You are at : Search > Articles Search Results

Articles Search Results

1360 Articles and 368 related Products found for access control

Suprema integrates with Milestone video

Suprema integrates with Milestone video

Editor / Provider: Suprema | Updated: 9/19/2014 | Article type: Security 50

Suprema, one of the leading global providers of technology in biometrics and security, announced the integration of its access control and biometric solutions with Milestone video management software (VMS).

Make it Simple
Milestone and Suprema users can now seamlessly link cameras to access control devices, track access control events in Milestone VMS and display related recorded video. This integration is bringing convenience to the security industry, because operators can quickly react to events such as “Access denied”, “Door left open” and “Door forced” with a unique access to video and access control.

Ready Now
On Milestone's side, the integration supports XProtect Enterprise (including Professional and Express) version as well as XProtect Corporate (including Expert) version. On Suprema's side, both BioStar software Basic Edition and Standard Edition are supported.

Turnkey Solution
“The security industry has specialist in Camera, VMS, Access Control and Biometrics. This said, our customers think security as a single requirement.” said Young S. Moon, Vice President of Suprema “This way, our goal is to provide our customers with the turnkey package they are looking for. And this package includes Cameras, Video Management, Access Control and Biometrics.”

Suprema is the first biometric based solution provider to integrate with the Milestone XProtect Access Control Module. This achievement was possible thanks to the advanced knowledge and expertise of Smartprotect, a Suprema and Milestone partner. Smartprotect has already integrated Suprema and Milestone in early 2013 and this new 2014 integration is bringing convenience to the next step.

"This is advanced security system integration. In case of events such as a fire alarm being activated or a door being left open, the system issues a local audible sound and also displays the alarm on the operator monitor. In addition, issued alarms can trigger a predefined video management of the event, such as camera zoom and video sequence recording. So later, the operator can see the video evidence before/during/after the event. We know who has triggered an event, when and where. And also how was the event managed." explained Francois Malan, Director of Smartprotect.

A quick overview on the current secuiry market trend

A quick overview on the current secuiry market trend

Editor / Provider: Michelle Chu | Updated: 9/17/2014 | Article type: Hot Topics

Messe Frankfurt New Era, the leading integrated media service provider in Asia, today has held a seminar to share professional experience on security trend and industry aspects with providers in Taipei, Taiwan.

As IP system entered into the security market years ago, the entire industry has experienced a series of revolutionary changes. In today's market, in terms of deploying security systems, end users have more options than usual. A quick example, other than IP surveillance systems, end users can choose to update existing analog equipment to ccHDtv, CVI, TVI, or AHD systems in order to reach high-definition recording quality. Suppliers have realized that products make fewer profits now – the market has focused on systems integration, vertical applications, and multiple services.

It is all about intelligent and integration
End users started to set their eyes on intelligent systems and software that can provide added values on their business and management. The ideal of security is no longer merely about monitoring and access control; the ideal of security today suggesting surveillance, access control, and more importantly, making use of these data collected from security devices for managing purpose.

John Shi, the General Manager of Messe Frankfurt New Era, pointed out that future trend of the security industry will be about providing more integrated systems and platforms, such as physical security information management (PSIM), incident management system, and content analysis. The highly integrated platform helps critical verticals to achieve total security awareness for better protection; futhermore, it assists making effective business decision.

Personal device steps inside 
A prosperous potential can be seen in the consuming electronic market. Niche technologies are available for the end users now, for example, biometrics technique and NFC have been used on personal smart device. Intelligent systems can not only be used for professional surveillance, access control, business management, but also smart home and personal purposes.

The suppliers in the traditional security market are facing the same challenge – whether sticking to professional security product line or stepping into consuming product market at the same time.

 

New market strategy for the distributors
In order to survive all the challenges, distributors had to come up with more flexible market strategy. First of all, expanding the product line is a must. End users are looking for one-stop shop that provides all they need conveniently and skips possible technical problems; meanwhile, distributors have to be able to provide total solution to various verticals and projects. This trend indicates that distributor has to be able to supply various products (from the surveillance to storage, for instance), systems integration, and after-sale services that tailored to different cases.

