<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>@aarango &#8211; Smartech Security</title>
	<atom:link href="https://www.smartechsecurity.com/author/aarango/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.smartechsecurity.com</link>
	<description>Security Systems</description>
	<lastBuildDate>Tue, 13 Aug 2019 02:01:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.3.2</generator>

<image>
	<url>https://www.smartechsecurity.com/wp-content/uploads/2018/10/favicon.png</url>
	<title>@aarango &#8211; Smartech Security</title>
	<link>https://www.smartechsecurity.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Genetec Strengthens its Access Control Offering for the US Federal Market</title>
		<link>https://www.smartechsecurity.com/genetec-strengthens-its-access-control-offering-for-the-us-federal-market/</link>
				<comments>https://www.smartechsecurity.com/genetec-strengthens-its-access-control-offering-for-the-us-federal-market/#respond</comments>
				<pubDate>Fri, 09 Aug 2019 13:51:44 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12242</guid>
				<description><![CDATA[<p>Close collaboration with technology partners Mercury Security and HID Global enables Genetec to bring nonproprietary FICAM-certified solutions to the US federal market Our Technological partner announced yesterday August 8 that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis&#x2122; access control system. In a market that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/genetec-strengthens-its-access-control-offering-for-the-us-federal-market/">Genetec Strengthens its Access Control Offering for the US Federal Market</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[
<p><strong>Close collaboration with technology partners Mercury Security and HID Global enables Genetec to bring nonproprietary FICAM-certified solutions to the US federal market</strong></p>



<p> Our Technological partner announced yesterday August 8 that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis<img src="https://s.w.org/images/core/emoji/12.0.0-1/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> access control system. In a market that has been traditionally weighed down by limited solutions that are often proprietary, these new options offer nonproprietary, open-architecture choices to efficiently validate Personal Identity verification (PIV and PIV-I) for federal employees and contractors.</p>



<p>&#8220;Older physical security technology no longer meets federal standards or complies with the latest regulations, that&#8217;s why government agencies are looking to modernize their operations. By unifying all systems in the Security Center Synergis platform, security teams can better mitigate risks, increase operator efficiency and reduce cybersecurity efforts all while remaining compliant with the latest FIPS standards&#8221; said Justin Himelberger, Enterprise Systems Business Development Manager-Federal &amp; DOD at Genetec.</p>



<p>Genetec offers two FICAM-certified options:</p>



<ol><li><strong>Onboard authentication using Mercury LP4502 controller</strong>: Ideal for new installations, this option is an efficient and cost-effective approach to achieving FIPS 201 compliancy. By embedding pivCLASS<img src="https://s.w.org/images/core/emoji/12.0.0-1/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> authentication firmware into a Mercury LP4502 controller, users reduce their hardware expenditure and benefit from a speedy authentication process.    </li><li> <strong>Authentication using HID PAM:</strong> Ideal for retrofits, customers can upgrade their existing systems by adding a dedicated pivCLASS Authentication Module (PAM) from HID to their installation.  <br></li></ol>



<p><p>Smartech and Genetec have been working as partners in different projects and we are pleased say that Genetec is one of our strong technological partners that allow us to offer first class security solutions in the marketplace. </p>
<p><em>Credits to Genetec Newsroom</em></p></p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/genetec-strengthens-its-access-control-offering-for-the-us-federal-market/">Genetec Strengthens its Access Control Offering for the US Federal Market</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/genetec-strengthens-its-access-control-offering-for-the-us-federal-market/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>How technology could transform the employee experience</title>
		<link>https://www.smartechsecurity.com/how-technology-could-transform-the-employee-experience/</link>
				<comments>https://www.smartechsecurity.com/how-technology-could-transform-the-employee-experience/#respond</comments>
				<pubDate>Sat, 03 Aug 2019 13:27:27 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12238</guid>
				<description><![CDATA[<p>Artificial intelligence is helping employers to find and retain staff. If you are worried that a robot will take over your job, rest easy. For now, robots are more likely to help recruit you and keep you at work, as firms seek to use high-tech tools to deal with a battle for human talent. With [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/how-technology-could-transform-the-employee-experience/">How technology could transform the employee experience</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[
<p>Artificial intelligence is helping employers to find and retain staff.</p>



