Encom Blog

  • Improve your Cyber Security

    Concern about cyber crime via IP camera networks is real and there is no single solution for staying safe. Effective cyber security is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And about partnering with Suppliers and Technology experts that offer support to you at every level. Encom partnering with Axis and Milestone offer this possibility. Concern about cyber crime via IP camera networks is real and there is no single solution for staying safe. Effective cyber security is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And about partnering with Suppliers and Technology experts that offer support to you at every level. Partnering with Encom, Axis and Milestone offer your business this possibility.

    With the frequency of cyber attacks making headline news, no wonder cybersecurity is top of mind. Cybersecurity threats to businesses are at an all-time high, escalating in frequency and level of sophistication.
    In this article we will examine:

    • How to spot the symptoms of poor cyber health
    • Tactics for protecting your data and network
    • Reasons your video surveillance system would be valuable to a cyber criminal
    • Building an internal company culture concerned about cybersecurity
    • Resources to help make improvements or maintain the current system
    vjfna/lgnrea/ 42% of individuals say end user failure to follow policies or carelessness were to blame when asked for an example of human error during a security breach.

    Spotting the symptoms of poor network health


    Cybersecurity for your Network Camera installation and your IT go hand in hand. At Encom we have 25 years experience helping business to look after and integrate both areas to provide the best possible security solution.

    If you have a strong, hardened network paired with policies, processes, and people all proactively monitoring and responding to cyber threats – and aligned with your organization’s stated cybersecurity goals – then you are in great shape! For the rest of us - read on.

    • Your IT and security teams are not aligned:
      It is important to get IT and Security teams to have aligned policies and processes with clear password management, ownership and responsibility to review security measures, have advance encryption methods applied to video streams and have hardware and software aligned with IT policies.
    • Your network users are not following policies and procedures:
      Have you policies and procedures in place that are documented and easy to understand? Are new and existing employees properly trained?
    • Your installation and maintenance plans are not clearly documented:
      Physical installation and maintenance can cause problems if your installer does not understand cybersecurity. Security, IT, facilities and maintenance departments need to be aligned on a documented installation and maintenance plan.
    • Your technology vendors aren’t talking to you about cybersecurity:
      Does the equipment you choose fit into your IT policy or are you trying to work your policy around your vendors? Are they talking about cybersecurity and best practices guides, performing tests and evaluating their product risks.

    10 best practices for a healthy network


    Creating and maintaining a secure network is a team effort and requires support from many different departments. You can’t do it alone. Once a plan is in place, communicate it through the organization and keep it top-of-mind when selecting and installing new devices on the network. Creating and maintaining a secure network is a team effort and requires support from many different departments. You can’t do it alone. Once a plan is in place, communicate it through the organization and keep it top-of-mind when selecting and installing new devices on the network.

    Along with your IT, security and facilities management teams, you can work to mitigate many of the common risks associated network’s cybersecurity.

    • Use strong, unique passwords:
      Set strong, unique passwords with a minimum of eight characters. Don't rely on the default settings of IP based devices. Ensure good password management, change passwords on a regular basis or use certificates in lieu of passwords.
    • Deploy and install devices in the recommended way:
      Where possible, cameras should be installed where they’re out of reach to a potential attacker. Unused services should be disabled and only trusted applications should be installed.
    • Define clear roles and ownership:
      Have clear rules and procedures established for which employees have particular access rights. Assign responsibility for reviewing security measures to ensure best practices. To reduce exposure, any device that accesses video should not be allowed to access cameras directly, unless it is required by the solution. Clients should only access video through a Video Management System (VMS) or a media proxy.
    • Use the latest applicable firmware:
      Bugs or flaws in operating systems found on workstations, servers, cameras, printers, and other network devices can put your organization at risk. Install patches and security updates and have a well-documented maintenance plan.
    • Perform a risk analysis:
      A cyber threat analysis will define how much you can lose and how much you should spend on protection. Make an analysis of potential threats as well as the possible damage and costs if the system is attacked. Include both internal and external threats.
    • Gain knowledge on system protection and possible threats:
      Take a closer look at the exact systems that run on your network. Work with your entire supply chain of vendors to understand any possible threats to your network in using your selected devices.
    • Change your devices’ factory default settings:
      Do not rely on any device’s default settings. Change the passwords and the default administrative account IDs. Enable and configure the device protection services and always disable any services you will not be using.
    • Use encrypted connections:
      Encrypted connections should be used on all networks, even local or ‘internal’ ones.
    • Secure the network:
      Understand your firewalls and filters. Taking the time to secure your network from the backbone helps to support all your other efforts to implement cybersecurity best practices.
    • Maintain your systems and processes:
      Monitor all devices on a regular basis and enable system notification when applicable and supported. You should also check access logs regularly to detect any attempts for unauthorized access.Once the plan is executed, it will need to be reviewed and assessed regularly. When it comes to the fast-paced world of technology, new updates, features and best practices are created all the time. Be sure to document your maintenance procedures to ensure existing and future colleagues understand your processes.

    To download the Axis E-book about Cybersecurity click here.

    To take the Online Cybersecurity Course click here.

    For more information on any of our products phone us now.

    Call Us:01 4545 465

  • Cyber-attack and Ransomware - What you need to know !

    ransomware-700

    Read More about Symantec Endpoint Protection Read More about Symantec Endpoint Protection

    After last weeks Cyber-attack the 'experts' are now telling us that these attacks are not over yet. Below is a list of things you can do to reduce the risk to business systems and personal computers. Training and educating staff, ensuring updated Content Scanning and Antivirus software is installed and having the latest hardware with in-built security will all help to minimize your exposure to problems.

