News

Hanwha Techwin Launched their AI-Enhanced X series Cameras
Hanwha Techwin Launched their AI-Enhanced X series Cameras
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, today launched one of its most advanced line-up of security cameras to date with the new X-Core AI and X-Plus AI series. Featuring Hanwha’s advanced artificial intelligence (AI) and deep-learning technologies, the new cameras offer industry-leading AI-based object detection for false alarm reduction analytics, AI-enhanced image quality and edge-based business intelligence.
Advanced domes based on ARTPEC-8 SoC with deep learning
Advanced domes based on ARTPEC-8 SoC with deep learning
Axis Communications announces two outdoor-ready dome cameras offering outstanding image quality even in the harshest environments and weather.
Genetec shares its top physical security trend predictions for 2022
Genetec shares its top physical security trend predictions for 2022
Genetec, a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shared its top predictions for the physical security industry in 2022.
Is Smart Building the word of this decade?
Is Smart Building the word of this decade?
Devices, cities, and buildings are becoming smarter, thanks to low-cost IoT sensors and devices delivered across our markets. How do we define Smart? Is Smart a building? The concept of Smart building has been around for a while. So what is a Smart Building? Well, it's a set of communication technologies that allow different objects, sensors, and functions within a building to communicate and interact with each other and be managed, controlled, and automated remotely. In Smart building, technologies help connect a variety of subsystems that initially operated independently".
The Internet is on fire. All you need to know about the Log4j vulnerability.
The Internet is on fire. All you need to know about the Log4j vulnerability.
The Log4j framework is used by software developers to record user activities and application behavior for further examination. Log4j has been downloaded millions of times and is one of the most extensively used tools for collecting data across corporate computer networks, websites, and applications. It is distributed for free by the nonprofit Apache Software Foundation.
Will biometric authentication be the norm in access control?
Will biometric authentication be the norm in access control?
Traditionally physical security systems rely on cards, PINs, or more recently, Bluetooth tokens. But is there a shift to Biometric authentication? We see in our everyday life that our unique biometric data is becoming a vital element in unlocking our devices such as mobile phones, tablets, cars, or personal and business laptops. 
Genetec introduces new generation of SharpV ALPR cameras
Genetec introduces new generation of SharpV ALPR cameras
Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, announced the next generation of its AutoVu™ SharpV ALPR (automatic license plate recognition) camera. This new version provides a future-proof fixed ALPR solution that can be deployed anywhere easily. It is built to deliver machine learning-based ALPR and vehicle analytics on the edge, ensuring high performance in all conditions.
How do we deal with cybersecurity challenges facing video security systems today?
How do we deal with cybersecurity challenges facing video security systems today?
Cameras are often physically exposed to the elements, which poses a physical risk of leaving ethernet cables exposed. The ever-increasing use of cloud technologies, AI, and IoT (Internet of Things) poses another high risk to systems. So what are the highest risks to video security systems?
Clickatell One API Integration for Integriti v21
Clickatell One API Integration for Integriti v21
Integriti users can now easily communicate with their registered customers, staff, and site visitors through multiple communication channels with a single integration.
Inner Range Launches the Multipath IP Website
Inner Range Launches the Multipath IP Website
Inner Range, the access control leader, is thrilled to announce the launch of their new website www.multipathip.com. The website is fully dedicated to Multipath IP, the leader in secure ‘always-on’ alarm communications for residential, business, and enterprise.
CCTV Artificial Intelligence
CCTV Artificial Intelligence
The race is on for CCTV manufacturers to deliver the latest industry driver, Artificial intelligence.
Inner Range integrates Integriti with Suprema Facial Recognition
Inner Range integrates Integriti with Suprema Facial Recognition
Integriti users are now easily able to connect to Suprema biometric devices and manage the accompanying data efficiently.
Securing Access Control Systems from Potential Breaches
Securing Access Control Systems from Potential Breaches
Do most companies understand what security system they have? As technology and innovation continue to advance, how do we help our clients benefit from their access control systems and their core attributes?
Milestone Systems and Jackson Hole Airport join hands to improve airport safety, security and efficiency
Milestone Systems and Jackson Hole Airport join hands to improve airport safety, security and efficiency
Isolated on the edge of the wilderness, Jackson Hole Airport relies on Milestone’s XProtect® VMS to enhance security, safety, and efficiency.
Seagate Technology chooses Genetec to secure its global campuses
Seagate Technology chooses Genetec to secure its global campuses
Genetec™ Security Center and Seagate data storage enable efficient handling of petabytes of high-resolution video, door, and sensor data to provide a scalable solution for large scale facilities.
Data breaches are common and preventable
Data breaches are common and preventable
According to the Egress Insider Data Breach Survey 2021, it found that 94% of organisations experienced inside data breaches within the last year. 84% of the IT leaders surveyed advised human error was the top cause of the most serious incidents. Those surveyed also indicated that despite human error causing the most incidents less than one-fifth advised this to be their biggest concern.
New Omdia report shows Genetec outpacing VMS and Windows-based recorders markets despite pandemic
New Omdia report shows Genetec outpacing VMS and Windows-based recorders markets despite pandemic
According to the latest report from research organization Omdia,  Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, continued to increase its global markets share, outpacing market growth in both VMS and Windows-based recorders categories. The report also revealed that Genetec retained its position as the global market share leader, recording the highest growth amongst the top five worldwide software manufacturers.
Why should we get rid of proximity cards?