Many leading providers in the market keep expanding local offices in order to provide the most instant services and to have connected relationship to the local market. On the other hand, providers tend to cooperate with more than one manufacturer just to make sure that they can provide solutions to any budgets and considerations.

AMG delivers toll management transmission solution on Indian highway

AMG delivers toll management transmission solution on Indian highway

Editor / Provider: AMG | Updated: 9/17/2014 | Article type: Security 50

AMG, the British manufacturer of CCTV transmission solutions and sophisticated 5 Megapixel cameras, has completed a new sophisticated toll management transmission solution on Solapur Highway, for ITNL in India. ITNL is using the solution to monitor two Toll Plazas with a total of 20 Lanes with 24 Booths – 4 of which have reversible lanes. The project covers a road stretch of 105 kilometres, with 49 kilometres between the Toll Plazas.

According to ITNL, the new system encompasses 132 cameras of which 126 are fixed cameras and 6 are PTZs. Other hardware integrated into the solution includes Lane Controllers, AVC Controllers, and RFID Readers. The system is operated on an Ethernet backbone, with 35 unmanaged AMG switches, and incorporates vehicle detection and enforcement solutions along with access control equipment.

A Toll Plaza typically lies in an environment where adverse conditions are present. This was a decisive factor in ITNL's decision to select the AMG Ethernet switches for the new system. The ruggedness and small form factor, as well as the capability to perform well in adverse climate conditions with extreme heat and dust means that the AMG switches provides significant advantage over other alternatives.

According to ITNL, another advantage is that the AMG transmission solution can interface with equipment from any given third party manufacturer. This facilitates the integration of surveillance and monitoring equipment with the Toll Management Solution. ITNL also commented on the support given by AMG during pre-sales, post-sales and subsequent technical support, deeming the service as ‘excellent'.

Sara Bullock, International Sales Director at AMG Systems, says, “AMG has supplied a large number of transmission solutions for well over 1, 000 km of highways traffic management solutions in India. We're extremely pleased that ITNL decided to use our switches for this new project on the Pune - Solapur Highway.”

Axis provides Albert Einstein Hospital with pioneering security solutions

Axis provides Albert Einstein Hospital with pioneering security solutions

Editor / Provider: AXIS | Updated: 9/15/2014 | Article type: Commercial Markets

Mission
The Albert Einstein Hospital is considered to be the most advanced hospital in the Southern Hemisphere. Its units, mainly in the Sao Paulo Metropolitan Region, employ 12,322 people (including contractors) and receive about 4,000 visitors a day. As part of its network expansion plan, another unit has been opened in Sao Paulo (Perdizes Higienopolis). This new facility also placed increased demands on safety for patients and hospital staff and on safeguarding its assets. The hospital needed stricter controls on who was entering and leaving.

Solution
The hospital administration decided to adopt a more modern method of access control in all its units. This is the first time a hospital in Latin America has implemented a system combining access control, video surveillance, fire prevention and detection, and building automation. Einstein's seven units employ 1,250 Axis cameras to control 450 access points.

Result
The project was delivered under a turn-key contract and went into operation automatically at the end of the installation, launching a new concept of security for the hospital area. These investments follow the trend toward a greater control of the flow of people inside hospitals. One of the most immediate results is the greater sense of security patients and employees feel. Other impacts are being seen over the long term: crime prevention, identification of suspects, and asset preservation

User registration
Users can now only gain access once they are registered. On passing through the turnstile, Axis' high-performance cameras record an image of the user's face with highresolution imaging. After making this complete record upon entering, all user movements through access points, such as doors, turnstiles and gates, are tracked by other Axis cameras. The project includes 450 access points. The control room operator only needs to enter the user's name into the system to get all their entrance images, viewing details about their face and general appearance, and all their subsequent images—where they go, what they are carrying, if they were being accompanied, and what time they passed each checkpoint.