    What can I do to protect myself from ransomware?

    User Education

    One of the primary vectors of these threats is “Spear Phishing” attempts, where an unsolicited e-mail will come from an unknown sender with an attachment that is then executed. Educating your users as to proper handling of unknown or suspicious files is crucial.

    Employ content scanning and filtering on your mail servers.

    Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.

    Maintain a current patch level for any operating systems and applications that have known vulnerabilities.


    Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.

    Install and configure Host Intrusion Prevention

    • IDS or IPS systems can detect and prevent the communication attempts that the malware uses to create the public and private encryption keys required to encrypt the data.
    • The Symantec Endpoint Protection (SEP) client IPS system blocks this type of communication traffic by default.

    Install, configure and maintain an endpoint security solution

    • With the endpoint being the final line of defense from any threat, a multi-faceted security solution should be employed. This solution should have protections for not just file based threats (traditional AV), but should also include download protection, browser protection, heuristic technologies, firewall and a community sourced file reputation scoring system.
    • Symantec Endpoint Protection 12.1 (SEP 12) users can leverage the supplied “High Security” Virus and Spyware Protection policy that was generated automatically during installation of SEP 12 to provide protection for ransomware threats.
    • For additional protection from new ransomware variants, the “High Security” policy can be edited and the Download Protection feature can be modified to act on files that have not been proven to be good by the Symantec user base. The options that would need to be altered are located in the “Download Protection” – “Download Insight” - “Also detect files as malicious based on their use in the Symantec Community” section. Enabling the two check boxes next to “Files with:” and “Files known by users for:” and using the default values of 5 and 2 respectively will force the SEP 12 client to treat any file that have not been reported to Symantec by more than 5 users or have been reported for less than 2 days to be treated as unproven files.
    • The handling of these files is set on the “Actions” tab under “Unproven files” and the setting of “Specify actions for unproven files:” should be set to “Quarantine risk”.
    • People using another endpoint AntiVirus solution should refer to their vendor for information on how to configure their real-time scanning options to be in-line wherever possible with “High Security” Virus and Spyware policy and the prevalence of any files as determined by their user base.

    Block your end users from being able to execute the malware

    • SEP users can leverage the Symantec supplied example Application and Device Control policies to prevent files from being run in the root and/or subfolders of the users %AppData% directory variable to prevent the downloaded threat from being launched. The policy prevents launch attempts of files that have been extracted from compression formats that the threat has been spreading in, blocks Auto-Run, access to script files and the execution of files from removable volumes.
    • Software restriction policies enforced via GPO can be created and configured to accomplish the similar tasks.

    Limit end user access to mapped drives

    The current ransomware threats are capable of browsing and encrypting data on any mapped drives that the end user has access to. Restricting the user permissions for the share or the underlying file system of a mapped drive will provide limits to what the threat has the ability to encrypt.

    Deploy and maintain a comprehensive backup solution.

    The fastest way to regain access to your critical files is to have a backup of your data. Backups of data should take place not only for files housed on a server, but also for files that reside localy on a workstation. If a dedicated peice of backup software is not an option, simply copying your important files to some sort of removable media and then removing that media from the system will provide a safeguard for your data being impacted by these types of threats.


    My data’s been encrypted by Ransomware, what now?

    • Do not pay the ransom! Paying the ransom may seem like a realistic response, but it is only encouraging and funding these attackers. Even if the ransom were paid, what guarantees do you have that you will actually regain access to your files? Remember that these are the same aggressors that are holding your files hostage in the first place. Paying the ransom can actually increase the likelyhood that you will be directly targeted for additional extortion attempts.
    • Remove the impacted system from the network and remove the threat.
    • With a multitude of variants it is unrealistic to list the exact steps, but most security vendors have detailed write-ups for the threats that include removal instructions. Removal is best done with the system off the networks to prevent any potential spread of the threat.
    • Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.

    Can I regain access to my files without paying the ransom or restoring from backup?

    • The answer is most likely no. There are earlier variants of these threats that simply hid the ransomed files, left copies of the original files with the Volume Shadow Copy service or left copies of the private encryption keys locally or in memory. It is certainly worth the effort of researching the details of the variant you encountered to see if there are options for you, but for the majority of instances, these options are no longer the case as the threat writers have updated their methods using the funds from earlier rounds of extortion.

    Can I “Brute-Force” my way into my encrypted files?

    • No, the current threats employ an RSA-2048 bit encryption key. Brute-forcing the key is simply not possible currently.

    For more information on any of our software please call our team and we will be happy to talk you through the most suitable options for you.

    Call Us:01 4545 465

  • Windows 10 Enterprise and GDPR

    Does your business process sensitive data, operate in a regulated industry, or develop software in-house? If so, you must get the increased security, controls and IT support that you need with Windows 10 Enterprise E3. Delivered as a cloud service and managed by Encom Does your business process sensitive data, operate in a regulated industry, or develop software in-house? If so, you must get the increased security, controls and IT support that you need with Windows 10 Enterprise E3. Delivered as a cloud service - managed by Encom

    Why you need to upgrade to Windows 10 Enterprise:

    • In light of the recent cyber-attacks the need for greater security has become even more apparent. Enhanced security measures need to begin now. With Windows 10 Enterprise you get the most secure version of Microsoft’s OS.
    • General Data Protection Regulation (GDPR). In May 2018 new regulation will be implemented throughout Europe. Windows 10 Enterprise offers built in security, controls and IT support delivered through the cloud.