Why should we get rid of proximity cards?
Did you know that physical access control systems have known vulnerabilities? One of the most commonly used card readers and card technologies still used today is the 125 kHz proximity card readers and cards.
Touchless Access Control of the Future
Touchless Access Control of the Future
From the beginning of the pandemic and as it continues to pose a threat to the population globally; society and businesses are realising that more needs to be done to reduce infection rates. A major contributor to infection rates, particularly for a virus that can survive on most surfaces for hours, is the use of common touchpoints. In a single day, common touchpoints such as door handles & buttons can come into contact with thousands of people. The reduction or elimination of these touchpoints is therefore key.
Bolstering Enterprise Security, A Federal Priority
Bolstering Enterprise Security, A Federal Priority
The latest Australian Federal Budget handed down by the Government in May 2021, prioritised a $50 million investment in cybersecurity services in government, data centres and telecommunications networks. This spending reflects the growing need in Australia to ensure organisations are hardened to online threats.
Are you safe while working from home?
Are you safe while working from home?
Remote work is disrupting the workplace and it is here to stay! Browsing habits have changed, not without consequences. Today, instead of targeting companies’ infrastructure, cyber-attacks aimed at employees.
Security Solutions for a Post-COVID World
Security Solutions for a Post-COVID World
Pandemic-related economic factors are likely to continue to present challenges across many industries in 2021. While the global pandemic has certainly taken the world by surprise, the security industry excels at planning for the unexpected and is resourceful in times of crisis. However, at a time when budgets are tight, many businesses, cities, critical infrastructure and transportation agencies need to be creative about how they use, update and redeploy their security systems across their organizations. When thinking more broadly about the role of physical security and what it can do beyond traditional applications to deliver more value, organizations need to think beyond the immediate challenges posed by the pandemic. They need to work to ensure that their investments not only solve today’s problems but also continue to play a strategic role even once the pandemic is finally in the rear-view mirror.
End-of-life Windows 7; Security Risk for PC users
End-of-life Windows 7; Security Risk for PC users
Recent research by antivirus vendor Kaspersky shows that almost a quarter of PC users globally are still using the end-of-life operating system Windows 7 which creates a security risk and vulnerability to cyberattacks. This operating system stopped receiving mainstream support in January 2020. Once an OS has come to the end of its life-cycle, the vendor will no longer issue any further updates which include critical security fixes.
Extreme Networks outlines how to overcome 4 Common IoT Security Vulnerabilities
Extreme Networks outlines how to overcome 4 Common IoT Security Vulnerabilities
Global research firm, Statista, projects IoT spending will surpass $1 trillion by 2023. But before you get lost in the cloud of opportunity, it’s critical to stay grounded. The average cost of a data breach in 2020 was $3.86 million globally. That figure increased 9.8 per cent year-on-year in Australia, priced at $3.35 million, a sobering fact to consider. Add to this, malicious attack breaches were more financially heavy, costing organisations across the globe on average $3.74 million instead of system glitches, at $2.90 million, and human error, at $2.82 million.
Ransomware recovery costs have more than doubled in the past year
Ransomware recovery costs have more than doubled in the past year
The Australian Cyber Security Centre has received an average of 164 cybercrime reports a day. For this reason, Cybersecurity should be at the forefront of the businesses action plan. In an ever-growing and developing technological world, a new threat has emerged; Cybercrime. This threat targets not only individuals but also businesses and has an extensive global reach.
Fortis Security announces partnership with Ermes
Fortis Security announces partnership with Ermes
Fortis has partnered with Ermes to provide clients with a security solution to combat the evolving cybersecurity threats businesses are now faced with. Ermes is an intelligent anti-phishing software that acts directly on a browser to prevent and intervene on targeted web attacks that other security solutions cannot recognise.
Milestone introduces the new Husky IVO Series
Milestone introduces the new Husky IVO Series
Milestone is a leading technology provider of unified security, public safety, operations, and business intelligence solutions as well as being a Fortis partner. Not long to go before the New Milestone Husky™ series is here. Put a cross in your calendar for May 18 and get ready to place your pre-orders.
Have you seen the latest version of Genetec Security Centre?
Have you seen the latest version of Genetec Security Centre?
Genetec is a leading technology provider of unified security, public safety, operations, and business intelligence solutions as well as being a Fortis partner.  Recently Genetec has announced a new version (v 5.10) of its flagship unified security platform, Security Center. Contact us to learn more about how you can use Genetec for your business security solutions. 
How can Access control & CCTV assist in managing a pandemic?
How can Access control & CCTV assist in managing a pandemic?
Globalisation is the process of connection and interaction between businesses, people and governments across the world. This has been an increasing trend; allowing companies to provide services and products to a much greater market and have access to a more extensive array of resource options. However, the increased globalisation has also increased the susceptibility for viruses to spread and pandemics to occur affecting the entire globe. Read the article to understand how can Access control systems & CCTVs assist in managing a pandemic?
Are you thinking about cybersecurity? Are you sure you’re protected?
Are you thinking about cybersecurity? Are you sure you’re protected?
The Australian Cyber Security Centre has received an average of 164 cybercrime reports a day. For this reason, Cybersecurity should be at the forefront of the businesses action plan. In an ever-growing and developing technological world, a new threat has emerged; Cybercrime. These threats targets not only individuals but also businesses and has an extensive global reach.