Discreet observation
Since hospitals have specific needs, the project underwent some adaptations. Camera position, for example, is not so apparent as to make people feel under suspicion, but the cameras still need to be visible enough to deter criminal actions. One of the project's design challenges was to carefully balance the need for camera coverage against the need to respect the patients' and visitors' privacy and feelings. In short, the system had to be very well designed so that it did not seem threatening, but was able to dissuade malicious action while maintaining full respect for privacy. “The Axis cameras surprised us in a positive way, because they provided different applications that the old analog cameras didn't offer”, said Dov Smaletz, Albert Einstein security manager. “Because they are 100% IP, they offer the resources for intelligent monitoring.”

The system has both passive and active features, and notifies control room staff when a person or a movement is captured by a camera. The system is 100% PoE (Power over Ethernet) and has roughly 36 terabytes of storage space, enough for two weeks of images, all centralized at the Morumbi unit, where a 100% RAID 5 solution vastly improves data access. Due to the quality of the cameras and ongoing maintenance services, the system ensures nearly 100% availability.

Ready for the future
Axis' integrator partner Servtec developed and installed the project and it is also responsible for future maintenance. This maintenance even can be done with the help of images from the security cameras themselves, an example of the large degree of integration of the project. “The implementation was considered complex because it's the first hospital to oversee all people entering and leaving the complex using turnstiles,” said Alexandre Gushiken, Servtec sales manager.

Full content of Hotel Solutions by 8 leading brands

Full content of Hotel Solutions by 8 leading brands

Editor / Provider: Michelle Chu | Updated: 9/15/2014 | Article type: Hot Topics

The requirements from hospitality vertical are no longer merely focusing on traditional surveillance and access control deployments, despite it is widely recognized that blending in the surrounding decoration is the baseline for hotel security installation. In today's market, a unified solution that effectively assists hotel operation and staff management is much more popular and desirable.

In this article, asmag.com would like to show our readers some of the latest case studies and the must-know considerations provided by several professional global suppliers in the terms of deploying hotel solution in the up-to-date market.

 

 

Full Content of Hotel Feature 2014 
                      - 8 selected case studies and 3 solutions

 

 

 

4 hotel  security highlights provided by 5 leading suppliers

 

 

 

 

 

Cracking down on camera hacks

Cracking down on camera hacks

Editor / Provider: William Pao, a&s International | Updated: 9/17/2014 | Article type: Tech Corner

Recent reports on baby cam hacks raised new concerns over malicious intrusion into networked security devices. The threat is even more imminent for home and small business users who are not as well protected as their enterprise counterparts. Luckily for them, most of today's network camera manufacturers work hard to keep flaws to a minimum and equip their products with various security features.

Two recent incidents where baby cams were attacked by hackers caught the attention of vendors and users alike. One happened in Ohio just in April, when a couple was awoken late at night by strange sounds coming from the baby cam in their toddler's room, only to find that the camera had been taken control over by a hacker. A similar incident happened last year, when a Houston couple heard a man swearing through the baby cam in their infant's room and found out the Wi-Fi-connected device was hacked. In both cases, it was found that the cameras, made by the same vendor, contained security flaws that could easily be exploited.

In fact, hacking can happen to not just cameras but also practically any device on the Internet. Last year, the NAS device of a particular vendor was found to have a vulnerability potentially allowing attackers to execute arbitrary commands on the system. The vendor has since released a patch to solve this problem.

The above incidents illustrate the danger facing users of network cameras and other security devices, which may be targets for malicious intruders. That danger is even more imminent for home and SMB users who, unlike their enterprise counterparts, are not protected by firewalls or advanced perimeter defense software. What they can do to protect themselves has therefore become an urgent issue. Luckily for them, today's network camera makers work hard to minimize flaws and equip their products with various security features, which users should take advantage of to reduce the risk of these devices being hacked. “In general it is not possible to guarantee that computers and network devices do not contain flaws that may be exploited for malicious attack. However, there are measures that can be taken in order to reduce the risk considerably and eliminate the obvious flaws,” said Fred Juhlin, Senior Consultant for Solution Management at Axis Communications, whose Companion series targets home and SMB users.