    Why Microsoft Enterprise?

    • Microsoft take a principled approach with strong commitments to privacy, security, compliance and transparency.
    • Moving to the cloud makes it easier for you to become compliant with privacy regulations by managing and protecting personal data in a centralized location.
    • Microsoft is the industry leader in privacy and security with extensive expertise complying with complex regulations.

    windows-10-enterprise

    What you need to do now!
    Discover: Identify what personal data you have and where it resides.
    Manage: Govern how personal data is used and accessed within your organisation.
    Protect: Establish security controls to prevent, detect and respond to vulnerabilities and data breaches.
    Report: Keep required documentation, manage data requests and breach notifications.

    The Windows 10 Defense Stack

    Pre-Breach

    • Device Protection: Device Integrity and Control
    • Threat Resistance: Smart Screen, Windows Firewall, Microsoft Edge, Device Guard, Windows Defender
    • Identity Protection: Windows Hello, Credential Guard
    • Information Protection: BitLocker and BitLocker to Go

    Post-Breach

    • Breach detection investigation and response: Conditional Access, Windows Defender ATP
    Talk to Encom today about your requirements to meet the new regulations for GDPR. Let us help you to implement changes to your IT systems to ensure you are compliant and have the highest level of security and data protection. Talk to Encom today about your requirements to meet the new regulations for GDPR. Let us help you to implement changes to your IT systems to ensure you are compliant and have the highest level of security and data protection.

    Call Us: 01 4545 465

  • Notebooks-7th Generation Intel® Core™ processor

    7th-generationTired of your old laptop. Encom are offering great value on the latest up-to-date range of notebooks and 2-in-1's to solve your challenges with productivity, security and battery life.

    • Get Performance and Portability: Seize portable possibilities with new 7th Generation Intel® Core™ processor-based laptops. Equipped with unprecedented power and responsiveness, you’ll be able to take your productivity, creativity and entertainment to the next level and experience amazing graphics and gaming.
    • Razor-Thin Meets Ultra-Fast: Get powerful laptop performance in a light, transformable device, giving you the agility to work wherever you need.
    • A Visual Feast: Intel® HD Graphics and Iris™ Plus Graphics let you watch your favorite videos in high resolution, edit the smallest details of your photos, and enjoy vibrant gaming experiences. Plus, 4K Ultra HD (UHD) with Iris™ Plus Graphics offers up an immersive viewing experience like never before.
    • Energy that Lasts: Long-lasting battery life gives you impressive performance. With up to 10 hours on a single charge,1 your laptop can keep up with you wherever you go.
    • Robust Data Security: Intel is enabling a new level of security for businesses and consumers with Intel® Authenticate Solution. By using hardware-enhanced enterprise-grade factors of authentication, consumers can be free of the annoyance of using passwords for logging into their PC and for secure online transactions and payments, and gain more peace of mind and strong protection for personal information.

    Desktops and 7th Generation Intel® Core™ processors


    • General Performance , Speed and Responsiveness:
      • Desktop 7th Gen Intel Core processors offer up to 20% better performance compared to previous generation
      • Mobile 7th Gen Intel Core processors offer up to 20% better performance versus a 3 year old PC
    • Entertainment
      • Mobile 7th Gen Intel Core processors offer up to 5.5 x faster 4K 360° video creation versus a 3 year old PC
      • High-fidelity Audio
      • Smooth 360° video play back while multitasking.
      • 4K Ultra HD HDR Support and premium 4K Ultra HD Content.
    • Mobility and Flexibility
      • Simple versatile and fast connectivity with other devices using thunderbolt 3 technology.
    • Security
      • 7th Gen Intel Core processor based PCs with windows 10 and McAfee provide improved hardware enhanced worry free computing for IP, data, identity and privacy protection usages.

    And there's more...

    Get the best possible computing experience with a 7th Gen Intel Core Processor add a 4K monitor for clearer gaming, an Intel Solid state drive for high speed storage and Thunderbolt peripherals for fast and easy connectivity.

    • 4k Monitors
      • Up to 35% faster 4K Ultra HD 360° video creation versus a 3 year old desktop.
    • Thunderbolt Peripherals
      • Remove the burden of multiple wires. Thunderbolt 3 technology offers a simple versatile one-wire connectionto your PC for power, data and dual 4K HD displays
      • Plus, Intel Wireless Docking based on WiGig offers support for up to 2 full HD monitors ad numerous USB peripherals for today's thin and light weight mobile devices.
    • Intel Solid State Drives
      • Combined with the high speed storage capabilities of an Intel Solid State Drive get the performance you need without the lag time or moving parts of a traditional hard drive.
  • Intel Optane Memory

    Intel® Optane™ memory is the first of its kind: a system accelerator that delivers a whole new breed of speed. Paired with a 7th Gen Intel® Core™ processor, it creates a transformative computing experience that you cannot do without. Intel® Optane™ memory is the first of its kind: a system accelerator that delivers a whole new breed of speed. Paired with a 7th Gen Intel® Core™ processor, it creates a transformative computing experience that you cannot do without.


    By remembering the applications and tasks that you use most often, the intelligence of Intel Optane memory personalizes performance and responsiveness.

    • Deliver fast, smooth, and easy experiences: Make everyday tasks up to twice as responsive with Intel Optane memory.

