securitylinkindia

ASIS Opens Call for Presentations

ASIS International has opened the call for presentations for its 64th Annual Seminar and Exhibits (ASIS 2018), taking place during 23-27 September 2018 in Las Vegas that is expected to attract 22,000+ registrants from more than 95 countries. Produced in partnership with the Information Systems Security Association (ISSA) and InfraGard, ASIS 2018 will deliver the most comprehensive education program for operational and cybersecurity professionals from the public and private sector. The conference program will feature 180+ education sessions addressing the full spectrum of risk from contemporary security threats including IoT security, crisis management and response, and AI and robotics, to day to day security challenges including guard force management, data protection, and enterprise security risk management (ESRM). The program selection committee is looking for: Security-related content that will challenge and inspire. Proposals at the intermediate to advanced levels. Case studies and benchmarks with actionable takeaways. Immersive learning formats that engage attendees. Proposals developed by security end-users are preferred.

Read More

INTERPOL UPDATES

INTERPOL Cracks Massive Human Trafficking Ring Operation rescues 500 victims, lead to 40 arrests Nearly 500 victims of human trafficking, including 236 minors, have been rescued following an INTERPOL operation carried out simultaneously across Chad, Mali, Mauritania, Niger and Senegal. In total, 40 suspected traffickers were arrested and will now face prosecution for offences including human trafficking, forced labour and child exploitation. They are accused of forcing victims to engage in activities ranging from begging to prostitution, with little to no regard for working conditions or human life. In one case, a 16-year old Nigerian girl was promised work in Mali which would allow her to care for her family. She was taken on by a ‘sponsor’ who then forced her into prostitution to reimburse her travel costs. In another case, a 15-year old was in the process of being sold into forced labour by suspected traffickers and was intercepted just before the transaction could be completed. The victim was found holding a blue plastic bag containing their entire possessions. To ensure that victims received the necessary care following their rescue, the International Office for Migration (IOM) and several NGOs were involved in post-operation interviews and treatment. Operation Epervier was held under the aegis of the Sahel Project, an initiative funded by the German Foreign Office which targets the organized crime groups behind human trafficking across the region. Officers from INTERPOL’s Regional Bureaus in Abidjan and Yaounde assisted in coordinating the operation, which also included specialist officers from INTERPOL’s Trafficking in Human Beings unit at its General Secretariat headquarters in Lyon, France. “In addition to arrests, this operation has opened a number of ongoing investigations to further disrupt the crime networks involved in trafficking in human beings, emphasizing the effectiveness of such operations via INTERPOL’s international network,” said Yoro Traore, a Police Inspector with the INTERPOL National Central Bureau in Bamako. “The results of this operation underline the challenge faced by law enforcement and all stakeholders in addressing human trafficking in the Sahel region,” said InnocentiaApovo, Criminal Intelligence officer with INTERPOL’s Trafficking in Human Beings Unit and coordinator of the operation. She also thanked the German Foreign Office for their continued support of such initiatives. The operation was followed by a regional working group meeting in Cotonou, gathering 100 participants from 15 countries across West Africa and the Sahel. Discussions focused on the outcomes of Operation Epervier as well as the way forward for future activities in the region. “This type of regional exchange is important to ensure that good and not so good practices are shared, to ensure that we collectively improve on prevention, protection and prosecution,” said Anke Strauss, IOM’s Chief of missions in Mauritania. INTERPOL Fights Against Child Sexual Abuse The Kenya Police, with support from the UK National Crime Agency has launched a dedicated national Child Protection Unit uniting law enforcement and children’s services agencies to safeguard young people from sexual exploitation. This initiative, which could serve as a model for other countries worldwide to help tackle the growing concern of child sexual abuse, was among the issues discussed recently by international child protection experts, who gathered to discuss the latest tools and techniques for preventing the spread of child sexual abuse material and identifying the young victims to protect them from further harm. The four-day (14-17 November) INTERPOL Specialists Group on Crimes Against Children meeting provided an overview of global efforts and technical solutions for combating online child sexual abuse, identifying victims and their attackers, and disrupting criminal networks involved in producing and circulating abuse material. More than 200 participants from some 60 countries, regional and international organizations, the private sector and academia also heard case studies of successful investigations – including on travelling sex offenders – in addition to addressing topics such as prevention strategies, abuse material analysis and the use of the Darknet. The participants were also updated on the WePROTECT Global Alliance, an international multi-stakeholder initiative dedicated to national and global action to end the sexual exploitation of children online which brings together more than 70 countries, as well as international organizations, industry partners and civil society organizations. Ernie Allen, Chairman of the WePROTECT Global Alliance, underscored the challenges faced by law enforcement globally in tackling child sexual abuse, including technological developments such as live streaming and social media, use of the Darknet to provide anonymity, travelling offenders, and under reporting of abuse cases. The WePROTECT Global Alliance to End Child Sexual Exploitation is an international movement dedicated to national and global action to end the sexual exploitation of children online. “This is not a problem that any single country or institution can handle alone. It is a global crime which requires global cooperation, said Mr. Allen, “We need vision, innovation and leadership, which INTERPOL is providing. INTERPOL, and everyone around the world who has devoted their lives to combating crimes against children, should be proud of the extraordinary progress made so far, though there is much still to be done.” Stressing the global aspect of crimes against children, INTERPOL’s Executive Director of Police Services, Tim Morris highlighted the Organization’s efforts to provide dedicated support to member countries by deploying expert staff to INTERPOL offices in Asia and South America, and training existing staff at the four INTERPOL Regional Bureaus in Africa to increase their knowledge on child sexual abuse issues. “A child can be physically abused in one country, with the images easily distributed around the world, often in real time. We therefore need to bridge regions and cultures, raise awareness and build capacity to tackle these heinous crimes everywhere they might occur,” said Mr Morris. During the conference, dedicated regional workshops allowed participants to focus on the unique challenges present in each part of the world. INTERPOL’s Crimes Against Children team also presented an award to ECPAT, a network of civil society organizations in 93 countries, recognizing its work in preventing child sexual exploitation through programmes to confront trafficking for sexual purposes; the exploitation of children through prostitution and…