Access
Unauthorized access to a system can be prevented by a simple yet effective method called password protection. Most network cameras today allow users to create their own usernames and passwords, which can be secured through various means. Zinwell, which makes power line-based home security cameras, has patented a technology that keeps passwords from being sent out to the Internet. “In that case, hackers won't be able to get passwords from the Web,” said Ben Huang, Senior Marketing Supervisor at Zinwell.

Encryption of passwords is another protection method. “The user has the option to let the system remember passwords, and if so the client protects the password with encryption,” said Juhlin.

Once a user accesses the camera, it's a good idea for the device to have multilevel access control based on the user's privilege. For example, a regular user may only view streaming video, while an administrator may access the camera's storage or control the device. In fact, most network cameras today offer this functionality. “This means users can control exactly who can see what in their system, and that their video is safe from any form of third-party manipulation,” Juhlin said.

Encryption
Many IP cams also allow encryption. The videos can be encrypted before being sent over to the network to make sure that unauthorized persons cannot view or tamper with the data. Different encryption technologies are used. One of the most commonly used is SSL/TLS, which encrypts contents with special codes that can be deciphered only by pairs of public and private keys, the latter of which are hidden in the computers of the communicating parties. As private keys can be obtained in a security breach, Bosch, whose Advantage line also targets home and SMB users, makes sure that this will never happen.

“The SSL private key of the device is stored securely on the smart card chip that is directly involved in the SSL connection setup. The private key never leaves the chip and cannot be read out even if the user has complete access to the device,” said Konrad Simon, Product Manager for IP Video at Bosch Security Systems. “This way no access is possible to the private key, even in a hostile approach someone would have achieved to read sensitive data from internal memory.”

Advanced encryption standard (AES) is a protocol that encrypts contents with 128-bit, 192-bit, or 256-bit keys, making encoded messages harder to decipher by untrusted parties. Among camera makers that use AES is Amaryllo, another home security camera maker. It uses 256-bit encryption, at the same time ensuring that video latency is less than 0.5 seconds.

Keeping Flaws to a Minimum
Vendors who are security-minded keep exploitable flaws to a minimum. One way to achieve this is checking third-party software regularly to make sure problematic software isn‘t incorporated into their products. As an example, to implement SSL encryption, many camera makers use OpenSSL, which drew huge attention in the security world in April when it was found it contained a bug called Heartbleed. If left ignored, Heartbleed could lead to the leak of sensitive data, such as usernames and passwords. One camera maker that managed to avert this disaster was Bosch. “We do not use OpenSSL as SSL implementation on our IP cameras, encoders, and decoders. The SSL implementation in our devices is not OpenSSL, nor is it related, so Heartbleed did not affect us at all,” Simon said.

Crowdsourcing, where users in a community share their collective wisdom, is another way to identify flaws and get them fixed. “We monitor discussions in the network community to quickly identify possible vulnerabilities which may impact our products. If a vulnerability is discovered, we will provide patches, firmware, risk analysis, or recommendation to our customers,” Axis's Juhlin said.

User Awareness
While camera vendors may have included a range of security features in their devices, users should also do their part by taking advantage of these features. For example, it's often the case that users simply use the camera maker's default username and password settings, which are easily obtainable. It is also important to check for notices on firmware updates or security patches, which are normally sent via e-mail. Moreover, users may consider isolating their cameras from a local network, since hackers may attack other devices in the network through the camera.

A Two-Way Street
Keeping hackers at bay requires a commitment by both vendors and users. The vendor should build their products with the concept of “security” in mind, while users should familiarize themselves with security features included in cameras and use them whenever possible. It's only through this two-way street can security camera users achieve their primary objective — keeping safe — without being harmed in the process.

