event-security

Registration for Engineers of Tomorrow 2018 security & fire apprentice competition now open

Adding a fire installation challenge for the 20th anniversary year Registration for Engineers of Tomorrow 2018 has now opened, as the competition returns to IFSEC International for it s 20th anniversary year, 19-21 June 2018. This year the competition is taking a further step towards tackling the the growing engineering skills gap by adding a live installation challenge for fire apprentices, as well as for those from the security sector, following a successful trial in 2017. This will mean that in 2018, more than 60 young apprentices will compete against each other in teams of 2, live on the IFSEC show floor.

The 3 heat winning teams of security apprentices from this summer s Engineers of Tomorrow competition will be joining their industry next month at the Security Excellence Awards, where the overall winners will be awarded the 1000 prize. Next year the heat winners from both the security and fire challenges will receive their invitation to the awards, in addition to earning credits towards NVQ qualifications and fantastic industry recognition. Whether you re a security or fire apprentice, or the employer or college lecturer of apprentices, you can now register yourself or nominate a colleague for Engineers of Tomorrow 2018 here. embedded content Free Download: A Technical Guide to Fire Detection and Alarm Systems Fire legislation, which is written for the purpose of life safety, requires duty holders in non-domestic premises to assess fire risks and put in place arrangements for the prevention of fire and to protect people from fire when it occurs. This guide provides an overview of the need to know information for fire detection and alarm systems and your legal requirements, key actions, key terms and more.

Click here to download now Related Topics

Honeywell releases enhanced digital video management software: DVM R620

The latest release of Honeywell s digital video management technology exploits Internet of Things (IoT) to improve connectivity. It also uses open standards to improve operator efficiency and improve response times. The new release, called DVM R620, lets organisations more easily secure large-scale security operations.

The features include improved operator efficiency and situational awareness to speed up incident identification and resolution. embedded content DVM R620 can be deployed in a range of facilities, including those with complex security arrangements and specific/stringent requirements. For example airports, prisons, hospitals, universities and colleges and urban areas. The system The latest software features an enhanced user interface. It includes updates to enable operators to capture, view and manage live and recorded video with ease. The system uses edge recording playback and backfill capabilities for capturing video footage on camera memory cards. The footage is then backfilled to the system s main server. This makes the system more resilient even when interruptions occur, such as server failures or cybersecurity threats and breaches. The cameras are able to consistently and reliably capture video footage.

DVM R620 also includes a more intuitive user interface making it easier to learn and operate. New productivity features include bookmarking, where operators annotate and navigate video footage, for faster footage identification and also retrieval. This development is key since security operations at large sites, like airports, can include thousands of cameras capturing hours of footage. Interopability DVM R620 also supports open standards like the Open Network Video Interface Forum (ONVIF) standard. Such standards are important for enabling interopability and connectivity so organisations can more easily integrate different makes and models of video cameras and third-party systems like analytics in order to adapt to changing security threats. Clients One client for DVM R620 is Marywood University in Pennsylvania. Our security department s primary mission is to keep students and faculty safe and secure, and we look to technology to bolster these efforts so we can be as effective as possible, said Myron Marcinek, director of facilities for Marywood University. The software makes finding footage, from more than 80 cameras around the campus, easier so security officers can spend more time on foot where they re most effective. DVM R620 enables organisations to authenticate video footage with watermarks or digital signatures, when exporting video for use as evidence.

The software also keeps footage secure by exporting it in password-protected files. DVM R620 uses network and hardware resources more efficiently. For example, by using a lower resolution for video streams, valuable network bandwidth is made available also requiring less from individual monitors for decompressing and video rendering. Organisations can lower hardware costs and view more cameras within a single view. Wayne Memorial Hospital, a not-for-profit facility in Honesdale, Pennsylvania, also uses DVM R620 to improve its safety and security operations and standardise compilation of video footage for multiple uses. For more information see Honeywell Digital Video Manager Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now Related Topics

Time running out to book place on FIA seminars on update to BS 5839-1:2017

FALSE ALARMS The Fire Industry Association (FIA) is holding four seminars examining the recent update to BS 5839-1:2017, which relates to fire detection and fire alarm systems for buildings. An extra date was added due to the events popularity, with two seminars already fully booked. Published on 1 September the update introduces changes influenced by the findings of a research project called Live investigations of false fire alarms , carried out by BRE in partnership with the FIA.