    • Accelerate everything: Improve launch times by up to 5x for web browsers, up to 5.8x for e-mail, and up to 67 percent for games.
    • Optimize mega storage: Add Intel Optane memory to a hard disk drive-based computer and deliver up to 14 times better storage performance.

    Accelerate Your Experience

    This game-changing technology intelligently accelerates new 7th Gen Intel® Core™ processor-based systems while affordably maintaining mega-storage capacity, to deliver a responsive computer experience with short boot times, fast application launches, extraordinary gaming, and responsive browsing.

    Intelligent System Acceleration

    Optimize your computer responsiveness from system boot to application launch. Intel® Optane™ memory is a smart and adaptable system accelerator that adjusts to your computing tasks making everything you do faster, smoother, easier. Its intelligent software automatically learns your computing behaviors to accelerate frequent tasks and customize your computer experience.

    Read More about Intel® Optane™ Memory

  • Computers for Business

    New devices powered by 7th Gen Intel core vPro Processors deliver serious business compute, hardware-enhanced security and give control with remote manageability New devices powered by 7th Gen Intel core vPro Processors deliver serious business compute, hardware-enhanced security and give control with remote manageability

    High-performing devices based on the 7th Generation Intel® Core™ vPro™ processors streamline productivity and performance for serious business compute by enabling maximum multitasking efficiency and up to 10 hours of unprecedented battery life.
    For employees on the go, 7th Generation Intel® Core™ M vPro™ processors deliver the optimal combination of performance, battery life, and wireless capabilities in a razor-thin device. Built in Intel® vPro™ technology provides hardware-enhanced security, remote manageability, and productivity-enhancing capabilities to keep you moving forward.

    • HARDWARE-ENHANCED SECURITY With Intel® Authenticate, get in front of security with hardware-enhanced identity protection, customizable multifactor authentication options to fit your policies, and an end-to-end solution that’s easy to deploy.
    • REMOTE MANAGEABILITY With Intel® Active Management Technology (AMT), peace of mind starts with your processor. Put time back in the bank with remote maintenance that’s no sweat, wireless manageability for your mobile workforce, and secure drive wiping to simplify PC lifecycle transitions.
    • SIMPLE COLLABORATION With Intel Unite®, here’s to meetings that start without calls to IT, intelligent spaces that make workplace transformation scalable, and an extensible platform that streamlines existing tools – such as Skype for Business and Zoom.

    For information and the best advice on what products suit your business needs call our team now!

    Call Us:01 4545 465

  • Jabra Evolve 75

    Designed to support concentration in the open office, the Jabra Evolve 75 manages office sounds and interruptions with active noise cancellation and integrated busylight Designed to support concentration in the open office, the Jabra Evolve 75 manages office sounds and interruptions with active noise cancellation and integrated busylight

    Experience the new Evolve 75 and prepare to be amazed

    • Outstanding sound delivers crystal-clear calls and music: HD voice for calls. World-class speakers for music.
    • Boost productivity by reducing noise and interruptions: Best-in-class ANC and integrated busylight act as a ‘do not disturb’ sign.
    • Freedom to move around: Dual Bluetooth® connectivity to two devices at the same time for calls and music. Flexibility to move up to 100ft/30m away from your connected device.

    The Jabra Evolve series now offers a new premium wireless headset for modern office workers, the Jabra Evolve 75. Boasting a unique combination of features including superior Active Noise Cancellation (ANC) and an integrated “do not disturb” busylight, Jabra Evolve 75 is the best wireless headset for concentration in the open office.

    The headset is the latest addition to the successful Jabra Evolve series, which has sold more than 2.5 million units worldwide. The range was developed to reflect the way people work and enable focused and distraction-free performance in open office settings. The Jabra Evolve 75 takes this promise to the next level by combining the strongest parts of the Evolve range: wireless freedom, great sound, ANC and a busylight.

    The Jabra Evolve 75 comes equipped with world-class speakers for music and high-definition (HD) voice for crystal clear calls. Dual Bluetooth® connectivity supports calls and music by allowing the user to simultaneously pair the headset with two connected devices, such as a computer and smartphone. With a wireless range of 100 feet for laptops and 33 feet for smartphones, the headset also enables the flexibility and freedom to move, allowing workers to multi-task without the noise and interruptions from colleagues that stifle concentration and productivity.

    Recent research from Jabra found that knowledge workers lose 24 minutes each day due to noise and interruptions, while 78 percent believe their productivity is negatively impacted. The Jabra Evolve 75 is the ultimate business tool for sound and freedom, helping workers collaborate, concentrate and remain productive in busy, open place offices without the need for designated quiet rooms.
    “The premise behind the open plan office is to foster collaboration and improve communication among employees. But despite their many benefits, they have become breeding grounds for unsatisfactory labour output”, commented Holger Reisinger, SVP, Jabra Business Solutions. “Interruptions from colleagues and the noise generated in these environments are negatively impacting workers and contributing to lacklustre performance. Increasingly, knowledge workers are being forced into isolation to do their jobs. The Jabra Evolve 75 provides businesses with an alternative solution to support an open office philosophy that’s conducive to better performance.”

    Certified for modern office use

    The Evolve 75 meets Open Office and Outdoor requirements for Skype for Business from Microsoft and is also certified for Skype for Business, Cisco and other leading Unified Communications (UC) platforms.