4 hotel security highlights provided by 5 leading suppliers

4 hotel security highlights provided by 5 leading suppliers

Editor / Provider: Michelle Chu | Updated: 9/12/2014 | Article type: Hot Topics

Hotel security deployment has become even prominent than ever as a strong growth has seen in the international tourism industry over the past decades. It is projected that in 2030, international tourist arrivals worldwide will reach the gate of 1,800 millions, compared to around 500 millions arrivals back in 1995, according to Statista.

The requirements from hospitality vertical are no longer merely focusing on traditional surveillance and access control deployments, despite it is widely recognized that blending in the surrounding decoration is the baseline for hotel security installation. In today's market, a unified solution that effectively assists hotel operation and staff management is much more popular and desirable.

In this article, asmag.com would like to show our readers some of the latest and the must-know considerations provided by several professional global suppliers in the terms of deploying hotel solution in the up-to-date market:

1. Guests' comfort and safety always come first
In the hospitality security market, guests' requirements have to be the highest consideration. Despite the fact that the most important thing for video surveillance is capturing clear monitoring pictures possibly needed, in a hotel, the foremost function of surveillance systems should be providing guests peace-in-mind feeling.


“For guests, the hotel rooms as well as the public areas of the hotel are used for their purposes and comfort. But for the hotel staff, it is seen as their workplace, which also brings a different aspect of video surveillance into mind,” according to AXIS Communications. “A video surveillance system will contribute to the guest safeguarding since it can help hotel security management to detect incidents and intrusion and act upon it as well as preventing it from happening.”

The luxury boutique hotel, La Suite West, located in London has deployed a discret surveillance system consisting of Axis network cameras that blend in with hotel decor.

2. IP gets an upper hand for its flexibility, remote monitoring, high-quality image, and cost-efficiency
Undeniably, compared to analog system, network systems is more flexible and, generally, cost-efficient when system expansion is in need. “We are definitely seeing a trend of more hotels adopting IP cameras as opposed to analog, due to the ease of integrating IP cameras with current security or control systems, and the cost saving achieved by using less cabling,” according to SONY Electronics Asia Pacific.


Not to mention the high image quality delivered by IP systems which makes it easier to spot details such as suspects' facial features. More importantly, network recording can be forwarded to related authorities conveniently as emergent incident taking place. Network systems also imply that remote monitoring via smart devices has become a real possibility.


Dahua Technology has also provided an alternative option for end user who desires for HD image resolution without immigrating from analog to IP systems. “HDCVI provides full HD and 720p image resolution based on the exsisting cabling, while it's cheaper than IP solution at the same time, so it is very natural for HDCVI to gain the favor from owners who run places with analog surveillance systems,” as Sancha Xia, Overseas Sales at Dahua Technology indicated. Earlier this year, Dahua has provided in-house HDCVI solution to 5-star hotel in Shanghai better securing the hotel and guests.

3. Extreme light and low-light condition make image unrecognizable – WDR & 3D DNR
For the end users in hotel vertical, it is inevitable to deal with surveillance under extreme light or low light condition. The entrance is one of the most important locations to watch over carefully 24/7. However, the surveillance could be challenging at the entrance and areas with varying light condition making people and incident too hard to recognize.


“Wide dynamic range (WDR) technology is a network camera feature that handles a wide range of lighting conditions in a scene…WDR enables objects to be visible in both bright and dark areas by applying various techniques,” as AXIS Communications suggests.


On the other hand, noise reduction is a necessary technique when it comes to hotel surveillance systems adoption. Under low-light or no-light condition, increased noise in the monitoring picture may lead to misjudgment, taking image noise as a true motion. “IP cameras provided by LILIN are equipped with 3D digital noise reduction (3D DNR), and, at the same time, incorporate spatial noise reduction. The entire image processed with 3D DNR technology is clear and noise-free,” according to Merit LILIN. One of the most established chained hotel in Beijing deployed LILIN's video security systems with advanced technologies such as WDR and 3D DNR to reach total situational awareness.