The research made 36 recommendations for reducing false alarms. Following publication of the report in early 2016, the FIA s Fire Detection and Alarm Council undertook their own research project to incorporate the recommendations into related fire standards. The seminars, which are fully CPD accredited, are free to attend. The FIA recommends booking as early as possible as places are limited and are being booked up fast. Presentation dates/locations: 4 Oct, FIM Expo, Glasgow Science Centre (Will Lloyd) (LIMITED SPACES AVAILABLE register for FIM Expo to guarantee entry to the seminar) 5 Oct, FIA office, Hampton, South West London (Don Scott) morning session (FULLY BOOKED) 5 Oct, FIA office, Hampton, South West London (Don Scott) afternoon session (FULLY BOOKED) 13 Oct, Cheshire Fire and Rescue Service, Winsford (Will Lloyd) (LIMITED SPACES AVAILABLE) To book your place, visit the FIA website and click events .

Related Topics Women in Security Awards 2017: Winners announced 6 Things you need to know about FIM Expo Dahua Technology UK and Ireland announces interactive technology showcase

A window to more than the soul?

AI research raises troubling questions about privacy, profiling and wrongful arrest

When Apple introduced TouchID fingerprint readers to the iPhone in 2013 it seemed to suggest the end was nigh for password authentication. Now the latest incarnation of Apple s flagship product the iPhone X will liberate users even from the need to press a button, by automatically verifying their identity using infrared and 3D sensors within the phone s front-facing camera. However, the growing sophistication of facial recognition has generated considerable alarm in the media this week, even if it promises to eventually free us from the tyranny of myriad passwords and the forgotten password process.

A lawyer writing in the Guardian who admits she will still buy an iPhone X says we cannot become complacent to the serious privacy risks it often poses or think that all its applications are alike. AI gaydar A Stanford University professor has been criticized by privacy campaigners and the LGBT community after developing AI can accurately predict people s IQ, political leanings and whether they are gay or straight. The face is an observable proxy for a wide range of factors, like your life history, your development factors, whether you re healthy, said Michal Kosinski, who says his research will stimulate much-needed debate about creating regulatory safeguards to protect citizens privacy. AI could identify people with psychopathic traits a troubling prospect given that most psychopaths do not commit serious crimes and many murderers aren t believed to be psychopaths Inevitably dubbed AI gaydar , the AI correctly identified sexual orientation 91% of the time with men and 83% with women based on a few photos of each face. That his research also suggests a link between facial features and political beliefs lends credence to the theory that ideological outlook is to some extent heritable. Kosinski, an assistant professor of organisational behaviour, said other studies found that conservative politicians tend to be more physically attractive than liberals, because the right-wing world view tends to be against income redistribution and good-looking people are on average more successful in life. Kosinksi s findings also raise the spectre of schools screening prospective students using facial recognition AI. We should be thinking about what to do to make sure we don t end up in a world where better genes means a better life, he said. Psychopathic traits Kosinski also says AI could conceivably identify people with psychopathic traits a troubling prospect given that most psychopaths do not commit serious crimes and many murderers are not believed to be psychopaths.

Even people highly disposed to committing a crime are very unlikely to commit a crime, he said. He also says that AI could weed out potential troublemakers upon entry to concerts and nightclubs in the way that bouncers or security guards make similar subjective judgements based on body language, clothing and signs of drunkenness. Facial recognition is being rolled out across Australian airports next year in a move that could shorten queues and prevent people travelling on fake passports. However, like many technologies, it will be enormously useful to authoritarian governments. A face recognition system deployed by the Met Police at Notting Hill Carnival reportedly had a success rate of 2.86 or more similar to the wanted suspect were flagged as a possible match. This means that a vast number of possible matches will be completely innocent people. These are the face recognition systems where a mistake could mean you are investigated, if not arrested and charged, for a crime you didn t commit.

