanding robot capabilities to new heights. Suddenly, robots
are the latest thing in security. In addition, drones have become ubiquitous for
numerous applications, including security. We wondered how well the security
industry is embracing these newer technologies. We asked this week’s Expert
Panel Roundtable: What impac...

How are edge devices transforming security?


The Internet of Things (IoT) is driving innovation in the security marketplace,
just as it is in almost every other market. IoT devices, also known as ‘edge
devices’, provide sensing, processing ability, software, and other technologies
to connect and exchange data. The most common edge devices in the world of IP
security are video cameras, which are becoming more intelligent and capable of
processing the data they collect. We asked this week’s Expert Panel Roundtable:
How are...

Security beat
Larry Anderson

Editor

Milestone partner summit pledges rapid growth and responsible technology

Milestone Systems wants to double its revenue in the next five years while also
setting a...

Managing the cybersecurity risks of operational technology in transportation

Operational technology (OT) uses hardware and software to monitor and control
physical pro...

Vibrant GSX 2022 includes new products, new approaches to security

The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the
latest example...


ROUND TABLE DISCUSSIONS

Selling security technology to upper management: Here’s how


Obtaining needed funding for security technology improvements often requires
going to senior management with a hat in hand. But requests for more security
funding from the C-suite may fall on deaf ears unless a security professional
can make a compelling case for the needed expenditures. It starts with learning
to speak in terms that resonate with upper management and also involves
carefully analysing the benefits of security investments to the broader
enterprise. We asked this week’s Expert Panel Roundtable: How can the security
department effectively “sell” the need for technology to upper management?

What’s new in the integration of video and access control?


Integration of access control and video has been a reality for decades. The
combination of our industry’s dominant technologies provides a one-two punch
when it comes to maximising the security benefits of a system. Access control
tracks ‘events,’ while video provides visibility into those events. But the
benefits of integrating video and access control are far from static. Rather,
today’s systems are becoming even more valuable as they incorporate elements
such as artificial intelligence (AI) and the cloud. Regarding integration of
video and access control, we asked this week’s Expert Panel Roundtable a simple
question: What’s new?

How can the industry address cybersecurity concerns of cloud systems?


Cloud systems faced early resistance from physical security end users concerned
about a perceived lack of control of data that ‘leaves’ their premises. More
recently, mass adoption of cloud systems reflects widespread confidence in these
systems to protect the data they handle. However, there are physical security
professionals who remain concerned about cloud-based systems from the
perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How
can the industry address cybersecurity concerns of cloud-based systems?


LATEST VIDEOS

 * Intelligent Residential Solution in Hyde Park – Dahua
 * Suprema introduces X-Station 2, a versatile intelligent terminal
 * Access control: 5 minutes with Genea's Mike Maxsenti
 * Video Management Systems: 5 Minutes With Exacq's Steve Donovan
 * Frictionless access control: 5 minutes with Rick Focke Tyco Software House
 * Nedap introduces AEOS authorisation model for better access management
 * Cybersecurity - Nedap Security Management
 * What Will You Enable? | NVT Phybridge Explainer Video | IP Made Simple
 * Hikvision #SeeClear campaign overview launch


CASE STUDIES

Hikvision provides their LED display solution to enhance visual experience at
GEMS Modern Academy