4. Security systems as added value for hospitality – branding and operation management
Due to the increasing terrorism incidents in the past decade, security has become a main concern for the tourists and business trip travelers as many are aware of possible security threats during trips. Therefore, a high-level and stringent security system can often drive hotel revenues and boost occupancy, as Pavel Petrov, Solution Consultant of Business Developement of EMEA at Bosch Security Systems convinced. “Therefore, more and more hotels worldwide do opt for voluntary certification procedures, marketing themselves as safe hotels. On the other hand, a major security breach can have devastating effects on hotel's brand, which is usually its most important asset.”


Moreover, security systems deployed in hotel can be further used as part of the hotel management. For example, not only biometrics access systems can be installed in guest rooms and staff offices, it can also be used for time attendance management. Surveillance monitoring, other than its security purpose, can be used as food and beverage management and staff training material in order to improve hotel services.

 

 

Full Content of Hotel Feature 2014 
                     - 8 selected case studies and 3 solutions

 

 

Tyco Security Products brings CEM access control solutions to Americas

Tyco Security Products brings CEM access control solutions to Americas

Editor / Provider: Tyco | Updated: 9/12/2014 | Article type: Security 50

Tyco Security Products has announced that it is bringing its popular brand of CEM Systems access control products to the Americas.

CEM solutions have been sold primarily in EMEA and Asia for over 25 years. Their first to market innovative hardware and software solutions have been extremely popular with security-conscious airports which use a custom version of CEM's flagship AC2000 access control solution.

"CEM's solutions have been an extremely important part of Tyco Security Products security portfolio in Europe, the Middle East and the Asia Pacific region for many years. Their solutions have been very popular in applications requiring a higher degree of customization, particularly in the enterprise space," said Mike Ryan, President of Tyco Security Products. "We're pleased to be able to expand the reach of these solutions globally as an intrinsic part of our end to end security offering."

One of the noticeable introductions in the CEM portfolio is the emerald intelligent multifunctional IP access terminal that provides more at the door. The first of its kind, emerald is a Touchscreen Reader, Door Controller, VOIP Intercom and System Terminal all in a single box. The innovative touch-screen LCD is the first of its kind to ‘greet' cardholders by illuminating as they approach, providing a user friendly security experience.

Synectics adds Penn premiers to growing North American gaming portfolio

Synectics adds Penn premiers to growing North American gaming portfolio

Editor / Provider: Synectics | Updated: 9/11/2014 | Article type: Security 50

More than 75 gaming properties in North America and Canada now benefit from Synectics' integrated surveillance solutions, with two new Ohio Penn National Gaming casinos the latest additions to the firm's extensive portfolio.

Between them, Hollywood Gaming at Mahoning Valley and Hollywood Gaming at Dayton Raceway will offer almost 2000 video lottery terminals (VLTs), bars, dining, concession stands and entertainment, spread over state-of-the-art facilities spanning 133,000 sq. ft.

Penn National Gaming, one of Synectics' long-standing corporate customers, is capitalizing on advances in IP-based solutions for protecting its newest Hollywood premiers. At both locations, footage from close to 1,000 high definition IP cameras, together with third-party transactional and alarm data, will be integrated within Synectics' Synergy command and control platform to create a unified security and situational awareness solution.

15 Penn Gaming facilities across Indiana, Illinois, Kansas, Maine, Maryland, Mississippi, Missouri, Ohio, West Virginia and Pennsylvania now use Synectics' video management and integration and scalable data storage solutions.

John Katnic, Vice President of Global Gaming at Synectics, said: “Working on new projects with long-standing customers like Penn is particularly rewarding as they constantly push us to improve our products and meet very challenging deadlines. In this highly competitive market, you simply don't have loyal repeat customers if you haven't listened, evolved and grown together. It's always been our strategy and strength to concentrate our attention and resources on a few key clients with unique requirements and to make sure we consistently meet their technology and delivery expectations on time. It's a 'partnership' in every sense of the word.”