<p>If you are worried that a robot will take over your job, rest easy. For now, robots are more likely to help recruit you and keep you at work, as firms seek to use high-tech tools to deal with a battle for human talent. </p>



<p>With <a href="https://www.skillsusa.org/about/why-career-technical-education/stem-and-cte-alignment/u-s-skills-gap/" target="_blank" rel="noreferrer noopener" aria-label="SkillsUSA claiming (opens in a new tab)">SkillsUSA claiming</a> “the skills gap in the United States is a growing crisis for our nation,” and many other countries also feeling the pinch when it comes to talent, execs are having to get smarter about finding and holding onto the right people. In the past, they may have been able to get away with gimmicks like an in-house gym or beanbags on the top floor. </p>



<p>“These can be great, but what if you hate the gym? What if you work from a desktop and cannot make use of the beanbags?” says Thomas Davies, founder and CEO of Temporall and a leader in organizational analytics. Today, the trick is to shelve these one-size-fits-all treats and look to connect each worker with the things that matter most to them. And this is where tools such as artificial intelligence and machine learning come in. Davies says more than 90 percent of human resources experts believe there is a link between employee experience and company performance. “However, focusing on employee engagement alone won’t entirely attribute to what your employees are engaged in,” he says. </p>



<p>Workplace culture, on the other hand, goes deeper, giving insight into how employees behave and make decisions, data that can be vital during times of change. A good workplace culture which is aligned to business strategy has a significant impact on company performance and will also produce high levels of employee engagement and retention, Davies says.</p>



<p>Furthermore, says <a href="https://www.linkedin.com/in/mattiashallberg/?originalSubdomain=jp" target="_blank" rel="noreferrer noopener" aria-label="Mattias Hallberg (opens in a new tab)">Mattias Hallberg</a> at Attuned, part of Tokyo-based exec search firm Wahl &amp; Case, not knowing what makes your workers tick could be a problem even if you think nothing is wrong. While many firms look for self-starters, he says, a good worker will often look for a reason to get started. If the spark isn’t there, they won’t gripe. They’ll just leave. Unlike factors such as pay, what excites workers about their jobs are often “things that people might not complain about,” Hallberg says. If you cannot work out what these factors are, you could be left with a lot of dead wood, Hallberg notes. “People with very low motivation are not the people leaving,” he says. </p>



<p>At its most basic, IT systems can help improve how workers feel about their jobs by taking away some of the hassle of the workplace. If, for instance, you have to wade through reams of red tape just to take some time off, then maybe a chatbot can help guide you through the process. Indeed, for tasks such as this, “a key trend we see for 2019 is a more blended approach towards using a voice interface with text,” says <a href="https://www.linkedin.com/in/cathalmcgloin/" target="_blank" rel="noreferrer noopener" aria-label="Cathal McGloin (opens in a new tab)">Cathal McGloin</a>, CEO of conversational AI platform company ServisBOT.</p>



<p>More deeply, artificial intelligence “can aid people leaders to anticipate people’s needs and create and sustain a personalized experience,” says Fractal Analytics Chief People Officer Raj Aradhyula. Software could do this, for instance, by getting rid of bias in hiring, to give people a fairer shot at a job. Or by flagging up problems that new hires may seem to have when they come on board. Or giving leaders key data to help build better teams. </p>