In order to turn its auditorium into a multi-purpose venue, and to improve the
general visual experience, Dubai's GEMS Modern Academy replaced their legacy
projection system with a massive LED wall from Hikvision. The renovated
auditorium has become a popular venue for students, staff, and the community.
Challenge: Turning the school auditorium into a multi-purpose performance venue.
With the numerous approaches to the entertainment available, and with audiences'
surging demand for rich, high-quality content display and immersive sound and
video. As a result, venues such as showrooms, studios, auditoriums, and lecture
halls are dabbling in a host of new technologies and applications to achieve the
‘wow factor’ audiences are looking for. Visual display systems GEMS Modern
Academy is one of these venues. Offering Curriculum to children from
kindergarten to grade 12, GEMS is one of the top ten schools in Dubai. Its large
auditorium holds 500 seats for school events and can be rented out for private
events on weekends. Originally, the auditorium had a large projection screen on
the stage to display presentations, images, and videos. However, every element
in the environment could take away from the image quality, from sunlight coming
in through windows to the whiteness of the screen, the distance from the
projector, the age of the system, and more. Offering Curriculum to children from
kindergarten to grade 12, GEMS is one of the top ten schools in Dubai Ritesh
Dhanak, Head of the IT team at GEMS Modern Academy said, "The projector system
was not good enough with the ambient lighting. In order to create a better
experience in our auditorium, and to pave the way for it to become a community
hub, we need to do a complete upgrade to our live audio, stage lighting and
visual display systems.” Remarkably refined images To achieve this, Mr. Dhanak
worked with Almoe AV Systems, a renowned distributor and solutions provider of
professional audio visual & IT products in the UAE. Almoe helped the school to
upgrade the auditorium's touch control systems, matrix switchers, stage
lighting, and speaker systems. For the most crucial part of the solution – the
visuals – they worked with Hikvision to install a new LED display. The solution:
A massive Hikvision LED wall and movable LED side-walls. LED displays offer many
advantages, including flexibility and modularity. Therefore, the school decided
to install a massive LED screen at a width of 12.48 metres, a height of 4.86
metres, and a pixel pitch of 2.5 mm at the centre of the auditorium stage. The
massive LED wall is made up of nine pieces of P2.5 Fine Pixel Pitch LED Display
Units (DS-D4425FI-CAF). The wall delivers an outstanding colour gamut and
contrast ratio to create remarkably refined images. Massive centre screen The
two side-screens are used as backdrops, and can be easily removed when they are
not needed For the setup, GEMS Modern Academy preferred to make the two sides of
the screen removable to ensure flexibility on the stage, as well as to have
multiple videos broadcasted on the screens simultaneously. Four smaller
side-screens were designed to be 2 metres wide and 5 metres high, with a pixel
pitch of 2.9 mm. They were installed on the two sides of the massive centre
screen. Each side-wall was composed of four P2.9 Indoor Rental LED Displays
(DS-D4429RI-CAF). The two side-screens are used as backdrops, and can be easily
removed when they are not needed. The LED walls are managed using Hikvision’s
Video Wall Controller (DS-C10S-S11T), which supports up to 3840 x 2160
resolution at 30 Hz from multiple signal sources (VGA, DVI, HDMI, SDI, YpbPr,
DP, and HDBaseT). This enables the school faculty to easily manage multiple
video and audio inputs and outputs. Excellent visual experience The benefits:
Excellent visual experience for audiences makes the auditorium a popular venue
for students, staff, and the community. Hikvision's LED wall has vastly improved
the visual performance of lectures and events held at the auditorium. With an
extremely bright and clear image displayed, the screen loses none of its
sharpness, colour, or coherence, even when viewed at an angle or when the
auditorium is brightly lit. The LED wall provides high-quality visuals, and is
perfect for our large auditorium" "The LED wall provides high-quality visuals,
and is perfect for our large auditorium," said Mr. Dhanak, adding "Unlike with
the old system, we don't have to dim the lights in the auditorium during
lectures, presentations, or live performance, and this allows students to take
notes, remain more attentive and, for remote viewers joining via web
conferencing, see the auditorium clearly." Ambient lighting conditions In the
end, the video wall displays excellent visuals, adapts to ambient lighting
conditions, and offers unique flexibility with the removable side-walls. As a
result, Hikvision's LED display solution has turned the auditorium into a venue
that fits all kinds of events. Since the LED screens have been installed, the
school has hosted a large number of events at the auditorium, such as school
lectures, stage plays, and musical performance. In addition, the venue has also
been rented out for many private events such as public presentations and
speeches. Impressively, the venue has also been used to host a TED Talk, one of
the most popular lecture platforms in the world. Mr. Dhanak concluded, "With a
large multi-purpose auditorium providing such excellent visual experience to the
audience, events at GEMS Modern Academy are now on a different level and our
auditorium is a much sought after event space in the community."

Read more

Puerto Rico protects more than 850 public schools with the help of Milestone
Systems Software

Dahua highlights some of the campus applications of implementing AI technology
in schools

March Networks provides its Searchlight for Banking software to Danske Bank

Popular case studies
LiveView Technologies collaborates with local law enforcement, government
officials and retaile...
Penncrest School District expands ZeroEyes’ A.I.-based gun detection platform
deployment to all...
Hanwha Techwin provides their Wisenet cameras to enhance security at the Assan
Port
Commvault simplifies and automates cloud protection for Kubernetes workloads
View more


FEATURED SECURITY COMPANIES

‹›




COMPANY IN PROFILE

List your company

Increase your online visibility and get found by relevant security
professionals.

Submit free listing now


UPCOMING EVENTS

Hypersonic Defense 2022

 * 8 - 9 Nov, 2022
 * Huntsville, United States of America (USA)

Cyber Intelligence Africa 2023

 * 17 - 18 Jan, 2023
 * Johannesburg, South Africa

Cyber Intelligence Europe 2023

 * 28 - 1 Feb, 2023
 * Bern, Switzerland

INTER AIRPORT SOUTHEAST ASIA (IASEA) 2023

 * 1 - 3 Mar, 2023
 * Singapore, Singapore

‹›

List your event for free


MOBILE ACCESS

DH2i partners with Software AG to achieve near-zero downtime within its own SQL
Server Availability Group (AG) Kubernetes cluster

 * Rubrik releases research study - ‘The State of Data Security’ that reveals
   one-third of enterprises forced to change leadership due to a cyber-attack
 * Matrix presents its enterprise grade solutions covering security and telecom
   at Matrix Partner Connect 2022 - Lucknow
 * UK Government approves nine Entrust Solutions for G-Cloud 13 framework,
   including nShield as a Service
 * Akto secures $4.5M in seed round to build the world’s first plug-n-play API
   security platform


INTERNET OF THINGS (IOT)

Capture the whole scene with Dahua Full-color Dual Lens 180° Panoramic Cameras

 * Rubrik releases research study - ‘The State of Data Security’ that reveals
   one-third of enterprises forced to change leadership due to a cyber-attack
 * Matrix presents its enterprise grade solutions covering security and telecom
   at Matrix Partner Connect 2022 - Lucknow
 * Ajax Systems enters the Uruguay market with MICROFAL S.A. as the official
   distributor
 * UK Government approves nine Entrust Solutions for G-Cloud 13 framework,
   including nShield as a Service


VIDEO ANALYTICS

DH2i partners with Software AG to achieve near-zero downtime within its own SQL
Server Availability Group (AG) Kubernetes cluster

 * RealWear launches a hands-free, voice-controlled thermal camera with FLIR
   Lepton module
 * Matrix presents its enterprise grade solutions covering security and telecom
   at Matrix Partner Connect 2022 - Lucknow
 * Siemens expands Industrial Edge and continues to drive OT and IT integration
 * Teledyne FLIR launches compact thermal camera for use in hot working zones

Follow us


Sections Products CCTV Access Control Intruder Alarms Companies News Insights
Case studies Markets Virtual events Events White papers Videos
Topics Artificial intelligence (AI) Mobile access Counter terror Cyber security
Robotics ISC West Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs
eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com


SUBSCRIBE TO OUR NEWSLETTER

Stay updated with the latest trends and technologies in the security industry
Sign Up



SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2022, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com |
MaritimeInformed.com

×

SUBSCRIBE TO OUR NEWSLETTER

--------------------------------------------------------------------------------



SIGN UP NOW FOR FULL ACCESS TO SOURCESECURITY.COM CONTENT

DOWNLOAD DATASHEET

DOWNLOAD SOURCESECURITY.COM PRODUCT TECH SPEC

×

Updated Privacy and Cookie Policy
We have updated our Privacy Policy for GDPR.
We also use cookies to improve your online experience, Cookie Policy Got it