A face recognition system deployed by the Met Police at Notting Hill Carnival reportedly had a success rate of 2.86 of surveillance footage in five years time : Milestone CTO on gigantic data and neural networks Deep-learning algorithms, biometric passports and anti-drone technology helping to drive airport revolution

Sia Security Officer Jobs

SIA. The Security Officer will have:. Security Officer Vertas Group Limited*. A valid Security Guarding, Door Supervisor or Close Protection SIA License,….Security Officer required for 40 hours per week covering various sites.

Frontline SIA Licence. Completing the required security checks….SIA. We require Security Officers who hold a valid SIA licence and CSCS card to secure our construction site in the North Walsham area…. Wilson James are recruiting a Security Officer to work within a corporate site based in Canary Wharf, London…. Corporate Security Officer. Corporate Security Experience. Corporate Security Officer to work for one of our prestigious client’s based in Mayfair…. SIA Security Guard Licence. An SIA Security Licence is required for this role*. Corporate Security Officer*. SIA Door Supervisor Licence…. We are now looking for a Security Officer to join our team in London. SIA Door Supervisor Licence. Offering pioneering security solutions across the globe,… SIA. We are currently seeking a full-time professional Corporate Security Officer starting immediately with 10.65 per hour…. Have a valid SIA licence.

We are looking for an experienced front of house/customer service/reception security officer who has a proven record of strong… ENGIE are recruiting for a Security Officer to be based in 4 Abbey Orchard Street, London, SW1P 2HT. Keeping up to date with security guidelines…. We are a private Security company based in London, Our Company is looking for reliable and trustworthy operatives to represent us working around the central… SIA Security Guard. An SIA is desirable for this position. _Wilson James is a leading security, logistics and business services provider with more than 3,000… We are now looking for a Security Officer to join our team in London. SIA Door Supervisor Licence. Offering pioneering security solutions across the globe,…SIA. We now have an exciting vacancy for a Weekend Security Officer to join MAN Commercial Protection working in the Poole area….SIA.

We are looking for a confident SIA licensed Elite Relief Officer with exceptional communication skills and computer literate….

IFSEC Southeast Asia 2017: Drone Zone and business-matching service to make their debuts

SECURITY EVENT The world-leading security, fire and safety event IFSEC is holding its Southeast Asia edition at the Kuala Lumpur Convention Centre (KLCC) between 6-8 September 2017. The fifth edition is a must-attend event for players in the entire industry, including architects, business owners, contractors, engineers, facilities managers, finance professionals, human resources personnel, IT professionals, procurement specialists, property developers, senior management and more. The three-day event will feature more than 350 world-leading brands showcasing cutting-edge products in access controls and biometrics, CCTV and surveillance, cybersecurity, drones, fire alarms, fire detection, fire protection, gates and doors, home automation, intelligent buildings, intruder alarms, network security, personal protection equipment, physical security, perimeter protection, x-ray equipment and many other latest technologies in security, fire and safety.

The business-matching service will match visitors to the solutions or products that best meet their specific needs This is the best opportunity for visitors to meet directly with experts representing global brands such as Entrypass, Seagate, Dahua, Comnet, Nemtek, Nocturna, Hikvision, BFT, Falcon Safe, FAAC, Alarms and Automation, Golmar, Entrasys, Magnetic Control, Mobotix, MicroEngine, Propel Network, Senzo, Smartstripe, Ozak, Stratel, Union Light, Videx and many more. IFSEC Southeast Asia received strong support from Malaysia s Ministry of Home Affairs, Royal Malaysia Police, CyberSecurity Malaysia, Asian Professional Security Association (APSA) Malaysia Chapter, British Security Industry Association (BSIA) and ASIS International (Malaysia Chapter). New features For the fifth edition, IFSEC Southeast Asia will include a few new features on the show floor, which will attract more than 10,000 visitors. For the first time, there will be a Drone Zone, where drone companies and operators will wow visitors with airborne displays of cutting-edge security drones. Another new feature is the business-matching service, which visitors could select their preferred product to source. This service was created to help visitors find the best solutions or products for their needs, directly with the manufacturers or distributors. The Malaysia s Ministry of Home Affairs (MOHA), PPKKM, APSA and IFSEC Southeast Asia is organising Conference Perdana, where the conference will feature a panel discussion, dialogues with MOHA and a keynote address from the invited guest of honour, YAB Dato Seri Dr. Ahmad Zahid Hamidi, Deputy Prime Minister of Malaysia. We expect more than 2,000 security companies to join Conference Perdana, the first-ever conference specific for the security industry players and operators, said Dato Seri Haji Mustapa Bin Haji Ali, President of APSA (Malaysia Chapter) .