<p>A further step is for IT systems to take care of tasks that might numb most workers’ brains. Then workers can “focus on higher-value tasks, which still require human problem-solving skills,” says <a href="https://www.linkedin.com/in/benstoneham/?originalSubdomain=uk" target="_blank" rel="noreferrer noopener" aria-label="Ben Stoneham (opens in a new tab)">Ben Stoneham</a>, founder of Autologyx, which provides process automation software and solutions. With so many ways to boost the way you feel at work you may wonder why it is that IT systems aren’t bringing more joy to your job today. The reason is that the human resources sector has so far been slow at picking up on what tools such as machine learning can offer.</p>



<p>Partly this is because of cost and partly because of a fear of losing “the human touch,” says <a href="https://www.linkedin.com/in/susie-turpin-6018042/" target="_blank" rel="noreferrer noopener" aria-label="Susie Turpin (opens in a new tab)">Susie Turpin</a>, director at talent mapping and research firm Wilbury Stratton, which has looked at how bosses are looking to embrace tech tools to find and hold onto staff. One of the findings of the research, she says, is that in places where such tools are used execs have found it is key to engage even more with people, not less. Despite the slow uptake, though, experts see such tools having an ever-greater role in human resources. </p>



<p>“This topic is not going to fade away any time soon,” says <a rel="noreferrer noopener" aria-label="Marc Greggains (opens in a new tab)" href="https://www.linkedin.com/in/marcgreggains/?originalSubdomain=uk" target="_blank">Marc Greggains</a>, head of sales at the IT firm Cascade HR. And the need to get IT tools to delve into what makes workers tick might force the software to become a little more like us, says <a href="https://www.linkedin.com/in/priscillacoates/?originalSubdomain=uk" target="_blank" rel="noreferrer noopener" aria-label="Priscilla Coates (opens in a new tab)">Priscilla Coates</a>, change consultant and co-founder of Magma Digital. “Artificial intelligence is arguably going to become more human, to encourage us to interact,” she says. </p>



<p><em>Credits and content used with the permission of <a href="http://newsroom.cisco.com/" target="_blank" rel="noreferrer noopener" aria-label="newsroom.cisco.com (opens in a new tab)">newsroom.cisco.com</a></em></p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/how-technology-could-transform-the-employee-experience/">How technology could transform the employee experience</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/how-technology-could-transform-the-employee-experience/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Cisco cybersecurity report sounds alarm on rising email threats</title>
		<link>https://www.smartechsecurity.com/cisco-cybersecurity-report-sounds-alarm-on-rising-email-threats/</link>
				<comments>https://www.smartechsecurity.com/cisco-cybersecurity-report-sounds-alarm-on-rising-email-threats/#respond</comments>
				<pubDate>Sat, 27 Jul 2019 12:59:04 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12234</guid>
				<description><![CDATA[<p>56 percent of CISOs report email is their highest security concern. Advancing its stellar track-record ofintelligence, security and cyber-threat information sharing, our technology partner Cisco continues to engage in thought-leadership revolving around the state of global cybersecurity. In recently launching its Cisco Cybersecurity Report Series, Cisco has brought under a single banner, leading threat researchers [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/cisco-cybersecurity-report-sounds-alarm-on-rising-email-threats/">Cisco cybersecurity report sounds alarm on rising email threats</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[
<p><strong>56 percent of CISOs report email is their highest security concern. </strong></p>



<p>Advancing its stellar track-record ofintelligence, security and cyber-threat information sharing, our technology partner  Cisco continues to engage in thought-leadership revolving around the state of global cybersecurity.  In recently launching its Cisco Cybersecurity Report Series, Cisco has brought under a single banner, leading threat researchers and innovators in the security industry to provide a wide variety of research-based and data-driven publications geared towards professionals with varying interests. In its recent Threat Report and CISO Benchmark Study, both included in the 2019 series, Cisco reveals damning evidence on the rise of cyberthreats delivered via email.</p>



