cloud storage

Turn your employees into human security sensors: Qognify launches Qognify Extend

situational awareness Qognify has launched a range of integrated mobile solutions with which organisations can enhance situational awareness by harnessing field resources and responders. Cloud-based and powered by CloudScann, Qognify Extend effectively extends the reach, coverage and effectiveness of the control room by turning personnel and their smartphones into human sensors. Qognify Extend integrates with Qognify Situator, an open platform, situation management solution, and VisionHub, Qognify s video management system.

It also works as a standalone solution. Qognify Extend triggers incidents automatically in Situator, including textual, visual and geographic information captured by a smartphone. Features Advanced GIS capabilities display map location Video feed from surveillance cameras in area will pop-up and an adaptive response plan , based on organisation s best practices, guides operator actions Connectivity to VisionHub and Qognify s video analytics suite enhances automatic information analysis and takes effective action eg through apprehension of a suspect through Suspect Search. Qognify Extend modules SeeItSendIt: Field personnel can report into control room with their smartphones Live Video Broadcast: Personnel can broadcast live video directly to control room Dispatch : provides operators with simple Computer Aided Dispatch (CAD) functionality, including locating closest guard, suggesting best route to the incident, sending notifications and comments to guards mobile phones. Personal Safety: Personal security features include monitoring an individual s progress along a route, immediate report of distress situations via a panic button, and raising an alert for any failure to arrive safely Qognify VICC (Visual Intelligence Command Center) a desktop application that collects and aggregates information from various mobile applications, presenting it on a map Qognify and CloudScann say We re proud to partner with Qognify, the leader in Situation Management, said Dan Kerning, CEO of CloudScann, a specialist in crowdsourcing, human intelligence and data mining for the enterprise market. . extending to the field is firstly about collecting invaluable information, yet the trick is establishing the link to the control room, and providing a new layer of data and intelligence, allowing operators to act faster to resolve them. Says Moti Shabtai, CEO and president of Qognify: The ubiquitous nature of smartphones together with their range of capabilities, makes them an ideal tool to leverage for improving security, safety and operations. Bringing these into Situator and VisionHub is a no-brainer, as it s the Qognify vision is to provide as many sources of information as possible- smartly. With Qognify Extend, organisations can literally extend coverage, turning personnel and their mobile phones into smart sensors.

Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

Dell EMC Q&A: open platforms, body-worn cameras and end-to-end security solutions

Part of the group most famous for manufacturing desktop PCs, Dell EMC specialises in hybrid cloud and big-data solutions, built on converged infrastructure, servers, storage and cybersecurity technologies for enterprise customers. SecuritySolutionsWatch.com spoke to the brand s recently appointed general manager for surveillance and security, Ken Mills. We are delighted to provide an excerpt below.

Ken Mills, Dell EMC SecuritySolutionsWatch.com: Thank you for joining us again today Ken at this momentous time in the history of Dell EMC. Before drilling down a bit into all that s new: congratulations on your appointment as general manager for surveillance and security! Please give us an overview of the Dell EMC surveillance solutions portfolio. Ken Mills: Dell EMC is focused on delivering the best-in-class solutions for the surveillance market in networking, compute, storage, virtualisation, security, client and cloud. We are also focused on building joint solutions with our OEM customers/partners to bring even more value to our end users. Our customers are truly the future-makers, and we are enabling them to innovate faster, build stronger and scale smarter. Stay tuned for a number of announcements for the surveillance market from Dell EMC and our customers. SSW: Are there product announcements on the horizon from Dell EMC too? KM: It is an exciting time to be at Dell EMC right now.

Dell Technologies is now number one in everything, all in one place, and we are bringing this world-class portfolio to the surveillance market. Never before, have our customers and partners been able to modernise their surveillance infrastructure with an end-to-end portfolio like we have at Dell EMC. We are leveraging the same industry-recognised surveillance lab to expand our validated solutions to include the entire Dell EMC portfolio. This is a huge step forward for the industry where for the first time, our customers and partners can purchase with confidence all of their surveillance infrastructure needs from one place: Dell EMC. Read the full interview on SecuritySolutionsWatch.com Check out the latest solutions from Dell Video Surveillance Solutions by Dell EMC OEM at IFSEC International, 20-22 June 2017, London ExCeL. You can find them on stand G250. Get your free badge now. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more.

It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Cloud-based disaster recovery: the benefits, catastrophic costs of downtime and questions to ask providers infographic

Cloud-based Disaster Recovery: The Benefits, Catastrophic Costs Of Downtime And Questions To Ask Providers Infographic

Enhancing resilience defined in the security world as the ability to withstand and recover quickly from disruptive or disastrous events is growing more important for businesses and cities alike. And in our increasingly connected, digitised economy a big part of achieving this is preparing for disruption to computer systems and the corruption or loss of data. The dramatic growth in cloud-based services has triggered a corresponding rise in demand for cloud-based disaster-recovery plans.

Courtesy of Ireland-based IT solutions company ERS Computer Solutions Ltd, which provides cloud-based disaster-recovery services, the infographic below outlines why businesses use such services, how long it takes to recover from site disasters, the average cost of downtime, issues to consider before adopting this model and questions to ask providers of cloud-based disaster services.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

“60% of US enterprise-level organisations lack encryption strategies”: Q&A with Extenua CEO Steve Visconti

“60% Of US Enterprise-level Organisations Lack Encryption Strategies”: Q&A With Extenua CEO Steve Visconti

Steve Visconti, president and CEO at US-based cloud security provider Extenua, talks cyber security in our latest Q&A snapshot from the US market. Originally published on SecuritySolutionsWatch.com, this interview covers the company s Cloud2Drive and SilverSHield solutions, as well as its role in IoT, mobile access and BYOD. SecuritySolutionsWatch.com: Yahoo, DropBox, LinkedIn the daily headlines unfortunately remind us just how vulnerable we are in today constant threat environment and the bad guys come in many forms: foreign governments, sophisticated hacker groups, and insiders among others.

What is your perspective, Steve, regarding the unique value proposition that Extenua brings to the table in today s IoT, mobility and BYOD environment? Steve Visconti: Cyber attacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organization s overall data strategy. It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization. Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed. This is precisely why an organization or enterprise must have the most secure and hardened environments possible. Hackers and bad actors will eventually probe and eventually move on to the easier targets. Don t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive. Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.

It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization. Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed. This is precisely why an organization or enterprise must have the most secure and hardened environments possible. Hackers and bad actors will eventually probe and eventually move on to the easier targets. Don t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive. Click here for the complete interview with Steve Visconti on SecuritySolutionsWatch.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.