Synectics has already completed 11 major upgrades or installs in North America so far in 2014, with 11 more scheduled for completion before the end of the year. Globally, the surveillance solutions business now supports over 100 gaming properties thanks to its unique non-proprietary hardware and software and proven track record in the casino marketplace.

Penn is not the only long-standing customer to expand or overhaul its surveillance capabilities with Synectics this year. John continued: “Synectics has worked with the Ontario Lottery & Gaming (OLG) for nearly 10 years – our technology is installed in two dozen tightly regulated gaming facilities throughout the Province. Caesars Casino Windsor was Synectics' very first North American casino installation and we have just replaced and upgraded their original Synectics recording system with a hybrid system that incorporates the latest IP video technology. It's a mutually beneficial long-term relationship we are very proud of.”

Synectics' success in North America this year has been largely driven by increased interest in more scalable and reliable IP-based security solutions, third party system integrations, and user friendly, full featured software functionality.

John explained: “Today's gaming and hospitality facilities are rapidly introducing high definition cameras that require more robust networks and create exciting opportunities for more sophisticated data integration to video and access control, slots, player systems, etc.. With more cameras and data on the network, our customers are increasingly focused on system security, resiliency and redundancy. In response, Synectics has introduced innovative, multi-layered technology solutions for real time data replication and hardware failover such as Synectics' ‘backfilling', which eliminates the threat of data loss or single point of network failure.

“It's an exciting and demanding time for Synectics as a business and for our sector as a whole; thanks to the ongoing success of our large repeat customer base and Synectics exponential growth here and abroad.”

Synectics will be showcasing its latest solutions for the gaming industry at G2E Booth 5340 in Las Vegas (Sept 30th – Oct 2nd)

NICE partners AMAG Technology to integrate NICE Situator with Symmetry

NICE partners AMAG Technology to integrate NICE Situator with Symmetry

Editor / Provider: NICE Systems | Updated: 9/11/2014 | Article type: Security 50

NICE Systems announced its partnership with AMAG Technology, a G4S subsidiary, for the integration of its NICE Situator PSIM and situation management solution with AMAG Technology's Symmetry™ Access Control system. The joint solution can be used by command and control centers worldwide to improve situational awareness and streamline incident management.

The integration enables bi-directional communication between Symmetry and Situator. This means Situator can receive real-time Symmetry access control alerts and display these events along with access records and images of permitted personnel. Situator's ability to pull in data from a wide range of security systems means that Symmetry access control information can also be correlated with information from other sensors for accurate alerting. Once an alert is received, Situator's automated processes guide operators through response plans to improve management efficiency and minimize risk.

Several utilities companies and ports are already using the integrated solution for day-to-day security operations, allowing them to more easily identify access breaches and to improve collaboration between relevant parties.

Shae Taylor, Symmetry Extended Business Solutions Program Manager, AMAG Technology
“We are thrilled to certify NICE as a partner in our Symmetry Extended Business Solutions Program. NICE's leading expertise in PSIM and situation management complements our advanced access control technology, enabling end users to benefit from an intelligent, unified solution.”

Chris Wooten, Executive Vice President, NICE Security Group
“Security operations are already benefitting from the enhanced situational awareness and streamlined incident management afforded by this integrated solution. This integration is available globally for any customer that wants to leverage Situator and Symmetry together, and users can have confidence in the rigorous testing and certification process that has taken place.”

NICE's security solutions help organizations capture, analyze and leverage big data to anticipate, manage and mitigate security and safety risks, improve operations, and make the world a safer place. The NICE security, intelligence and cyber offerings provide valuable insights that enable enterprises and government agencies to take the best action at the right time by correlating structured and unstructured data from multiple sensors and channels, detecting irregular patterns, and recognizing trends. The solutions have been deployed to help secure a broad range of organizations and events, such as banks, utility companies, airports, seaports, city centers, transportation systems, major tourist attractions, as well as sporting events and diplomatic meetings.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page