<p>First making its malevolent appearance in 1978, spam has been inundating inboxes around the world, employing phishing tactics and malware to wreak havoc on people and businesses. By relying on botnets and bulk email toolkits, today, email is being cited as the #1 vector for the distribution of these threats. Indeed, at least one third of all email that passes through Cisco’s email security appliances are blocked outright and never reach their intended recipients, aka victims, and that is by conservative estimates!  </p>



<p>See also: <a href="https://newsroom.cisco.com/feature-content?type=webcontent&amp;articleId=1979145" target="_blank" rel="noreferrer noopener" aria-label="Cybersecurity sees huge market growth in 2018 (opens in a new tab)">Cybersecurity sees huge market growth in 2018</a> </p>



<p>Some of the most common and destructive phishing applications rely on the high prevalence of the G-Suite on the Cloud and its email offerings via Gmail.  Microsoft copycats mimic Office 365, and BEC (Business Email Compromise) email fraud masquerades as c-suite superior communications delivering fake instructions to unknowing employees.  In 2018 alone, the latter tactic resulted in $1.3 billion in losses to industry!</p>



<p>The tentacles of organized crime and individual fraudsters are far reaching and are infiltrating a wide variety of areas that are as plentiful as they are crafty. Digital extortionists defraud businesses and individuals alike with dirty scams to coerce users into making payments, oftentimes using Bitcoin. There are Facebook groups that peddle bulk email tools that are intended for fraudulent use, and phishing through promises of intimate meetings, employment opportunities, or the acquisition of expensive or hard to find pharmaceuticals.  The list goes on and on.</p>



<p>With up to 56 percent of CISOs reporting that email is their highest security concern, even ahead of the Cloud and mobile device use, a recent CISO study indicates that the use of email security systems and protocols are in decline.  Further study reveals that one reason for this imbalance may be because of growing reliance on the Cloud, up to 80 percent by Cisco’s reports, which seems to promote a false sense of security.  Businesses inaccurately assume that the Cloud provides robust security at the base level, whereas in fact the Cloud’s basic security provision is only single-tiered.  The Cisco report calls attention to this and recommends a multi-level and pronged approach to cybersecurity both on and off the Cloud that includes, among other tactics: multi-factor authentication, regularly scheduled phishing simulations, the consistent updating of browsers and plug-ins, caution with log-in requests, the verification of authenticity, and the implementation of a dual signature protocol for all financial transactions, especially those made online.</p>



<p>While sounding the alarm on the increasing threats posed by email threats, Cisco’s Cybersecurity Report Series also provides solutions, and covers a variety of other related topics as well.  To read through the complete reports cited and more that will be posted in the coming weeks and months, please check out the entire security report.  This is truly a one-stop information shop for anyone interested in up-to-date information and the state of global cybersecurity. </p>



<p>We are grateful to have a Cisco as one of our strong technological partners.  </p>