    For IT-decision makers, the hassle-free and easy-to-use headset increases UC adoption by seamlessly and intuitively bridging the gap between the mobile phone and computer. The Jabra Evolve 75 is also compatible with Jabra Direct – free cloud-based software that lets users personalize and manage the headset.

  • Why the quality of software matters!

    Print

    A VMS might be free, but if no one updates the software or handles requests for new features, the word free might mean free now, and costly later.
    Peter Jacobsen, Director Test & Driver at Milestone Systems

    Our world runs on software. Every business depends on it and every mobile phone uses it. Every new car relies on code. Without software, modern civilization would fall apart. Given this reality, the quality of that software really matters. Because it’s so widely used and so important, low-quality software just isn’t acceptable.

    We all know the feeling. We randomly click on something and the computer freezes for no apparent reason. This usually happens when we have forgotten to save an important document. This is one of the hallmarks of low quality software. We might accept this if it is a free computer game we just downloaded. But we won’t when it comes to mission-critical software like a VMS system.

    Software quality, defined

    Quality software is reliable, reasonably bug-free, meets requirements and expectations and is maintainable.

    Key aspects of quality for the customer include:

    • Reliable – acceptable level of breakdowns or failure
    • Efficiency – fast and able to utilize the HW
    • Good functionality – it does the job well
    • Good design – look and style
    • Security
    • Maintainability

    High quality in software is achieved by having highly skilled people taking qualified design choices at every step of the way.

    Software quality comes from:

    • The right design choices - Knowing your customers, their needs and expectations
    • The right technology choices – Knowing how to get the optimal solution using the right technology
    • Being brave - Not holding on to outdated choices, but making the necessary changes at the right time
    • Testing – Making sure that the software behaves as expected with the performance, stability and security required
    • Maintenance and support - Keeping the software secure and updated

    Bad quality is hard to fix because of the number of choices that have to be changed and tests that need to be redone. It can easily take ten times the hours to track down and fix a software bug than it takes to develop a quality feature from the very beginning.

    Time will always be money

    Making quality software takes time that has to be funded somehow. Software engineers might participate in software projects out of dedication. Some of these projects produce world class software. But when the dedication vanes, the project withers. Commercial software is pricey but guarantees updates, bug-fixes and plans for new features.

    A VMS might be free, but if no one updates the software or handles requests for new features, the word free might mean free now, and costly later.

    One part of software quality is security. What do we do about users with malicious intent? Those who examine software looking for backdoors and loopholes? Quality in software is also a matter of securing the software against cyber-attacks. Just like quality, cyber security has to be built into the development right from the start. It must be a part of the mindset of the software creator.

    The Security Life Cycle

    In Milestone, we have a Security Life Cycle concept. We constantly train our software engineers in developing the most secure software and documenting choices taken. Our software is evaluated by an independent third party and the purpose of our continuous feedback process is to improve security. We are open about this and share our cyber security initiatives with the Milestone Community and invite the community’s feedback.

  • Facial Recognition Software

    Recognize. Identify. Verify.

    Facial recognition software will:

    • Enhance and improve control over who is entering and exiting a special area or building.
    • In combination with an access control system, ensure that entry is limited only to authorized persons.
    • Send an alarm or notify the staff when unwanted or unknown individuals appear.
    • Assist organizations in being more operationally efficient.
    • Present a reliable methods of recognizing and identifying selected key customers or clients who can be given extra attention and have an overall better experience.

    Matching faces

    The facial recognition software matches faces taken from real-time video with a database of previously stored images of faces. You categorize the faces in the database based on your application need – be it access control, VIP detection, or wanted individuals.

    When a face is captured on the camera, the matching takes place in real time, and a match or non-match either allows or denies access, or triggers an alarm alerting pre-determined stakeholders to take appropriate action.

    Multiple possibilities

    Facial recognition solutions are available for a wide range of applications, including:

    • Integration with access control systems in corporate and commercial buildings.
    • V.I.P. identification at casinos, hotels or high-end retail stores.
    • Watch- or black listing at stadiums, retail stores or casinos.
    • Detection of wanted persons at airports.
    • In motion identification with Biometrics Technology

    Download the White Paper

  • Axis Q29 Temperature Alarm Camera

    Temperature Alarm CamerasLeft: Network Camera Middle: Thermal Camera Right: Temperature Alarm Camera
    Both Axis Thermal Cameras and Axis Temperature alarm cameras are based on thermal imaging and use the same sensor technology. Axis thermal cameras are used mainly for detection. Axis Temperature Alarm cameras are used for remote temperature monitoring with the possibility to set temperature alarms, but can also be used for detection.
    Axis Q29 Series Temperature Alarm Cameras Read the details: Axis Q29 Series Temperature Alarm Cameras
    • Axis Temperature Alarm cameras make it possible to monitor the temperature of an object or an industrial process so that it does not rise above or fall below a certain temperature limit.
    • Unlike ordinary temperature sensors that only measure at one specific point, Axis temperature alarm cameras can be used for remotely monitored surveillance, giving visually conformation of events at the monitored scene.
    • Spot temperature capabilities, to fast predict failures by indicating problem areas before the issue becomes visible to the eye or before machinery stops working.

    Axis temperature alarm cameras feature several unique capabilities:

    • Set temperature alarms: There are two different kinds of alarms. The user can set up an upper or lower temperature limit. If the temperature goes beyond the set limit, the alarm is triggered.
    • Using the ‘Rainbow’-isothermal palette it is possible to highlight the temperature span and easy identify if a surface reaches a defined temperature. Using the ‘Rainbow’-isothermal palette it is possible to highlight the temperature span and easy identify if a surface reaches a defined temperature.
    • The user can also restrict how fast a temperature may change. If the temperature increases or decreases too rapidly, the temperature alarm is triggered.

