Call us +971 4 2428486

News & Events

Security and corporate systems integration now made easier with Quanika tech available through NIT for Middle East and Africa projects

NIT AETEK agreement

Software solutions ‘off-the-shelf’ will give advantage to IT and security integrators DUBAI, UNITED ARAB EMIRATES, 12 OCTOBER 2020 – IT and security systems integrators acrossthe Middle East and Africa can now deliver more efficient, off-the-shelf integration of complete corporatesystems – including access control, visitor management, security and building management – following adistribution agreement between Quanika and […]

Tags: , ,

Read more

NIT signs Distribution Agreement with AETEK for the META Region

NIT AETEK agreement

NIT, an Ingram Micro Company, a leading regional value-added distributor of IP surveillance and physical security solutions in the META (Middle East, Turkey and Africa) region, announced the signing a distribution agreement with AETEK, a professional developer and manufacturer for IP surveillance technology. With this agreement, AETEK’s full range of Camera Housing Products and its […]

Tags: , , , ,

Read more

8 questions to ask when choosing a provider for your end-to-end surveillance solution

By Mitch Mershon  If you’re in the market for a video surveillance system, there are many options to choose from.  The first question you might ask yourself is: What kind of system is right for me? Should I go with a best-of-breed system or a complete end-to-end solution? In our previous blog post, we discuss why an […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

The easy way to publicly stream video from IP cameras

Today’s security cameras do far more than just monitor their surroundings for threats. We’re seeing more and more businesses wanting to make their live videos available to the public.  From hotels using their online camera connection to show the beauty of their surroundings to tourists, to public infrastructure companies monitoring the traffic situation at intersections […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

The development of onboard cameras in transportation

By Erik Mårtensson  Over the past decade, network cameras have become an essential part of transportation safety and security. Thanks to the technologies that can now be integrated onto , the range of solutions they can be a part of has also increased: from boosting security inside vehicles to enhancing safety in passenger boarding and alighting, from improving […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

Data center security, from the perimeter to the rack

By Martin Koffijberg  If data is the new oil, as has often been claimed, are data centers the new power stations? It might sound like a grand claim, but when more and more of the data storage, processing and analytics that underpins so many aspects of business and society is handled by data centers, it’s perhaps […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

Cybersecurity in process monitoring within Oil and Gas

By Joe Morgan  I have been involved in the oil and gas industry in one form or another for over thirty-five years. This long tenure has enabled me to witness incredible changes in both the market and technology. There have been busts and booms, the discovery of new oil and gas fields and techniques to reach […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

Common cyber threats in a video surveillance system

 By Fred Juhlin  For the last seven years I have been working with questions related to cybersecurity.  I have been investigating concepts and defining methodologies, security controls, vulnerabilities, policies and processes.  In more recent years, I have been looking at common cyber security threats, common mistakes, and common concerns within in our ecosystem, and felt it […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

Multiple methods for motion detection

By Andres Vigren  There are many different options for motion detection, but which one best suits your needs? Here I look at some of the most widely used motion sensor technologies and explore the situations in which each can be used to its strengths. Choosing the right tool for the job An important and often overlooked […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

The critical role of lifecycle management in maintaining strong cybersecurity

By Ryan Zatolokin  If there’s one thing the rise in highly-publicized data breaches has taught us it’s that cybersecurity should be a priority for every organization with a network. Threats from unauthorized and unwanted intrusion are real. And if you’re not vigilant in protecting your devices and systems, the results can be catastrophic—anything from loss of […]

Tags: , , , , , , , , , , , , , , , , , ,

Read more

Top