The conference is set to be the best platform for the industry players to gather and obtain the latest information and gain new knowledge that will benefit their businesses. IFSEC Southeast Asia 2017 is organising a three-day seminar on the show floor, where there will be more than 10 hot topics presented by experts. The seminar is free for all visitors. IFSEC Southeast Asia 2017 is a free-to-attend exhibition and seminar for all industry players and visitors. It takes place 6-7 September between 10:00am-5:30pm and on 8 September between 10:00am-4:00pm. For more information on IFSEC Southeast Asia, please log on to www.ifsecsea.com or contact the organiser at +60321768788. Free Download: The security drones report 2017 The global security drones market will be worth $10.5bn ( 8bn) by 2020 . This report commissioned by Aviat Drones examines the prevalence, growth prospects , applications and regulatory challenges of drones and anti-drone tech in the global security market. Find out how you can benefit from this lucrative market .

Click here to download now

How prison authorities are grappling with the rise of drone-assisted smuggling

Anti-drone tech Prison services are grappling with a growing phenomenon that didn t even exist three years ago. Intrusion by unauthorised drones accounted for 33 incidents at prisons in England and Wales in 2015 a 1,550% jump on the two recorded in 2014. The year before that not a single incident was recorded.

In one particularly daring plot criminals used drones in a failed bid to flood prisons with contraband worth around 48,000. A specialist team of prison and police officers has been set up to combat the problem. Law enforcement agencies and HM Prison and Probation Service will inspect drones recovered from jails in order to identify, track down and prosecute those involved in drone-assisted smuggling. In footage obtained by the BBC below, surveillance cameras show a drone delivering drugs and mobile phones to inmates in a London prison in April 2016. An inmate grabs the goodies by reaching through the prison bars. embedded content It s a global problem. A recent report from USA Today revealed that drones have been used more than a dozen times to smuggle contraband into federal prisons over the last five years. In 2016, a recently released inmate and two accomplices were convicted of smuggling porn and drugs into Maryland s Western Correctional Institution using a drone. The perpetrators reportedly earned about $6,000 per drop.

Lethal items US prison management consultant Donald Leach told US Today that traditionally some inmates would bribe the staff or visitors to bring drugs and other small items into jail illegally by hiding them in body cavities etc. But drones have opened up the possibility of transporting much bigger and much more lethal items like guns into the facilities. Correctional Service Canada, the federal agency responsible for management of Canadian prison facilities, recorded 41 drone-related incidents at federal prisons between July 2013 and December 2016. In four of those cases, the authority believes that contraband was successfully smuggled into the facility. Would it not be more effective to spread nets over the prisons and obscure sensitive areas from view? Martin Grigg, director, CHQ There are myriad ways of deterring, repelling, disabling or seizing drones. However, the problem is still so new that prisons around the world are very much in a trial and error phase regarding deciding on the best solution. A prison in Guernsey recently became the first in the world to use an invisible shield to foil repel drones. The shield uses sensors to jam radio frequencies that return the drone to its sender.

Martin Grigg, founder and director of security consultancy CHQ, told IFSEC Global that: Drones are an area of increased concern in that they present a new threat to prisons for both remote reconnaissance and delivery of contraband. Disabling a drone in a pre-defined area is relatively straightforward. A high-power directional microwave pulse will fry its electronics and will kill it in mid-air. But he outlines two legal problems associated with combating the problem, including the law around damaging other people s property and, more fundamentally, safety concerns. What do you do with 5kg of metal falling out of the sky? There are many health and safety risks associated with disabling drones. A falling drone could kill an innocent person. The technology that returns a drone to its last way-point is a good solution but it is not hard to imagine a drone that is not using standard aviation navigation techniques. Lateral thinking may well be an approach to practical solutions.