<p><em>Credits and content used with the permission of <a href="http://newsroom.cisco.com/" target="_blank" rel="noreferrer noopener" aria-label="newsroom.cisco.com (opens in a new tab)">newsroom.cisco.com</a></em></p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/cisco-cybersecurity-report-sounds-alarm-on-rising-email-threats/">Cisco cybersecurity report sounds alarm on rising email threats</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/cisco-cybersecurity-report-sounds-alarm-on-rising-email-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>New H.265 Fisheye Cameras With Smart 360 VCA Deep Learning Technology</title>
		<link>https://www.smartechsecurity.com/new-h-265-fisheye-cameras-with-smart-360-vca-deep-learning-technology/</link>
				<comments>https://www.smartechsecurity.com/new-h-265-fisheye-cameras-with-smart-360-vca-deep-learning-technology/#respond</comments>
				<pubDate>Wed, 17 Jul 2019 12:25:04 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12194</guid>
				<description><![CDATA[<p>Vivotek is one of our Technological partners who is one of the global leading IP surveillance solution provider. They recently introduced two new H.265 deep learning fisheye cameras, the FE9191 and FE9391-EV. These two professional day-and-night 12-megapixel fisheye cameras provide 360-degree surround views with zero blind spots and come armed with VIVOTEK’s self-developed Deep Learning [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/new-h-265-fisheye-cameras-with-smart-360-vca-deep-learning-technology/">New H.265 Fisheye Cameras With Smart 360 VCA Deep Learning Technology</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Vivotek is one of our Technological partners who is one of the global leading IP surveillance solution provider. They recently introduced two new H.265 deep learning fisheye cameras, the FE9191 and FE9391-EV. These two professional day-and-night 12-megapixel fisheye cameras provide 360-degree surround views with zero blind spots and come armed with VIVOTEK’s self-developed Deep Learning technology, Smart 360 VCA. This technology includes Intrusion Detection, Crowd Detection, and Loitering Detection. Such capability transforms these surveillance cameras from capturing devices to advanced notification instruments and in the process significantly reduces false alarms.</p>
<p>The Intrusion-Detection function of these cameras are designed to protect any specific area against unauthorized entry. The Crowd-Detection function can detect and calculate how many persons occupy a given space and triggers alarms when capacity is reached in that area. Finally, the Loitering-Detection function can detect a person or people remaining too long in any selected area. Further enhancing their functionality, both cameras are embedded with Trend Micro’s anti-intrusion software to provide users with higher levels of network protection. Working together, these advanced features ensure the new fisheye cameras are both highly intelligent and robustly secure.</p>
<p>At Smartech we strive to stay on top of technology and we are committed to helping retailers and users improve business management efficiency while securing their assets with accurate identification with this world class new camera technology such these new cameras from Vivotek.</p>
<p><em>Credits to Vivotek</em></p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/new-h-265-fisheye-cameras-with-smart-360-vca-deep-learning-technology/">New H.265 Fisheye Cameras With Smart 360 VCA Deep Learning Technology</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/new-h-265-fisheye-cameras-with-smart-360-vca-deep-learning-technology/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Our Technology partner Vidsys have new connectors and integrations</title>
		<link>https://www.smartechsecurity.com/our-technology-partner-vidsys-have-new-connectors-and-integrations/</link>
				<comments>https://www.smartechsecurity.com/our-technology-partner-vidsys-have-new-connectors-and-integrations/#respond</comments>
				<pubDate>Tue, 09 Jul 2019 12:49:03 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12105</guid>
				<description><![CDATA[<p>Our Technology partner Vidsys recently highlighted online some new connectors and integrations that are available on their technology platform. Their Converged Security and Information Management (CSIM) software can integrate with any type of software or physical hardware technology. The following connectors are now available for their software library: Smiths XRax (X-Ray Proxy) Transas AIS (AIS/Vessel [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/our-technology-partner-vidsys-have-new-connectors-and-integrations/">Our Technology partner Vidsys have new connectors and integrations</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Our Technology partner Vidsys recently highlighted online some new connectors and integrations that are available on their technology platform. Their Converged Security and Information Management (CSIM) software can integrate with any type of software or physical hardware technology.</p>
<p>The following connectors are now available for their software library:</p>
<ol>