Read More

Twin City Hardware Shifts to Vanderbilt ACT365

Twin City Hardware (TCH) has more than 130 years of experience providing opening and access solutions for commercial, architectural and residential construction projects throughout the United States. Over the past half-century, TCH has continued along a robust growth path, and is now one of the premier commercial technology and service suppliers in the country. TCH, a Vanderbilt integrator partner, works closely with end user organizations on security enhancement projects. It focuses on providing access control solutions for a variety of customers – from small businesses with a handful of doors/ readers, to enterprise organizations, including higher education and healthcare campuses. The challenge The company’s New Hope, Minn., location has a large inventory and many staff who work varying shifts throughout the day. The facility was originally secured with mechanical hardware and keys, which are less secure than newer door solutions, especially in the instance that a key is lost or access to the facility needs to be restricted. “Key control is always the hardest part of access control,” said Dan Siroin, Integrated Access Systems Manager, TCH. TCH was unable to know who was entering and exiting the building at any given time, which led to security, building management and privacy concerns. “It’s important in the instance of an alarm that we know who is present in the building,” he said, “With mechanical keys and locks, we didn’t have critical information.” The solution TCH was introduced to the Vanderbilt ACT365 cloud-based access control and video management solution that added additional value to Vanderbilt’s core technology offerings and came with its strategic acquisition of Access Control Technologies (ACT). TCH was interested in how the ACT365 solution could be a strong addition to its product and services suite, and decided to pilot ACT365 at one of its administrative offices. TCH deployed a focused solution consisting of two readers and two cameras in the facility to test the product’s capabilities. Administrators can provide pin codes, access fobs and cards to employees as credentials to access the facility. These credentials can be easily enabled or disabled remotely if required. “Cloud-based systems are a unique niche fit for small- to medium-sized customers that have little to no network infrastructure or staff to incorporate a ‘use anywhere’ access control system,” Siroin said, “We believe that there is a great opportunity to deploy this to our customers, but we wanted to run the solution through our stringent testing process.” The scalable ACT365 cloud-based solution is designed to allow users to control and administer access control capabilities from anywhere, at any time and on any device. Each access control unit consists of a single-door IP controller and connects to Web-based software hosted in Microsoft Azure. Users can leverage either a Web-based device or a mobile application to quickly update or remove user permissions, view cameras associated with an access control event or open a door. Overall, it allows for simplistic management of multiple sites and users from a unified, friendly interface, and delivers new levels of situational awareness for users monitoring access privileges. “The mobile application provides the freedom to conduct most functions wherever you are,” Siroin said, “The system is very easy to use as well. Within a short period of time, I was able to manage access through both the mobile and Web portal with no training or support.” The results The ACT365 solution allows TCH to access a regular audit trail of who is in the building by monitoring card reader activity. ACT365 produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely, allowing users to be alerted in the event of an incident. This results in more control for security directors to address situations as they occur in real-time instead of retrospectively.

Read More

March Network Kind Financial Video-Enabled Seed-to-Sale Tracking and Compliance Solution For the Cannabis Industry

March Networks®, a global provider of intelligent IP video solutions, and KIND Financial, the leader in cannabis compliance technology, have partnered to deliver an enhanced tracking and security solution to the cannabis industry to help ensure seed-to-sale compliance. The solution combines video from high-resolution IP cameras with data from radio frequency identification (RFID)-tagged plants and packages, enabling operators to seamlessly track and visually verify inventory as it moves within cultivation and on to dispensaries. Using the March Networks Searchlight™ for retail data analytics platform, licensed growers, producers and retailers can run searches on a wide range of data contained in the RFID tags including a plant’s ID code and its last detected location. In the case of an anomaly such as missing inventory, users can quickly access the associated video footage to see exactly where the item went and who was involved. The clear video eliminates assumptions about what’s occurred and provides strong evidence to support further investigation. In addition, the Searchlight solution provides producers and dispensaries with real-time and historical views into their operations via a mobile device or workstation, enabling them to conduct remote audits and identify areas for improvement. It also offers video analytics and point-of-sale (POS) transaction integration presented in customizable reports to help dispensary owners quickly detect and review suspect transactions, analyze performance trends, improve customer service and gain other business insights. The solution is an ideal fit for the cannabis industry, where regulations such as Colorado’s HB 1284 legislation – commonly known as the seed-to-sale law – have seen many businesses deploying RFID technology to help ensure compliance with strict mandates governing the tracking of plants from cultivation to sale. It also provides an additional layer of visual verification linked to RFID data as part of KIND Financial’s end-to-end plant tracking and management platform. The platform, which also includes Bluetooth (BLE)-enabled tracking technology, enables cannabis manufacturers, processors, and retailers to automate processes, remove manual entry issues, and track their teams and assets while also keeping the business in adherence with cannabis industry regulations and guidelines. “We are pleased to be working with KIND Financial, a recognized leader in cannabis compliance technology, to bring our intelligent video expertise more broadly to this market,” said Jeff Corrall, Head of Strategic Partnerships, March Networks, “Our Searchlight/ RFID solution is already deployed in several cultivation and dispensary facilities in the U.S., and is a clear complement to KIND’s comprehensive cannabis-business lifecycle platform.” “KIND is excited to be working with March Networks to extend these integrated and customized tools to the industry. This new partner solution will transport you to your location, hand you organized data, and point you to important events. In addition, the automation of manufacturing and supply chain processes will bring efficiencies and cost savings to clients while providing peace of mind that manual data entry issues are no longer possible,” said Dan Stofka, EVP of Engineering and Software, KIND Financial.

Read More

Bosch Counts Fans of Miro

Bosch Remote Portal helps Porto’s Serralves Museum manage rising numbers of visitors Porto is home to one of Portugal’s most important art and architecture foundations, the Serralves Foundation, which governs the Serralves Museum of Contemporary Art and Serralves Park. Both are national monuments, Portugal’s most important heritage classification. With as high as 300,000 visitors per year the Serralves Foundation searched for support to manage their flow. Administrators wanted to identify high- and low-traffic days, so they could adjust staffing levels and thereby prevent long queues at entrances and dangerous overcrowding of exhibition rooms. Bosch supported the Foundation by installing FLEXIDOME IP panoramic 7000 video cameras inside and outside the museum and connected them to the Bosch remote portal. The cameras provide a complete 360-degree view of a certain scene without blind spots. Thanks to their built-in video analytics function, the panoramic cameras are enabled to interpret what they see. They can capture and transmit not only video images, but also the associated data like object type, size, speed and much more. Remote Portal as a Software as a Service that allows installers to access via the cloud any Bosch IP camera to configure applications, monitor the health status of the camera or set up camera counter reports. The solution enables the Museum’s administration to count visitors and report the count in real time. The Remote Portal allows for the creation of visitor traffic reports over a day, a week or several months. All data can be easily exported to other applications. With the help of this information, the Serralves Foundation plans and relocates staff as well as other resources well in advance, and if needed, security guards can avoid the entrance of more people inside the Miró Museum. It manages visitor traffic over the course of the year, so all visitors can indulge fully in experiencing fine art – rather than the art of being stuck in a crowd.

Read More

Pyronix XDL12TT-WE Wireless Detector – A Dependable Technology

When it comes to perimeter security, it is literally the first line of protection for any property. Large fences and locked gates can be effective deterrents, but they are not a guaranteed method of security. Intruders could still gain access to the property. So, why not raise an alarm before they can attempt to break into the building? It’s time to deliver true peace of mind and install the first wireless low-mount external detector from Pyronix, the XDL12TT-WE. Combining Pyronix’ multi-award-winning Enforcer two-way wireless technology with their established external detection protocols including Dual-Vision, Tri-Signal Detection Logic and Gaussian Frequency Modulation (GFM), the XDL12TT-WE delivers a completely reliable external detector, with a completely flexible and simple installation. With secure two-way wireless technology This multi-award-winning technology delivers easy installation and superior security with full supervision, anti-jamming and 128-bit wireless protocol encryption to maximise reliability and ensure the signals transmitted by the system are protected and any code-grabbing is prevented. Each Pyronix two-way wireless device is both a transmitter and a receiver and there is a wealth of installation benefits. 1.6km long range wireless The high sensitivity receiver used in Enforcer two-way wireless devices allows a wireless signal range of up to 1.6km in open space, which eliminates the need for repeaters and therefore reduces the installation costs. The high-sensitivity antenna of the XDL12TT-WE ensures that the signals being transmitted and received are as strong as possible. Utilising Gaussian Frequency Modulation (GFM) to spread the signal, while reducing unwanted noise and harmonics, enables the XDL12TT-WE to meet stringent European, ETSI and other worldwide standards. Tri-signal detection logic Consisting of two independent passive infrared (PIR) sensors and one microwave (MW) sensor in one common housing, the Tri-technology (TT) of the XDL12TT-WE delivers advanced outdoor protection. To identify the presence of an intruder, the XDL12TT-WE utilises Tri-Signal Detection Logic alongside TT, whereby to identify the presence of an intruder, all three sensors of the detector need to be activated sequentially in quick succession to create an alarm. Dual-vision pet immune The two PIRs of the XDL12TT-WE have a dedicated volumetric field of view. The top PIR detects outwards and up, while the bottom PIR detects outwards and down, without either crossing the central horizontal plane between them. This setup of non-overlapping PIR sensors alongside Tri-Signal Detection Logic, delivers highly secure sequential detection and increases its tolerance to pet immunity.

Read More

BOSCH Video Management System 8.0

Enables stitching of multiple cameras into a single overview and offers more video for less power The new Video Management System 8.0 (BVMS 8.0) from Bosch offers stitching, GPU (Graphics Processor Unit) decoding and 64-bit function – all of which allow surveillance operators to respond faster to incidents by monitoring a greater number of video cameras concurrently. The BVMS 8.0 offers an additional cost-efficiency and supports the latest ‘fusion’ dual-sensor technology. Stitching: One view compiled from many The Bosch Video Stitcher, part of BVMS 8.0, combines video from multiple cameras into a single one. It seamlessly stitches multiple high-resolution cameras into a single panoramic view, allowing operators to monitor – for example, the stand in a stadium or airfield in an airport – as a single camera. The user can still zoom in and out as needed, but does not need to switch back and forth from one camera to another. Additionally one does not need to know which camera is tracking what specifics, or where a camera is located and how it is linked to the surveillance network. The user can configure the stitched view; up to 16 cameras can be stitched together. GPU decoding: More video for less power Security and IT departments typically equip security operators with multi-monitor workstations or video walls for maximum situational awareness. The need to render more cameras on multiple displays usually places additional strain on a workstation’s performance, with more processing power needed to decode video images as the number of cameras increases. Now, a superior client performance is possible by using the decoding capacities of the GPU. In this way, multiple ultra-high resolution (UHD) videos can be displayed in parallel without consuming CPU (Central Processing Unit) power. 64-bit function: Greater capacity BVMS 8.0 runs as a 64-bit application, up from 32-bit in its previous versions. This raises the maximum capacity of a single BVMS from 30 management servers with 100 cameras per server to 50 management servers with 200 cameras per server. H.265 enabled cameras reduce storage, thus cut cost With the introduction of Bosch H.265 video compression, cameras can reduce bitrates. With BVMS 8.0, users are able to configure Bosch H.265 enabled cameras, allowing them to greatly reduce bandwidth and storage needs. Dual view of new ‘fusion’ optical-thermal cameras Bosch’s new MIC IP Fusion 9000 camera combines – among many other features – an optical lens with a thermal lens – to ensure surveillance can continue even in a smoke-filled room. BVMS 8.0 allows operators to easily switch between the optical and thermal view. Additionally, one of the two streams (depending on which one is open) can be dragged and dropped into a new cameo.

Read More

New DeepinView Camera Series by Hikvision

Hikvision has followed up its launch of the world’s first Deep Learning NVRs with a new series of IP cameras. The new ‘DeepinView’ IP camera series delivers power and intelligence to boost the value of surveillance system performance across a broad range of security and management applications. Hikvision’s Deep Learning algorithms bear much deeper programming compared against conventional intelligent algorithms, which only operate on the surface level. These algorithms perform feature-learning, and provide astonishingly accurate and consistent video content analytics (VCA) performance. When coupled with high-speed GPU processing, HikvisionDeepinView cameras demonstrate faster computing with large amounts of data. Critical analytics such as false alarm filters, facial recognition, people counting and ANPR can now be reliably implemented in existing and new surveillance systems with versatile applications, providing a sophisticated level of tracking and alarm activation during incidents or even for pre-incident alerts. These analytics also enable customers to reduce the manpower previously required for searching surveillance footage, as well as improve business management efficiency and commercial ROI. Human body detection Hikvision Deep Learning technology enables the DeepinView cameras to detect human bodies while filtering out insignificant objects and movements within a scene where conventional VCA systems trigger false alarms. This is particularly useful for perimeter protection, where users often spend too much time and monetary resources locating significant alarms and relevant information. Facial recognition Facial recognition can be deployed in many security and management scenarios within a variety of applications to alert system operators to the presence of persons of interest. This is achieved by the facial image modelling and similarity calculation woven into the system. This technology is becoming a crucial tool against blacklisted personnel entering to casinos, as the identity of an individual can be used to alert security guards to the presence of a known offender, enabling security personnel to deny access in that casino. In this way they can potentially prevent cheating behaviours. The technology works equally well in preventing the admittance of known offenders into venues such as sports stadiums or restaurants. People counting People counting video analytics can track the number of people who enter and exit a particular area. It can record foot traffic through a retail store on a daily basis, or monitor the number of people in a venue to ensure that health & safety limits are not breached at any one time, as in a museum for example, where crowds move through on foot. Vehicle management Traffic monitoring and Automatic Number Plate Recognition (ANPR) analytics can be deployed to monitor vehicular traffic movement and enhance the efficiency of traffic management strategies. ANPR can be used to identify vehicles with listed number plates and allow them access to public and private car parks automatically. HikvisionDeepinView deep learning cameras self-learn the number plate information within a scene and recognize a larger amount of number plates than conventional ANPR systems, without often cumbersome camera positioning adjustments. DeepinView Traffic monitoring analytics, when applied in populous areas and on highways, capture traffic violations such as running red lights,wrong-way driving, illegal parking, and illegal U-turns, contributing to decreased traffic congestion and placing the public and vehicle passengers at lower risk of accidents. “Offering security professionals much deeper system functionality, the new range of HikvisionDeepinView IP cameras combine video data, immense processing power, and Hikvision’s innovative set of intelligent technologies to provide a whole new level of video surveillance performance,” says Keen Yao, VP at Hikvision International Business Centre, “With the DeepinView range, deep learning video analytics will transform standard CCTV systems into intelligent and highly-effective, HD-quality, automated detection and alert systems, to support operators and to deliver more efficient surveillance systems management.” Hikvision has taken the Deep Learning technology and innovated a family of products to maximise its use, including the DeepinView IP Camera Series, DeepinMind NVRs, and the DeepinMind video analytics server.

Read More

DSS Pro VMS Dahua Technogy

    Dahua Technology, a leading solution provider in the global video surveillance industry, has released DSS Pro – a Windows-based VMS (Video Management System) product. With an advanced modular design, DSS Pro is a powerful central management system featuring high flexibility, advanced scalability and superior reliability. DSS Pro uses Client Server (C/S) architecture that enables the flexible deployment of multiple modules to meet customer needs. Features Easy access: DSS Control Client, DSS Web Client and DSS Mobile form the suite of DSS clients, enabling users to enjoy instant, around-the-clock access to video surveillance, and giving them the choice of a viewing interface that best suits their needs. DSS Control Client provides easy and powerful daily operation and surveillance task handling. GPU decoding and multi-screen support allow the simultaneous display of multiple types of content. DSS Web Client offers convenient DSS access from any Internet-enabled PC browser. DSS Mobile enables users to view feeds from up to 4 cameras simultaneously. It also supports remote playback of recorded footage from selected cameras and control of PTZ cameras. Embrace openness: Aside from its support for the full range of Dahua products, DSS Pro is designed for 3rd party device integration through standard ONVIF. The DSS SDK for 3rd party VSS integration supports Windows, IOS and Android. Easy expansion: DSS Pro supports easy performance upgrades via distributed hardware extensions, easy functionality upgrades via add-ons, and easy capacity expansion via license subscription. It also integrates an alarm system, POS, face recognition, and ITC for advanced security applications. High reliability: DSS Pro supports hot standby which ensures system reliability for critical applications. When abnormal behaviour is detected, the detection service automatically restarts the server to ensure service stability. Quality service: To optimize user experience, Dahua offers quality after sales services including Dahua Software Upgrade Program (SUP) to provide users with access to the latest Dahua software, Dahua Software Support Plan (SSP) which offers free post technical support, and Custom Development that ensures customized solutions are supervised by Dahua professionals to guarantee quality and performance. Application scenarios: Beyond its basic application as CCTV management system, DSS Pro can be used in many vertical industries such as retail, banking, transportation, and Safe City with the use of add-ons. Add-ons are separate software components installed on top of existing DSS video surveillance systems providing users with extra powerful functionalities. Business intelligence: In addition to its powerful surveillance capabilities, DSS also provides advanced business analysis functionality. Intelligent analysis helps department stores, outlets, and other businesses improve customer satisfaction, provide a secure shopping environment, and better plan store layout & consumer routes to grow business. LPR: The LPR module features automatic number plate recognition (ANPR), vehicle image capture, vehicle list management and more. It has a wide range of applications in the fields of parking and traffic management. Face recognition: Face Recognition is beneficial for various applications such as monitoring the entrances and exits to railway stations, metro stations, airport terminals, commercial buildings, seaports, schools, factories and offices. Dahua DSS Pro is an ideal choice for those who desire an easy-to-use, customizable, and centralized video management solution with high quality after sales services. The release of DSS Pro is well in line with Dahua’s value proposition of providing innovation, quality, and service.

Read More

Videonetics Co-sponsors SECONA ASCM 2017

Videonetics has partnered the recently held 6th Annual Security Consultants Meet (ASCM) by SECONA as the ‘Silver Sponsor’ in Vietnam. The two-day Meet brought together consultants, CSOs, end users and OEMs operating in the fields of risk and security management, smart cities, building management, and fire and safety from India, Sri Lanka, Vietnam, Singapore and Malaysia at one platform. The Meet focused on four important themes – Smart cities, Critical infrastructure protection, Cyber security and Security of the vulnerable sections of the society. ASCM 2017 had keynote addresses, presentations from market leaders, knowledge sharing sessions, and engaging round-tables towards exploring the growth opportunities in the security technology industry. “Being a part of ASCM has always been a pleasure, and this year has been no different. ASCM has always attracted the best minds from the industry in previous as well as this edition. It has turned out to be the most influential platform to network with world’s top-notch consultants, and address their common concerns while taking up any project. As a technology provider, we had shared our knowledge on latest trends, futuristic technologies and innovation, aimed at advancement of the security market globally,” expressed, Avinash Trivedi, VP, Business Development at Videonetics. Our relationship with SECONA has been growing every year, and we are happy to partner again for ASCM. As technology is evolving every day, we at Videonetics are committed to promote culture of innovation and to introduce such advanced and smart technologies that can address challenging environment for highly populated countries with indigenously developed Indian Intellectual Properties – Dr. Tinku Acharya MD & Founder, Videonetics

Read More