    In the event of a temperature alarm, the operator will rapidly be able to see whether the alarm is false, since the isothermal image will show whether it was the critical object or something else that triggered the alarm.

    Another capability is so called ‘spot temperature’, where the camera measures the temperature of 9 pixels (3×3) anywhere in the image where the user clicks. The user can adjust the emissivity setting depending on the object, to get a more precise reading. As with isothermal palettes, spot temperature is used only as a visual aid for an operator.

    Read more about how Thermal Imaging works

    Screenshot from AXIS Q2901-E Temperature Alarm Camera. Clicking on the desired area provides with the Spot temperature reading. Screenshot from AXIS Q2901-E Temperature Alarm Camera. Clicking on the desired area provides the Spot temperature reading.

    Read About Encom Explosion Proof Cameras here...
    Entrance

    Call Us: 01 4545 465

  • Getting the full 7th Generation Experience

    7th-generation-core-bannerThe new 7th Generation Core Processors are built for business users, content creators and gaming enthusiasts. There are many benefits:

    • General Performance , Speed and Responsiveness:
      • Desktop 7th Gen Intel Core processors offer up to 20% better performance compared to previous generation
      • Mobile 7th Gen Intel Core processors offer up to 20% better performance versus a 3 year old PC
    • Entertainment
      • Mobile 7th Gen Intel Core processors offer up to 5.5 x faster 4K 360° video creation versus a 3 year old PC
      • High-fidelity Audio
      • Smooth 360° video play back while multitasking.
      • 4K Ultra HD HDR Support and premium 4K Ultra HD Content.
    • Mobility and Flexibility
      • Simple versatile and fast connectivity with other devices using thunderbolt 3 technology.
    • Security
      • 7th Gen Intel Core processor based PCs with windows 10 and McAfee provide improved hardware enhanced worry free computing for IP, data, identity and privacy protection usages.

    Desktops and Mobiles

    Get the best possible computing experience with a 7th Gen Intel Core Processor add a 4K monitor for clearer gaming, an Intel Solid state drive for high speed storage and Thunderbolt peripherals for fast and easy connectivity.

    • 4k Monitors
      • Up to 35% faster 4K Ultra HD 360° video creation versus a 3 year old desktop.
    • Thunderbolt Peripherals
      • Remove the burden of multiple wires. Thunderbolt 3 technology offers a simple versatile one-wire connectionto your PC for power, data and dual 4K HD displays
      • Plus, Intel Wireless Docking based on WiGig offers support for up to 2 full HD monitors ad numerous USB peripherals for today's thin and light weight mobile devices.
    • Intel Solid State Drives
      • Combined with the high speed storage capabilities of an Intel Solid State Drive get the performance you need without the lag time or moving parts of a traditional hard drive.

  • Top technology trends in the security market

    Johan Paulsson is CTO of Axis Communications and has overall responsibility for its current crop of products and its thinking about what the future might hold for Security in 2017. Read on to find out where he sees its future.

    avhs_infographic_en_450

    Security as a service

    We expect customers will start to see their security as a service – remote and professionally hosting and monitoring of video transmitted from the customer’s site. This will not only free up internal resources which could be better focused elsewhere, but also improve the service levels, enable better device-management, and strengthen cyber security.

    Integrated solutions

    The security industry will continue its trends of offering more specific solutions to particular situations. In the end, customers aren’t looking to buy hardware/software – what they really want is to reduce shoplifting, or make sure only certain people can access the cash office, or keep track of potential threats in an airport. The convergence of hardware into end-to-end solutions will be able to address specific security problems. They will consist of high-performance cameras, storage and access controls tightly integrated with video management and analytics tools. This approach will be easier for customers to purchase, install and implement, while offering a great return on their investment.

    Expanded use of analytics

    While high quality video footage is a core feature of modern security cameras, ultimately that information needs to be assessed and analyzed before a decision can be made to respond to its content. The recent advances in camera technologies, such as thermal imaging and enhanced low-light capabilities have been significant steps forward. But in the end, they just generate more footage that needs to be watched/reviewed. The security industry has been working hard on video analytics software that can work in real time to help professionals make informed decisions. We expect to see 2017 as the year when these new camera capabilities are combined with real-time analytics to address several security challenges, including facial recognition, forensic analysis and perimeter protection.

    Deep Learning

    With all this data being gathered, we are seeing deep learning technologies being more broadly used within the security industry. As more data is gathered, computers can start to learn about what behavior is expected for certain typical locations or environments and flag up incidents when unexpected activities occur. This is only the beginning and is a very exciting space to keep an eye on.

    Beyond video

    Physical security doesn’t just involve watching people/places/stuff. It’s also about access to places, communication and managing emergencies – and sometimes having to do that kind of thing from a significant distance. So, we see 2017 as being the year when fully-integrated physical security systems, combining cameras, intelligent doors, intercoms and speakers become viable.