Gallagher Security is a global leader in integrated security solutions, trusted by organizations across 140+ countries to protect what matters most. Headquartered in New Zealand and established in 1938, Gallagher designs and delivers intelligent systems for access control, perimeter security, intruder alarms, and cybersecurity—serving critical industries such as defense, government, healthcare, education, and infrastructure.

At the heart of Gallagher’s offering is Command Centre, a powerful and scalable platform that provides centralized management of security operations, real-time monitoring, and seamless integration across devices and networks. Whether securing a single site or a global enterprise, Gallagher’s solutions are designed for adaptability, resilience, and future-ready performance.

Gallagher is committed to continuous innovation, backed by rigorous research and development, and guided by globally recognized standards. The company holds certifications such as ISO 9001 for Quality Management and ISO 27001 for Information Security, reflecting its dedication to excellence, reliability, and customer trust.

By combining cutting-edge technology with a global partner network and expert local support, Gallagher empowers organizations to create safer environments and respond confidently to evolving security challenges.

A global leader in providing on-demand cloud computing platforms and APIs to companies, and governments, on a metered pay-as-you-go basis. Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centres globally

2N is a leading European company operating worldwide, specializing in the development and manufacturing of communication solutions.

Allied Telesis is a Global Network infrastructure & security manufacturer, with 56 locations around the world. Headquartered in Japan, Allied Telesis creates reliable, secure and easy to use wired and wireless networks for campus, branch and IoT solutions.

A global leader in providing on-demand cloud computing platforms and APIs to companies, and governments, on a metered pay-as-you-go basis. Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud platfor

Anywhere Networks develops and globally markets network hardware connecting critical infrastructure and make the public safer and more productive. Our networks connect video cameras and any IoT devices anywhere to enable a Smart City implementation. Our intelligent network technology and solutions provide extended reach, incremental capacity, and redundancy to any existing city infrastructure.