The basic starting point should be to keep it simple. For example, in the case of drones, would it not be more effective to spread nets over the prisons and obscure sensitive areas from view? Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now

SIA | The Voice of the Satellite Industry

The Satellite Industry Association (SIA) is a Washington D.C. based trade association representing the leading global satellite operators, service providers, manufacturers, launch services providers, and ground equipment suppliers.
Since 1995, SIA has been the unified voice of the satellite industry on policy, regulatory, and legislative issues affecting the commercial satellite industry. The association actively promotes the benefits and uses of commercial satellite technology and its role in national security, homeland security, disaster relief and recovery, and the global information infrastructure and economy. As the commercial satellite industry s lead advocate, the SIA continually monitors the international and domestic regulatory landscape and works to advance satellite interests both at home and abroad. SIA member companies are actively involved in reviewing and commenting on spectrum, regulatory, telecom, international trade, export controls, government procurement, national defense, homeland security and industry trends among other key issues.

  • SIA | The Voice Of The Satellite Industry
  • SIA | The Voice Of The Satellite Industry

Best of both worlds: Why an IoT that is both open and secure should be a right, not a privilege

A recent report by SAS and the Centre for Economics and Business Research estimated that by 2020, big data and the internet of things (IoT) will be worth 322bn to the UK economy, and account for 2.7% of GDP. Gartner forecasts that IoT endpoints will reach a global installed base of 20.4 billion units by 2020. IoT networks are already critical to global public and private sector infrastructure, delivering ever expanding capacities and potential benefits.

However, among the many pressures that are rising from the growth of IoT, two are becoming critical: throttled growth of new applications caused by non-interoperative, proprietary technology; and a widening field of security vulnerabilities, only growing more pressing as IoT permeates modern life. As IoT networks connect more and more services throughout our cities, business and homes they are rapidly becoming one of the most critical technologies underpinning our daily lives. Yet we see a great discrepancy in the requirements and demands of cities, utilities and enterprises on the network operators. Does this mean they are not taking their role as seriously as they should, or instead that the essential requirements are not yet well understood? It might seem like wishful thinking to expect that IoT networks should be both open to future development and secure against attack. It isn t. In fact, demanding the best in both these areas is utterly essential. IoT is moving beyond its roots, where devices were predominantly single-ownership/ single-use solutions. They are now able to connect to several different domains and work best when they have open and equal access to data, controllers and platforms simultaneously.

At the same time, security standards are being agreed to ensure that all devices are insulated against and able to respond to breaches. At Silver Spring Networks, we felt it was time that the buyers of IoT Networks understood how important and achievable balancing security and openness has become. Delivering security at a city-wide scale Persistent detection and safeguards from unauthorised access are two of the most important rights that all IoT network providers should confidently demand. Many IoT network platforms have only the most introductory and basic security measures which, given the interconnected nature of most networks, permits serious vulnerabilities to develop. The 2016 DDOS attack on Dyn, one of the companies running the internet s domain name system, provides an example of the repercussions of insufficiently secured IoT devices: disrupting of the connection of thousands of internet users from big online retailers and other popular sites. Shortly after this attack, a tech industry veteran demonstrated the vulnerability of unsecured IoT devices even further. By connecting a $55 IoT security camera to the internet, it was discovered that a full penetration cyber-attack could be carried out in just 98 seconds. IoT networks are large and are often very complex, with multiple points of entry and multiple touchpoints. Furthermore, when compared to computers, tablets and phones they typically have simplified user interfaces to reduce cost and simplify installation.

However, the assumption that large IoT networks cannot be made secure is wrong. Best in class IoT networks harness top-tier, military grade security, including features such as automated, asymmetric key exchange and rotation; hardened crypto processors used in key generation and storage; AES encryption to protect data in transit; and authentication via certificates at multiple layers, including prior to network enrolment. The ability to deploy formware upgrades swiftly and reliably to all nodes in a network is also an essential feature to ensure that networks remain secure across coming decades. Organisations working with IoT networks should be able to confirm that this level of security is present across their entire network, and address any segments where those standards are not or cannot be met. Ensuring an open, adaptable and future-fit network Cyber-attacks will always present a significant and costly liability to IoT networks, but they are not the only threat to consider. We live in a world where technology is evolving at a break-neck pace and new applications are emerging constantly. Networks which are locked into a single vendor s products or proprietary platform, which can t easily adapt to innovation, will also be the cause to painful costs down the line. The best insurance against this future is to deploy a solution based on proper industry standards. Proprietary technologies posing as standards (LoRaWAN, for example) effectively lock in to an ecosystem built around a single chipset.

