Use of technology best way forward for security industry in Kenya
SEE ALSO :Fight terror war with zeal - UhuruIt also has the ability to capture license plates and access automated number plate recognition of both full and partial number plates and an interactive 3D map with a visual overview of all installed cameras on a site map. Technology also allows integrated CCTV with access control, perimeter protection, fire and security alarms, facial recognition and traffic monitoring through a custom-built security system. With powerful video analytics, security systems can sound alarms when motion is detected, a trigger for unattended or abandoned objects, when an attempt is made to turn the CCTV cameras or when the image quality deteriorates due to blurring, soiling or blinding of the lens or darkening of the image. Critical information This solution allows external storage support with notification services via SMS, E-mail or voice with access via mobile phone or web, allowing real time monitoring.
SEE ALSO :Investor to meet MPs on mine stalemateTechnology has also aided in store management by combining in-store surveillance and monitoring of checkout transactions that provide critical information. ATM Intellect solution automates monitoring of self-service cash machines by integrating video with transaction data for live asset protection. These technologies are already available in our market. Supporting sustainable safety and security for our customers and the community will be enhanced by the use of intelligent systems and the proper training of our security teams to be able to detect, identify any unusual activity and raise the necessary alarm to be able to curb the rate of crime within the country. Necessary network security and intrusion detection measures must be put in place to prevent unauthorized access. In order to ensure the information remains safe even after successful network breaches, organizations are often required to set up full-disk encryption on all servers, workstations and removable devices. In this case, even if unauthorised personnel manage to gain access to the data, it will still be impossible to decipher the contents. Notably, technology is not intended to replace the human factor; it supplements human efforts to reduce the element of risk in any assignment. As the Government and private sector players work together to offer protection to the citizenry and their property, the use of modern technology needs to be at the centre of it. [email protected]