<li>Smiths XRax (X-Ray Proxy)</li>
<li>Transas AIS (AIS/Vessel Monitoring System Proxy)</li>
<li>Motorola Vicon Valerus (NVR Connector)</li>
<li>GE Cimplicity (SCADA/HMI proxy)</li>
</ol>
<p>Using Vidsys’ CSIM Platform, security organizations can integrate and analyze information from traditional physical security devices and resolve situations in real time.</p>
<p>Smartech work closely with Vidsys offering a growing list of connectors that enable integration between the Vidsys CSIM platform and other industry-leading converged and physical security products.</p>
<p>If you would like to learn more about these or any of our other integrations, <a href="http://www.smartechsecurity.com/contact-us/" target="_blank" rel="noopener">contact us</a> for more information or to schedule a live press presentation.</p>
<p><em>Credits: Vidsys </em></p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/our-technology-partner-vidsys-have-new-connectors-and-integrations/">Our Technology partner Vidsys have new connectors and integrations</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/our-technology-partner-vidsys-have-new-connectors-and-integrations/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Want to know if your Business requires a custom video surveillance solutions? This is how you know.</title>
		<link>https://www.smartechsecurity.com/want-to-know-if-your-business-requires-a-custom-video-surveillance-solutions-this-is-how-you-know/</link>
				<comments>https://www.smartechsecurity.com/want-to-know-if-your-business-requires-a-custom-video-surveillance-solutions-this-is-how-you-know/#respond</comments>
				<pubDate>Tue, 25 Jun 2019 00:34:09 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12100</guid>
				<description><![CDATA[<p>Imagine purchasing an entire surveillance system that never had your business in mind from the start. Whether security professionals are monitoring a hotel, special traffic pattern, or seaside oil extraction site, each environment has its own unique security needs. In the case of hotels, they might desire a more discreet strategy, where each camera blends [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/want-to-know-if-your-business-requires-a-custom-video-surveillance-solutions-this-is-how-you-know/">Want to know if your Business requires a custom video surveillance solutions? This is how you know.</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Imagine purchasing an entire surveillance system that never had your business in mind from the start. Whether security professionals are monitoring a hotel, special traffic pattern, or seaside oil extraction site, each environment has its own unique security needs. In the case of hotels, they might desire a more discreet strategy, where each camera blends in with its surroundings. On the other hand, a seaside oil extraction site might need cameras that can withstand corrosion and intense heat.</p>
<p>While there are a multitude of surveillance solutions to choose from, it is likely that the security plan includes solutions with special characteristics that may not be available in traditional offerings. To ensure the best possible protection for your guests, employees, and property, there is an option: investing in custom solutions that meet the following diverse range of requirements.</p>
<ul>
<li><strong>Conform to Building Aesthetics and Design</strong></li>
<li><strong>Adapt to Unique Environmental Conditions</strong></li>
<li><strong>Save on Installation Costs</strong></li>
</ul>
<p>Suppose a security operator has already invested in a surveillance system that doesn’t fully meet their needs. In this case, they can retrofit custom solutions into existing installations. For an easier way to install a surveillance system, Smartech offers cameras that have already been pre-wired and configured. This results in lower installation costs since the existing system won’t need to be replaced, and fewer resources may be needed to install pre-wired and configured cameras.</p>
<p><b>At Smartech we design Security Solutions made to fit a wide range of Security requirement. </b>We recognize that one size doesn’t fit all, so the right surveillance solutions should be tailored to suit the distinct requirements of each environment. To learn more about Smartech Security Solutions, visit us <a href="http://www.smartechsecurity.com/solutions/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.pelco.com/services/smr-special-modification-requests&amp;source=gmail&amp;ust=1561475291010000&amp;usg=AFQjCNGEYidAR4Fpuwe6pXExenJQEGVUGA">here</a>.</p>
<div><em>Credits: Pelco by Schneider Electric</em></div>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/want-to-know-if-your-business-requires-a-custom-video-surveillance-solutions-this-is-how-you-know/">Want to know if your Business requires a custom video surveillance solutions? This is how you know.</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/want-to-know-if-your-business-requires-a-custom-video-surveillance-solutions-this-is-how-you-know/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Lower the Total Cost of Ownership of Video Surveillance</title>
