Home Blog Page 413

Dahua Announces ECO Partner Programme

0
Dahua Technology’s online global Partner Day with the theme of “Building a digital future” celebrated co-operation with over 22 global partners and showcased interoperability,...

Tiandy TC-C34UP Bullet Camera Review

0
Tiandy TC-C34UP Bullet Camera Review ♦ Tiandy TC-C34UP Bullet Camera Review - Tiandy’s TC-C34UP Colour Maker is a 4MP bullet camera with 4 integrated 30...

Hanwha Wisenet X-Core AI and X-Plus AI From EOS

0
Hanwha Wisenet X-Core AI and X-Plus AI series cameras from EOS Australia feature AI-based object detection for false alarm reduction analytics, AI-enhanced image quality,...

New Enterprise Bundle from VSP

0
A new Lenovo and Axis enterprise bundle has just been released and is exclusive to VSP. Built and optimised for Axis Products, Axis Camera Station...

Adani Seeks Mine Security Gatehouse, Gates

0
Adani Australia is seeking expressions of interest for supply, installation and commissioning of CCM permanent gate house and entrance infrastructure, including gates and bollards...

SAGE Update – NSW & ACT Will Open Borders On November 1

0
The latest word from the Realm Hotel, host of Security & Government Expo 2021, is that ACT/NSW borders will open to vaccinated travellers on...

Pre-Register Now For SAGE 2021!

0
With NSW and ACT borders due to open on November 1, SAGE 2021 will be held at the Realm Hotel in Canberra on November...

TMA Working on AVS-01 Alarm Validation Standard

0
The Monitoring Association (TMA) is making progress on a new American National Standard, TMA-AVS-01: Alarm Validation Scoring. AVS-01 will use data applicable to alarm activations...

Eagle Eye Launches Vehicle Surveillance for Cloud VMS

0
Eagle Eye Networks Vehicle Surveillance Package (VSP) captures license plate and vehicle information received from distributed cameras and sends it to the cloud. Once in...

Cyber Secure Access Control Systems

0
Physical security is a key element of cybersecurity and according to Genetec there are 5 key pillars end users and security integrators must focus...