    Cybersecurity

    ‘The Internet of Things’ has evolved from buzzword status to mainstream reality, but not without its challenges. While we still think the idea of millions of IP-enabled devices is an exciting prospect for the future, 2016 gave us a sobering reminder of the pitfalls of not properly securing all those internet-connected fridges, DVRs and unfortunately security cameras. Axis has always taken its customers’ security seriously, but we will hopefully see 2017 as the year when all manufacturers make this a priority. The biggest challenge we see with cyber security is to find the right balance between secure devices/systems and complexity/ease of use. We will continue to strengthen our existing offerings and make it easier for our customers to keep their networks and devices secure.

    Conclusion

    We think the Internet of Things should be about better security, and more efficient businesses, organizations and cities thanks to “smart” cameras, door stations and audio equipment with network connectivity. 2017 will add more ‘smarts’ to those devices, while also enabling customers to focus on what they do best and allowing security specialists to improve the services they provide.

  • IBM Intelligent Video Analytics

    IBM Intelligent Video Analytics cuts through the vast linear process of video monitoring by converting video images to data. IBM Intelligent Video Analytics cuts through the vast linear process of video monitoring by converting video images to data.

    IBM Intelligent Video Analytics helps organisations develop comprehensive security, intelligence, and investigative capabilities using video. You can use advanced search, redaction and facial recognition analytics to find the relevant images and critical information across multiple video files from multiple types of cameras. Selected live-streaming cameras plus pre-recorded video ingestion from both fixed cameras and cameras in motion are supported. IBM IVA is compatible with Axis and Milestone products.

    The Intelligent Video Analytics base installation includes these functions for live streaming, fixed cameras:

    • Real time alerts to call attention to events
    • Rich content-based indexing to find critical images and patterns
    • Standards-based open and extensible architecture

    Optional capabilities extend the solution:

    • Ingestion of pre-recorded videos from both fixed cameras and cameras in motion. With ingested video files, analysts can extract critical information and find relevant images faster, which may help accelerate investigations.
    • Automated intelligent redaction
    • Advanced facial recognition to aid lead generation and risk assessment
    • Advanced people search capabilities based on cognitive analytics

    Real-time alerts to call attention to events

    Intelligent Video Analytics provides event-based security that analyzes streaming video feeds from fixed cameras to provide real-time alerts about user-predefined behaviors of people, vehicles, or objects. It can help identify perimeter or tripwire breaches, abandoned objects, objects removed, vehicles moving in unexpected directions, and more. In addition, a key differentiator from other analytics offerings is that Intelligent Video Analytics indexes these alerts along with other activities across cameras and sensors. It can index a whole set of attributes about each and every event.

    Advanced search

    Intelligent Video Analytics' basic detection, classification, and indexing algorithms can index hundreds of millions of events and alerts to create a full index for live-streaming fixed cameras that can be quickly searched, analyzed, and correlated in seconds. Users can data mine the index for a wide array of criteria, including searches of real-time and historical data for specific items, such as vehicles and objects.

    To help search further, the data mining capabilities allow for searching by such attributes as color and size. Additionally, Intelligent Video Analytics provides a statistical analysis of events that can be sorted by date and time, or over an extended period of time, in order to perform a trend analysis. These figures are directly linked back to their particular video feed or ingested file for immediate viewing when a potential anomaly has to be reviewed promptly.

    Rapid searching for persons of interest

    Cognitive analytics that are part of Intelligent Video Analytics optional capabilities can help make forensic searching for images of people within video files simpler and faster. The solution can search hundreds of hours of footage across multiple files from a variety of camera types.

    The agency can set search criteria for characteristics such as hair color, baldness, facial hair, age range, glasses, skin tone, gender, clothing colors or patterns, and more. Once the agency sets the characteristics, searching for such attributes is done automatically. This capability may reduce the extensive time and effort that would otherwise be required of an analyst or officer to view all the footage manually.

    Automated redaction

    Once video is captured, whether from cameras in motion or from fixed cameras, it may be necessary to share clips with the media, the public, and other security organizations. Intelligent Video Analytics includes an optional capability for redaction to assist organizations in their efforts to comply with privacy and criminal justice evidence handling laws for publicly shared video.

    To use the redaction function, an agency or organization sets up the criteria to automatically blur out sensitive images that may have been captured by the camera lens. Manually performing such a task would be labor-intensive work. Automated redaction may significantly reduce the time and labor required to release video footage for shared use. Intelligent Video Analytics includes the following redaction functions:

    • Redact one or more faces for a specified video segment.
    • Optionally redact all detected faces.
    • Redact all pixels for a specified video segment.
    • Redact image pixels that are outside the selected regions for a specified video segment.
    • Manually select an object, such as computer screen, to be redacted from a video segment.
    • Manually redact any content of a single video frame.
    • Automatically redact selected objects with optional user adjustments.
    • Redact specified video content with options of various masking techniques, including blurring, pixilation, blank mask, and gradient map.

    Face capture and recognition for lead generation

    Faces captured by body-worn cameras or fixed cameras could prove helpful to security analysts and investigators when run through facial recognition tools. However, not all face capture images will yield effective results; the more images of a face that are captured, the greater the likelihood of a resulting match. Optional cognitive analytics in Intelligent Video Analytics provide greater accuracy to help identify good facial images for further recognition analysis, potentially saving time and personnel costs, and possibly identifying a person of interest who might otherwise have been missed.

    To enable facial recognition, the agency enrolls or loads a set of facial images representing potential persons of interest into their Intelligent Video Analytics watch list. The analytic software automatically compares the faces identified in ingested video clips with the faces in the watch list. The facial recognition function detects high-quality matches and sends them to Intelligent Video Analytics as a recognition alert. This process can take a matter of minutes rather than the hours previously needed to review footage and manually cross-check with all the persons of interest.