		<link>https://www.smartechsecurity.com/lower-the-total-cost-of-ownership-of-video-surveillance/</link>
				<comments>https://www.smartechsecurity.com/lower-the-total-cost-of-ownership-of-video-surveillance/#respond</comments>
				<pubDate>Wed, 19 Jun 2019 12:42:50 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12198</guid>
				<description><![CDATA[<p>Qognify – the trusted advisor and technology solution provider for physical security and enterprise incident management solutions has launched Umbrella. The new web-based management platform leverages significant cost savings by managing large distributed video surveillance systems centrally in the cloud. In recent years, video surveillance projects have become larger and more complex, demanding more resources [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/lower-the-total-cost-of-ownership-of-video-surveillance/">Lower the Total Cost of Ownership of Video Surveillance</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Qognify – the trusted advisor and technology solution provider for physical security and enterprise incident management solutions has launched Umbrella. The new web-based management platform leverages significant cost savings by managing large distributed video surveillance systems centrally in the cloud.</p>
<p>In recent years, video surveillance projects have become larger and more complex, demanding more resources and increasing operational costs. Altering the configuration of multiple sites is time-consuming and monitoring the health status of all servers and cameras across every location is a challenge. As a consequence, organizations frequently over-spend on technical expertise and unnecessary licenses, as well as potentially exposing themselves to regulatory risk.</p>
<p>Qognify solves these challenges with the launch of Umbrella – a management solution, which is fully integrated with Qognify’s video management software (VMS) Cayuga. The web-based Umbrella can be hosted in the cloud (including Microsoft Azure and AWS) as well as on premise. Once installed, Umbrella provides a consolidated view of all servers and cameras across every connected installation, highlighting those, which require attention. Furthermore, if any company-wide changes are required to be made to how the video system operates (e.g. caused by changes in regulations such as GDPR), they can be configured and rolled-out remotely and immediately.</p>
<p>Umbrella is a perfectly suited for organizations in the banking, retail, logistics and transportation industry, which operate large-scale branch networks with hundreds of sites and thousands of cameras to be managed and place a premium on their physical security strategy. At Smartech we are honor to announce that Umbrella is now available to organizations using Qognify’s Cayuga video management system.</p>
<p><em>Credits to Qognify</em></p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/lower-the-total-cost-of-ownership-of-video-surveillance/">Lower the Total Cost of Ownership of Video Surveillance</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/lower-the-total-cost-of-ownership-of-video-surveillance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>How biometrics help secure retail stores and businesses</title>
		<link>https://www.smartechsecurity.com/how-biometrics-help-secure-universities-stores-and-many-businesses/</link>
				<comments>https://www.smartechsecurity.com/how-biometrics-help-secure-universities-stores-and-many-businesses/#respond</comments>
				<pubDate>Wed, 12 Jun 2019 02:15:42 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.smartechsecurity.com/?p=12080</guid>
				<description><![CDATA[<p>The use of biometric access control continues to gain popularity around the world for organizations, enterprises and small businesses alike, as they progressively understand the advantages it offers in the form of accurate time tracking, higher security and improved convenience. Colleges and universities, in particular, have started to deploy this technology for varied applications and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/how-biometrics-help-secure-universities-stores-and-many-businesses/">How biometrics help secure retail stores and businesses</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>The use of biometric access control continues to gain popularity around the world for organizations, enterprises and small businesses alike, as they progressively understand the advantages it offers in the form of accurate time tracking, higher security and improved convenience.</p>
<p>Colleges and universities, in particular, have started to deploy this technology for varied applications and have specific challenges in deploying biometric technologies such as the diversity and size of the user population, the need for very rugged equipment and flexibility for different use cases.</p>
<p>Features of this integration include an embedded enrollment task as well as device level support for the Genetec RIO protocol which allows Invixium products to operate as an edge-based door controller making deployment of biometric access control to any door simpler and more cost-effective than ever before.</p>