Dell gives today's workforce what they need to securely connect, produce, and collaborate; anywhere at any time. Award-winning desktops, laptops, 2-in-1s and thin clients ; powerful workstations and rugged devices made for specialized environments, as well as monitors, docking and endpoint security solutions and services, workers get exactly what they need to work the way they want.

Aperio is a new technology developed to complement new and existing electronic access control systems. Aperio provides end users with a simple, intelligent way to upgrade the controllability and security level of their premises.

Ermes is a pioneering solution to empower your company against contemporary cyber-threats. The Ermes application agents periodically send information on the traffic generated by devices, in order to allow the EIS Backend Server to identify any new threat and spread it to agents. Identification is performed using proprietary algorithms thanks to whom the server process information quickly and automatically. Collected information The Ermes’ agents collect traffic logs that describe the HTTP, HTTPS, WS (WebSocket) and WSS (Secure WebSocket) transactions that the device establishes: for privacy reasons EIS agents do not collect the body of requests or replies. Data storage Ermes has been structured in order to preserve user privacy: therefore, the system is not able to associate traffic information with the user's identity in any way. In order to do that information are stored in two separate environments:

The ASSA ABLOY Group is the global leader in access solutions. Every day, we help billions of people experience a more open world. ASSA ABLOY Opening Solutions leads the development within door openings and products for access solutions in homes, businesses and institutions. Our offering includes doors, door and window hardware, mechanical and smart locks, access control and service.

Extreme Networks, Inc. (EXTR) creates effortless networking experiences that enable all of us to advance. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before.

Avigilon is an American subsidiary of Motorola Solutions, specialising in the design, development and manufacture of advanced AI, video analytics, network video management software and hardware, surveillance cameras, and access control products.

Bosch Security Systems are building intelligent technologies for fascinating experiences in public and commercial spaces. Bosch Security Systems provide a safe, functional place for people to live and work. They can also cater for – and even respond to – their needs, while helping them work more efficiently and sustainably.

Canon can be hard to define. Especially when you learn the extent of there expertise and discover all the fascinating places there imaging technology can be found today.

CIC Technology is a global provider of smart key management solutions for all industry sectors. Australian made and designed, our products allow you to supervise and track your building’s keys, cards and tags – with utmost efficiency, control and precision.

Genetec Inc. is an innovative technology company with a broad solutions portfolio that encompasses security, intelligence, and operations. The company's flagship product, Security Center, is an open-architecture platform that unifies IP-based video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. Genetec also develops cloud-based solutions and services designed to improve security, and contribute new levels of operational intelligence for governments, enterprises, transport, and the communities in which we live. Founded in 1997, and headquartered in Montréal, Canada, Genetec serves its global customers via an extensive network of resellers, integrators, certified channel partners, and consultants in over 80 countries.

Commend grew from a small family business into a large, globally recognised player providing enterprise-grade Integrated Intercom and PA Systems. Today, its unique solutions are installed for the protection of people, buildings and assets throughout the world in some of the most prestigious buildings and transport systems.

Established in 1977, Hanwha Techwin’s advanced optical design, manufacturing, and image-processing technology have made it a global leader in video surveillance. Hanwha is heavily investing in R&D to innovate and meet the ever-changing market needs. In so doing, Hanwha Techwin has been gaining recognition as a global top-tier company. By applying Hanwha’s experience and subject matter expertise to product development, Hanwha’s has been able to create a complete line of security solutions, from cameras and recorders to integrated management software. Hanwha’s products are designed to meet every application, including urban surveillance, retail, transportation, and banking.

CommScope Inc. is an American global network infrastructure provider company. CommScope push the boundaries of communications technology to create the world's most advanced networks. Across the globe, CommScope solutions are redefining connectivity, solving today's challenges and driving the innovation that will meet the needs of what's next. CommScope build and manage wired and wireless networks around the world. As a communications infrastructure leader, CommScope shape the always-on networks of tomorrow. For more than 40 years, CommScope, technologists have empowered customers in all regions of the world to anticipate what's next and push the boundaries of what's possible.

HID Global, powers the trusted identities of the world's people, places and things. HID make it possible for people to transact safely, work productively, and travel freely. HID work with governments, universities, hospitals, financial institutions and some of the most innovative companies on the planet—helping them to create trusted physical and digital environments so that they and the people who use them can fulfill their potential.