IFSEC 2012 preview

June 2012 Conferences & Events

The following are a selection of the types of products to be found on display at IFSEC 2012.

New range of antenna feeders

Access with Turnstar

Stafix electric fence and security centres

Remote monitoring

Camsecure launches SmartProtect software

ATEC will stop foot-traffic

High-throughput iris biometrics

3D facial recognition

Connoisseur on show

Card printing

The smallest IP camera

Facial time & attendance terminal

Megapixel WDR

Dahua surveillance

neaMetrics delivers Suprema to IFSEC

Biometric coffee

Fire suppression

Green mobility

Mobotix products on show

Golmar up for grabs

Electronic access

Ready for combat

Visitor management system

Tactical lights

Protecting your view

German precision

Safe destruction and disposal of data carriers

Elvey on display

Exhibiting remotely

HD surveillance

Transceiver heaven

Lighting communications

Smallest IP fixed dome

Access from Centurion

OCC | Plastosac SA

Armour for life

Bloodhound on the trail

JVC Super LoLux HD

Fire in the hall

Local surveillance

Monitoring systems

Scanning inspection systems

Audit and control access to high risk areas

Off-site monitoring

Making a splash at IFSEC

Power at IFSEC

29 MP camera

Townhouse remote control

Honeywell security products on show

Even Flow Distribution

Keep access under control

Imperial Armour


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Kaspersky finds 24 vulnerabilities in biometric access systems
Technews Publishing Information Security
Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.

From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.