<p>Watch how a biometric solution works in this video:</p>
<p><iframe src="https://player.vimeo.com/video/290353215" width="640" height="360" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p><em>Credits: Genetec and Invixium Marketing</em></p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/how-biometrics-help-secure-universities-stores-and-many-businesses/">How biometrics help secure retail stores and businesses</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/how-biometrics-help-secure-universities-stores-and-many-businesses/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Vidsys has earned Frost &#038; Sullivan&#8217;s 2019 Technology Leadership Award</title>
		<link>https://www.smartechsecurity.com/vidsys-2019-technology-leadership-award/</link>
				<comments>https://www.smartechsecurity.com/vidsys-2019-technology-leadership-award/#respond</comments>
				<pubDate>Wed, 06 Feb 2019 02:21:25 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.vectorpropel.com/vectorpropel.com/smartech/?p=11649</guid>
				<description><![CDATA[<p>We are pleased to announce that one of our main technology partner Vidsys has earned Frost &#38; Sullivan&#8217;s 2019 Technology Leadership Award for Global Converged Security Information Management (CSIM) Systems. Congrats to the entire Vidsys team for this significant accomplishment. We feel privilege to work with you and to team up on real world security [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/vidsys-2019-technology-leadership-award/">Vidsys has earned Frost &#038; Sullivan&#8217;s 2019 Technology Leadership Award</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>We are pleased to announce that one of our main technology partner Vidsys has earned Frost &amp; Sullivan&#8217;s 2019 Technology Leadership Award for Global Converged Security Information Management (CSIM) Systems. Congrats to the entire Vidsys team for this significant accomplishment. We feel privilege to work with you and to team up on real world security solutions! Vidsys thanks for your continuous support on Smartech Security business growth</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/vidsys-2019-technology-leadership-award/">Vidsys has earned Frost &#038; Sullivan&#8217;s 2019 Technology Leadership Award</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/vidsys-2019-technology-leadership-award/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Global Security Exchange (GSX) 23-27 September 2018</title>
		<link>https://www.smartechsecurity.com/global-security-exchange-gsx-23-27-september-2018/</link>
				<comments>https://www.smartechsecurity.com/global-security-exchange-gsx-23-27-september-2018/#respond</comments>
				<pubDate>Thu, 11 Oct 2018 00:45:34 +0000</pubDate>
		<dc:creator><![CDATA[@aarango]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.vectorpropel.com/vectorpropel.com/smartech/?p=10784</guid>
				<description><![CDATA[<p>Global Security Exchange (GSX) is here in Las Vegas for the 2018 Convention.  And is the first year of its rebrand following a 63-year history as the ASIS International Annual Seminar and Exhibits, this powerful, action-packed conference is set to deliver the solutions, networking, and world-class experience you have come to expect from the industry’s [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/global-security-exchange-gsx-23-27-september-2018/">Global Security Exchange (GSX) 23-27 September 2018</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>Global Security Exchange (GSX) is here in Las Vegas for the 2018 Convention.  And is the first year of its rebrand following a 63-year history as the ASIS International Annual Seminar and Exhibits, this powerful, action-packed conference is set to deliver the solutions, networking, and world-class experience you have come to expect from the industry’s flagship event – multiplied.</p>
<p>GSX reflects ASIS International’s commitment to unite the full spectrum of security – cyber and operational professionals from all verticals across the private and public sectors, allied organizations and partners, and the industry’s top service and solutions providers – for the most comprehensive security event in the world.</p>
<p>For those who plan to be in attendance, we encourage you to embrace the professional growth that this week at the conference offers. While you’re there be sure to connect with us at Smartech Security, we would love to show you around the conference and chat about some of the security technologies we offer.</p>
<p>See you in Vegas!</p>
<p>The post <a rel="nofollow" href="https://www.smartechsecurity.com/global-security-exchange-gsx-23-27-september-2018/">Global Security Exchange (GSX) 23-27 September 2018</a> appeared first on <a rel="nofollow" href="https://www.smartechsecurity.com">Smartech Security</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.smartechsecurity.com/global-security-exchange-gsx-23-27-september-2018/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.w3-edge.com/products/

Object Caching 15/103 objects using disk
Page Caching using disk: enhanced 
Minified using disk

Served from: www.smartechsecurity.com @ 2020-08-06 03:17:17 by W3 Total Cache
-->