    Standards-based open and extensible architecture

    The Intelligent Video Analytics architecture is designed specifically to facilitate interoperability with products from different vendors to broaden and enhance the overall security framework for the particular environment in which it is deployed. This approach to video analytics and security helps an organization to deliver preventive security controls, countermeasures, and safeguards, and to evolve, as necessary, by incorporating third-party products and services (such as specialized analytics, sensor data, and integration with transactional information technology systems). Intelligent Video Analytics interoperability contributes to its ease of implementation by leveraging and enhancing current technologies rather than isolating them. As a result, it provides the necessary framework to help implement effective security controls that can adapt to ever-changing and new threats.

    Call Us: 01 4545 465

  • SQL Server 2016

    SQL-Server-2016-750

    Industry leading-Build mission-critical, intelligent apps with breakthrough scalability, performance, and availability.

    Security & performance- Protect data at rest and in motion. SQL Server is the most secure database for six years running in the NIST vulnerabilities database.

    End-to-end mobile BI- Transform data into actionable insights. Deliver visual reports on any device—online or offline—at one-fifth the cost of other self-service solutions.

    In-database advanced analytics-Analyze data directly within your SQL Server database using R, the popular statistics language.

    Consistent experiences- Whether data is in your datacenter, in your private cloud, or on Microsoft Azure, you’ll get a consistent experience.

    • SQL Server 2016—everything built-in: Turn your mission-critical applications into intelligent application with SQL Server 2016—the first database that is born in the cloud, setting a new standard for the pace of innovation.
    • SQL Server 2016, coming soon, offers faster analytics, unique hybrid capabilities, industry leading security and much more.
    • SQL Server 2016 is a game-changer. It was built cloud-first for the new world of massive data, machine learning, and advanced analytics.

    What are the Benefits of SQL Server 2016

    SQL Server 2016 delivers breakthrough mission-critical capabilities in scalability, performance, and availability for your most important OLTP and data warehousing workloads.

    • Scale up to 12 TB of memory and 640 logical processors with Windows Server 2016
    • Reach up to 30x faster transactions and 100x faster queries with enhanced in-memory performance
    • Run real-time Operational Analytics over transactional data
    • Balance loads across readable secondaries in Always On availability groups

    Most secure database

    Our multi-layered approach to security has a proven track record of producing the least vulnerable database, even while being the most widely-used database on the planet.

    • Rely on a database with the least vulnerabilities of any major platform—six years in a row
    • Protect data at rest and in motion with TDE and new Always Encrypted
    • Mask sensitive data with minimal application impact using Dynamic Data Masking
    • Grant access based on user characteristics with Row Level Security

    Comprehensive business intelligence

    SQL Server 2016 delivers a comprehensive, on-premises, enterprise-ready BI platform that helps you to transform complex data into actionable insights.

    • Create modern reports and visualize dense data with additional chart types
    • Access KPIs and mobile and paginated reports using the SQL Server Reporting Services web portal
    • Get faster SQL Server Analysis Services performance with parallel processing
    • Use enhanced multidimensional models in SQL Server Analysis Services
    • Easily set up SQL Server Data Tools Preview in Visual Studio 2015

    In-database advanced analytics

    Built-in advanced analytics provide scalability and performance for building and running your advanced analytics algorithms directly in the core SQL Server transactional database.

    • Transform complex data from multiple sources into trusted data models using the most popular statistical modelling language
    • Process analytics in-place, reducing latencies and operational costs
    • Write models once and deploy anywhere: in-database, to the cloud, or to Linux, Hadoop, and Teradata
    • Access thousands of R Scripts and Models in CRAN (Common R Archival Network)

    Consistent experience from on-premises to cloud

    SQL Server 2016 delivers a consistent experience both on-premises and cloud. You get an exceptional experience whether data is in your datacenter, in a private cloud, or on Azure.

    • Dynamically stretch warm and cold data to Azure with Stretch Database
    • Tackle your mission-critical workloads with larger Azure virtual machine sizes
    • Rely on our cloud-first features, tested by millions of Azure databases
    • Use the skills you already have with common development and management tools and common T-SQL everywhere

    Call Us:01 4545 465

  • Ultrastar He10-10TB hard drive

    10tb-hard-driveWestern Digital Corp. further expanded its data center SSD and HDD portfolio with the introduction of next-generation storage solutions designed to help IT managers address the intensive data and extreme performance demands of today’s enterprise, cloud and hyperscale workloads.

    The Ultrastar He10 is hermetically sealed and filled with helium, and it has seven platters crammed into a standard-height 25.4mm (1-inch) hard drive.

    HGST delivers the very best capacity hard drive in the industry – Ultrastar He10 and is now available.

    • The He10 uses PMR technology and is the industry’s first 10TB drive that is drop-in ready for any enterprise-capacity application or environment.
    • Based on field proven, third-generation HelioSeal® technology, it offers the lowest power profile in the industry to help data center architects meet eco-environmental goals and requirements.
    • Targeted at 2.5M hours MTBF, the He10 provides the highest reliability rating available of all HDDs on the market today by building on the successful design of its 8TB and 6TB predecessors.
    • Ultrastar He10 will deliver more capacity, more efficiency, more reliability and more value to your data center.

    Download the Data Sheet

    Call Us: 01 4545 465

Items 1 to 15 of 116 total

Page:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. ...
  7. 8