This threatens interoperability down the line, which leads to massive and costly technical iteration and system integration efforts, all while capping the network s ultimate functionality. The best way to ensure a diverse ecosystem is to implement open, standards-based technologies that are demonstrated to be interoperable at every level of the system. The Wireless Smart Ubiquitous Network (Wi-SUN) standard is set up on this principle. Wi-SUN was designed to underpin the operation and deployment on next-generation star, mesh and hybrid networks. These networks are designed to capitalise on many connected paths, to deliver fast, reliable and city-scale coverage. Each node relays data for the network to provide strong and stable connectivity. Wi-SUN is maintained by a third-party organisation that constantly tests to certify that the IoT equipment is both conformant to the standard and interoperable with other certified networks, fostering a diverse ecosystem. Open standards allow a far greater number of providers to develop solutions, which are tested for interoperability, ensuring those solutions can work together. The best new IoT software, whether it be for management of Smart Grid applications (smart metering, real time grid balancing, renewable management etc.), management of city services (Smart street lighting, traffic flow optimisation, flood monitoring and management, Smart parking optimisation etc.), smart logistics, smart agriculture or many others the best and most effective functionality will only be unlocked through comprehensive, integrated end-to-end solutions.

Networks built around an industry standard that emphasises openness and development is essential to delivering this. Your right to best-in-class IoT At Silver Spring Networks, we think that its past time that IoT network providers were held to standards which reflect the incredible impact of IoT technology on society, now and into the future. We have set out the lessons we have delivering 26 million IoT devices across five continents into a bill of 10 rights IoT customers must be empowered to demand be enshrined in any IoT network services agreement. Security and openness are just two of these. IoT s potential to provide an incredible uplift to society across the world has only just begun to unfold. The buyers of IoT networks have the means to steer this future, by arming themselves with the information and courage to demand nothing less than the absolute best from their providers. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Qognify announces deeper integration with Bosch s suite of network cameras

Integration PSIM pioneer Qognify has expanded the integration of its Situator and VisionHub platforms with Bosch s network security cameras. Operators can control and manage Bosch cameras centrally through Situator, including PTZ and PTZ-like control for moving and fixed cameras, automatic triggering of processes when predefined incidents occur based on pre-defined alarm rules. These rules are based on video analytics built into the camera, playback via local camera storage and camera tampering detection.

The integration of Bosch s FLEXIDOME IP panoramic 7000 camera with Qognify VisionHub gives customers access to dewarping technology that eliminates fish eye lens distortion, provides 360 of view without blind spots, and an undistorted overview image. Customers can digitally pan, tilt and zoom to focus on details without sacrificing the bigger picture, says Qognify. A single device can accommodate wide coverage and achieve a normal view from an otherwise distorted or reversed image. Bosch intelligent dynamic noise reduction, meanwhile, optimises storage capacity and eases network load. Distinguishing between noise and relevant information, it only uses bandwidth when required and slashes the camera s bitrate by up to 50% and therefore the total cost of ownership. VisionHub also helps security departments avoid network overload during working hours thanks to the automated, scheduled transfer from camera on-board storage to the centre. It also restores missing video from the camera s on-board storage. Qognify s VisionHub integrates with the video analytics platform built-in to Bosch cameras. The integration also supports the central operation, on the recorder, of Qognify s video analytics suite.

Qognify says the combination of edge-based analytics (courtesy of Bosch) and server-based analytics (from Qognify) gives designers of CCTV solutions maximum flexibility. When mission-critical solutions are involved, it is essential that stringent quality checks are taken. Qognify s solutions were tested to excel in multiple integrations, said Rudolf Spielberger, head of the integration partner program at Bosch Security Systems. Our strategic cooperation with Qognify is substantially enhancing the levels of security and delivering clear and quantifiable business advantages to our customers. Eran Noam, VP of global strategic partnerships of Qognify, said: We are committed to advancing integration with leading technology partners and are proud of our integration with Bosch to yield a complete, tested and field-proven solution. It s important that organizations have confidence in integrations so they can leverage the broad range of excellent, integrated products in today s security marketplace. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals.

Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now