News

image description

Professional Security and the Pandemic

image description

How your organisation’s physical security can adapt to unusual times. As we’ve seen over the past few years, a state of pandemic can throw the world off-balance. Australian businesses and organisations have had to adapt to ensure continuity and the safety of their people during an event that the vast majority of us find unprecedented. […]

» Read More
Posted By: JD Security
Filed Under:

Minimise contact, improve efficiency & reduce costs with HID Mobile Access

image description

Mobile phones are a pivotal part of today’s technological landscape, in and out of business. Gone are the days where we needed to log onto a computer to access emails and documents — your entire work life now resides on your handheld device. Moving with this trend, HID Global has taken the utility of mobile […]

» Read More
Posted By: JD Security
Filed Under:

Inner Range Release Cyber Security Hardening Guides for Integriti & Inception

Inner Range has formalised its numerous cyber security initiatives releasing an updated Cyber Security Statement and Product Hardening Guides for its Integriti and Inception products. Senior Vice President Mark Cunnington states “Cyber security is clearly one of the major challenges facing organisations today and it is critical that Networked Security and Access Control systems are […]

» Read More
Posted By: JD Security
Filed Under:

Security Solutions for a post COVID-19 world

image description

Pandemic-related economic factors are likely to continue to present challenges across many industries in 2021. While the global pandemic has certainly taken the world by surprise, the security industry excels at planning for the unexpected & is resourceful in times of crisis. However, at a time when budgets are tight, many businesses, cities, critical infrastructure […]

» Read More
Posted By: JD Security
Filed Under:

Inner Range Inception V4.0 release significantly increases Cyber Security & Usability

Inner Range Inception V4.0 has been released and includes significant changes and enhancements aimed at further improving security and usability. Introduction of 2 Factor Authentication (2FA) Inception now supports 2 Factor Authentication for logins through the web interface which is enabled through the Google authentication app or other compatible apps that supports TOTP-based 2FA codes. […]

» Read More
Posted By: JD Security
Filed Under:

Genetec Security Center 5.10 Release

What’s new in Genetec Security Center 5.10? The latest release of Genetec Security Center, its unified security platform, is now available. Security Center 5.10 bridges the gap between on-premises systems and the Cloud with new connected services, a more powerful web client, and the ability to deploy our communication module, Sipelia, in the Cloud. This […]

» Read More
Posted By: JD Security
Filed Under:

Inner Range Bolsters Cyber Security With NIST Certification

Following on from the release of 2 Factor Authentication in Inception, Inner Range continues to enhance its cyber security credentials through the National Institute of Standards & Technology (NIST), which is a part of the United States Department of Commerce. The encryption algorithms used by Inner Range Integriti and Inception have both received the certification […]

» Read More
Posted By: JD Security
Filed Under:

A New Way to Fight Retail Shrink & Protect Profits

image description

Retail shrinkage is a serious concern for today’s businesses. Strictly defined, it’s inventory loss due to shoplifting, employee theft, administrative mistakes, or fraud by your suppliers. It’s a significant burden on hardworking business owners and retail organisations in Australia and around the world. The problem is one that’s also been growing over time. The National […]

» Read More
Posted By: JD Security
Filed Under:

Inner Range Integriti 20.1.1 Contact Trace Report

Included in the recent release of Integriti Version 20.1.1 is a Contact Tracing report which assists users to identify close contacts of a person who has or is displaying symptoms of an infectious disease The objective of contact tracing is to interrupt the spread of an infectious disease as quickly as possible. With this in […]

» Read More
Posted By: JD Security
Filed Under:

How Video Analytics Can Improve Access Control

image description

Organisations around the world are heavily invested in monitoring and controlling access at their facilities—and for a good reason. Buildings can hold a fortune in sensitive information, valuable assets, and critical workloads. It’s a gold mine for malicious actors looking to profit from or disrupt your business. It’s why companies spend on access control cards […]

» Read More
Posted By: JD Security
Filed Under: