Expert commentary

The evolving role of access control in healthcare

Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications.  From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physi...

Bridging the consumption gap: A guide for systems integrators

Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies.  Consumption...

Mastering transportation cybersecurity: The comprehensive guide

Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply cha...

The importance of machine authentication in plant safety and security

Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication?  Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building...

Efficacious K-12 solutions in a challenging, fluid world

Mass attacks continue to lead the news far too often. All are horrific and disturbing, but the heartbreaking tragedies that have unfolded on school campuses touch us the deepest and have the most profound effects on our communities. NTAC statistics According to a January 2023 report from the United States Secret Service National Threat Assessment Center (NTAC), K-12 events accounted for 6% of all mass attacks in public and semi-public spaces between 2016 and 2020. 6% may strike some as being...

Enhancing visitor management through access control

Organisations of all types have made it a priority to better track who is coming and going inside their facilities and on their property. This can include an HVAC technician who needs to be inside a building for several hours to fix a faulty air conditioning unit or a parent who volunteers each week in their child’s school. Technology-based visitor management With considerable advancements in visitor management systems in recent years, organisations are now benefiting from technology-b...

HID introduces first Eco card-the sustainable and secure Seos® bamboo credential

Our recent survey on the state of access control in 2023 showed that HID partners and end users, as well as security and IT professionals, may have varying needs and concerns but nearly all agree on one thing: the need for sustainable solutions. Operational transparency In fact, sustainability was a top issue for almost 90% of our survey respondents. Our end users and their consumers are primarily driving this demand, with ever-increasing numbers asking for operational transparency...

Responsible Technology: Upholding ethical standards and protecting human rights within security

Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technol...

Why the term “Security Team” is too limiting

There’s been a long history of people thinking of “gates, guards, and guns” when referring to physical security. And for a long time, this was the norm. When analogue cameras required significant amounts of wiring and a dedicated guard to watch said feeds (think about any action movie from the 90s), the assumption was that security was protecting assets, but had little to do with the overall business.  Defining security with recent advancements Fast forward to more rec...

Reinventing security integrators to weather macroeconomic headwinds

We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand c...

PR raises your cybersecurity company’s trust level

There are about 3,500 cybersecurity companies across 17 categories operating throughout the United States right now, according to both IT-Harvest and Cyber DB. So, on any given day, an IT security firm must beat back competitors in the market before it can even begin to battle the bots, phishing scams and ransomware attacks that are a part of your trade. And, you won’t be able to do that with marketing and advertising alone. Most, if not all, of your competitors are probably using a sim...

What makes a mass notification technology a solution

Keeping people and property safe is the purpose of the entire security industry, and the methods for ensuring safety take numerous forms. From cameras to paging horns to door locks and badge readers, facility managers and security manufacturers must consider multiple factors for securing a building and managing emergencies. Mass notification is critical for many customers to protect a facility and keep people safe. Still, the technology may consist of many elements from one or multiple manufac...

The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role in safeguarding national and public events. In light of a number of tragic incidents, safeguarding public venues has become increasingly prominent in recent years. Despite ongoing threats from terrorism and spontaneous acts of violence, it is imperative that government entities, local authorities, and venue operators t...

Multifactor authentication is now a top factor for cyber insurance eligibility and reducing premiums

Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimise these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MF...

Critical infrastructure: The starting point for surveillance

Inadequate security measures on your essential infrastructure can have severe consequences.  Consequences  Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disru...

Aesthetic access control: Finding the balance

Where access control is concerned, architects and design teams must find the right balance between aesthetics, functionality and security, says Daniel May of Consort Architectural Hardware. Following a period of innovation and integration, access control has developed into an ever-prominent facet of building design over the past decade. Where systems were once rudimentary, modern user requirements have led to several operational and technological advancements, resulting in a versatile selection...

Don’t let cybersecurity perfection become the enemy of progress

What would it take to make an office building perfectly secure, with 100% impregnability? Would you put padlocks on every door and window, and security gates in every corridor? Certainly, this would be very secure, but it doesn’t take a security expert to see how such a setup would be a huge waste of resources, nor would it be convenient for the people who need to work in the building.  Cybersecurity challenges  ​But while most businesses recognise that complete perfection in...

Embracing boots and suits: security teams take on more in 2023

Regardless of their experience level or location, there is always a sense from close protection practitioners that there's a hunger to get back into the field and closer to the action. And why not? International travel coupled with diverse and challenging environments is all tied to a sense of mission. This is quintessential for close protection teams and starts with business travel.  Travel concerns But, while increasing, it's safe to say that business travel is unlikely to return to...

Why safeguarding charging stations is critical to the safety of the population as a whole?

The promise of electric vehicles is closer to reality than ever before. New plans and investments at the federal level designate billions of dollars to move our country toward clean energy, including $2 million to help auto manufacturers retool facilities to increase EV production. Additionally, the Biden Administration has announced a goal to create 100% carbon-free electricity by 2035 and a net-zero carbon economy by 2050. Domestic EV marketplace The domestic EV marketplace has grown from...

Why retailers need task forces to fight organised retail crime

What should be done to stop organised retail crime (ORC)? That’s the big question for retail businesses nationwide, as widespread concerns about ORC have sparked a multitude of strategies spanning everything from state-of-the-art surveillance technology, to advocacy for new state and federal legislation, to products locked up within theft-prevention cases — and, in some extreme cases, even the decision to outright close certain brick-and-mortar locations. Retailers are spending mill...

DevSecOps is a ‘business priority’

DevSecOps is a vital strategy with automated security included in every phase of software development. Implementing DevSecOps means application and infrastructure security becomes a shared responsibility amongst the development, operations, and security teams which maximises protection at every level of the organisation.  Investing in DevSecOps strategies According to a recent report conducted by the Neustar International Security Council (NISC), an elite group of cybersecurity professi...

Understanding and implementing integrated security

Integrated security solutions are so often recommended by security specialists, while this sounds impressive, what does it actually mean? The short answer is: combining all aspects of security in a layered approach that leaves no vulnerable points. In this article, I will unpick the meaning behind this well used phrase, exploring the key components that make up an effective integrated security solution, while also revealing my top tips when it comes to maintenance and how to specify a solution...

Loss prevention and security audits in retail

When looking to design, implement, and track a loss prevention and security audit program across a national retail chain, there are two big questions to consider: What are you attempting to resolve, influence, and/or measure? What is the priority?  The first point is to understand if there are any specific pressing concerns. If there are procedures not being followed by staff in the stores, then you want to come up with a program that is going to actually influence the way they work...

5 advantages of using a malware sandbox as part of your cyber security strategy

The number of cyber attacks around the world has been steadily increasing year after year; for example, in 2022, the weekly rate of attacks on corporate networks was 38% higher than in 2021. The potential financial losses of a data breach are substantial, with IBM's report putting the average cost at $4.35M. In order to reduce incidents quickly, organisations must take action and prevent them from happening in the first place. And using an interactive malware sandbox is a cost-effective and sim...

Top security measures to consider when protecting businesses, infrastructure, and public attractions

Are we doing enough to protect our vital infrastructure and commercial properties? This is one of the key issues the sector is currently dealing with. Crime rates have been rising following the pandemic and ensuing lockdowns in 2020–21. The Office for National Statistics reported that between September 2019 and September 2021, crime rates increased by 14%. This illustrates that risks to businesses, public attractions, and public buildings are increasing, and it implies that decision-make...

The latest trends in biometrics for access control (2023 advancements)

A study found that over 80% of smartphones have biometric protection enabled, up from 68% a few years ago - these statistics alone show the trajectory of biometric security solutions. In the world of access control systems, biometric advancements allow for more secure authentication measures and seamless security processes. As more products and services hit the market, learn our predictions for the 2023 biometric trends in this article. Biometric access control systems What are biometric acc...

4 trends to follow at ISC West

The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a glo...

“The potential is enormous” - Interview with Dr. Henrik Siegle, CTO at Bosch Building Technologies

Dr. Henrik Siegle has been the CTO at Bosch Building Technologies since November 2021. In this interview, he speaks about the megatrends of energy efficiency and sustainability, and about new developments in the building technology sector. Dr. Siegle, the building industry is currently facing major challenges in the form of climate change and energy shortages. How is Bosch Building Technologies dealing with these challenges? Dr. Henrik Siegle: Energy efficiency and sustainability have long...

Physical security management trends 2023

As the cost-of-living crisis intensifies in 2023, owners of construction companies will place a greater emphasis on environmentally-friendly materials, public safety, and strategies to increase value. Physical protection Key events in 2023 will have an impact on the physical protection of people, property, and businesses. King Charles III's coronation in May will be the focus of nationwide large-scale gatherings and celebrations and is already receiving security preparations. Even though this...

Importance of protecting educational establishments: privacy vs. visibility

The UK’s future depends on our children. Within the four walls of classrooms around the country, young minds are inspired, practical skills are learnt, and new passions are established; these will be tapped into by pupils for decades to come. To make sure outmoded security measures are not having an adverse effect on the performance within, we must first examine the limits and physical safeguards around these educational institutions. When planning and building any facility for the educat...

Related videos

OPTEX REDSCAN mini series protects The Londoner Hotel

Time challenge: installation of battery powered Aperio cylinder

IDIS launches efficient AI-powered security camera range

Quick poll
What's the primary benefit of integrating access control with video surveillance?