Expert commentary
Video analytics allow users to automate the use of video and extract more value Almost anyone in the video analytics market will admit that the capabilities of the technology were initially oversold. The first generation of analytics simply didn’t work as promised, and an undercurrent of distrust of the technology in general still haunts the market. Ironically, video analytics capabilities have now matured into a robust and dependable option for a variety of applications...
With elections due later this year in the UK, Spain and Switzerland, attitudes to the prevailing political landscape of austerity are changing rapidly. Are physical security budgets in the public sector ever protected from cuts, and what is the outlook for our industry? Consider the landscape: A left-leaning party has come to power in Greece on an anti-austerity platform and with the stated intention of halving the country’s €315bn debts. Angela Merkel, the German Chanc...
Drone is a toy with a bright future—until it causes a catastrophe Drones, or unmanned aerial vehicles, are today’s gizmo du jour. A recent Bloomberg article reported that Amazon alone is selling more than 10,000 a month, and with prices as low as $50, it’s a toy with a bright future—until it causes a catastrophe. Consider the January incident at the White House when a drunken National Geospatial-Intelligence Agency employee lost control of a quadcopter...
You can identify the military veterans among private security guards by the way they wear their uniforms, according to one security company executive. Each veteran looks comfortable in the uniform and exudes a confidence you don’t often see among those without a military background. It comes as no surprise that security companies like to hire veterans – more than practically any other industry. With a growing population of U.S. men and women coming out of the ser...
Better, faster networking plays into the optimistic outlook for the transportation vertical Our market has plenty of reasons to be optimistic about the future of security systems in the transportation vertical. “Given the advances in processing power and technology, we can only imagine what the capability of an IP camera will be in five years,” comments Anthony Incorvati, business development manager, critical infrastructure and transportation, Axis Communications....
In-vehicle technology allows security officials to view live footage from the bus’ cameras during an emergency One of the biggest security opportunities in transportation is onboard surveillance for buses and trains. While most transit organisations have invested heavily in video security for facilities such as terminals and stations, far fewer have taken the next step and installed IP cameras on board vehicles, says John Recesso, strategic business development manager,...
Any part of a transmission infrastructure has a dramatic impact on system performance We often view network switches as transparent transmission products. What goes in comes out. In reality, nothing is further from the truth. In this article, Neil Heller - Vice President, Vigitron, Inc. highlights that any part of a transmission infrastructure has a dramatic impact on transmission and, therefore, on system performance. At the very least a network switch can be viewed as a piec...
Of the many benefits offered by new and advanced IP video surveillance cameras, the ability to easily customise these devices with third party apps has the potential to change the landscape in video surveillance system design and implementation. By providing the ability to customise individual cameras with the specific functionality desired for every specific camera location, camera apps not only increase functionality where needed, they deliver tremendous savings on a system-wide...
loT will assist installers and integrators to position themselves as total solution providers and professional connectivity consultants to consumers The buzz over the Internet of Things (loT) isn’t likely to subside anytime soon, given recent developments over consumer adoption of network-connected technologies. According to the 2014 State of the Internet of Things Study from Accenture Interactive, 69 percent of consumers plan to buy an in-home device in the next...
Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, SourceSecurity.com asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market. AMAG: Easy migration, simple pricing model AMAG’s Symmetry platform includes access control, photo ID badging, visitor management and digital video server software, all standard in an integrated solution. The pricing model...
The obstacles preventing convergence with fire systems appear substantial The IT network began as a dedicated structure within a building or facility. From this starting point, we have seen telephones, HVAC, access control and increasingly CCTV/video residing on the same platform. If today’s facility managers were offered a new building with separate networks for each type of subsystem, they would react with incredulity. The exception is fire protection, where the life-...
The smarter the grid becomes, the more risks it will encounter Hollywood collided with couch-dwelling gamers this Christmas because of the hack on Sony’s computer system, allegedly committed by North Korea. Immediately, security experts began to wonder if a nation state or a terrorist group might try and hit the U.S. electric grid. The answer is likely yes, but it wouldn’t be the first time or the last, and the grid, smart or not, is extremely complex and interwove...
Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Serv...
Check out the research available from the ASIS Foundation. It is proving to be right on the button.When the Guardians of Peace hacked Sony Pictures Entertainment late in 2014, they crashed the studio’s email, leaked films and scattered personnel data across the Internet. By mid-December, four class-action lawsuits had hit Sony, claiming that the company had not taken adequate cyber-security precautions. How about your company? Are you prepared to withstand a cyber-att...
The stigma of the cannabis industry still hangs in the balance Final installment of 4-part series: The legalisation of recreational marijuana use in Colorado and Washington, along with it medical use in about 23 other states, has created an industry made up mostly of small mom-and-pop operators. “While the revenues in this industry are big, the number of people involved is pretty small,” said one security industry insider. That’s about to change as Wall Stre...
Hosted video surveillance, or cloud video, has been utilised in small markets over the past few years and is just now really being pushed as a viable alternative to traditional onsite DVR’s. Most of the major surveillance companies are marketing cloud products. Some of these cloud products represent true hosted video surveillance and others are a play on word with ‘cloud access’ being the marketing ploy. True cloud or hosted video streams real-time vid...
To succeed at outsourcing, the relationship between the organisation and the outsourcing company has to be an equal partnership Can you save money on security by outsourcing? Maybe, maybe not, according to William J. Powers III, CIPM II, CIPI. “Considering the way I approach outsourcing, I’m not sure if it saves money,” says Powers. As director of facilities at the Sterling and Francine Clark Art Institute in Williamstown, Mass., Powers oversees facilities,...
The systems integration industry is abuzz. Access control is super-hot, and the product category continues to grow. IP video surveillance specifications are moving along at break-neck speed. New technology categories in the security market – energy management, home automation and interactive services – are helping savvy dealers and systems integrators grow their businesses. But do these companies really know how to take full advantage of all the possibilities for...
Good security basics enabled a security response before the shooting started Mass shootings by emotionally disturbed individuals and terrorists have led authorities and security professionals to search for means of prevention. “Analysing an actual incident in which a potential shooter was stopped seconds before becoming active can illustrate how solid security basics can help prevent catastrophe,” says Drew Neckar, CPP, CHPA, regional director of security wi...
Schools are beefing up their security, with access control their go-to technology Schools are back in session after the winter break, but security is a 24/7 matter any time of year. K-12 and upper education are on high alert, dealing with increased incidents of violence, crime and vandalism. Access control is often the chosen technology of this vertical market, pairing well with CCTV, emergency communications and lockdown. Integrators and dealers who understand the nuances of...
Airports, metro systems and other transportation centres must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to match specific risk levels by incorporating PIN and biometric verification for higher security. HID Global’s IP-based networ...
The security landscape continues to evolve in new, complex ways for transportation customers Dealers looking to enter – or to expand their presence in – the transportation vertical must adapt to the unique needs of each transportation agency customer. Issues such as limited budgets/resources, aging technologies, operational challenges and safety issues must all be considered when designing a system to best meet an agency’s needs. Integrators should seek to i...
NFC can strengthen security by turning smart phones into physical and logical access control credentials The trouble with access control cards is that people lose them, lend them to friends who use the cards, or lose them, or lend them to someone else. Losing a card is bad enough, but people that lose cards often make it worse: “When someone loses an access fob or card, he or she doesn’t always tell the security department right away,” says Paul Timm, pr...
A growing number of users look to add cloud-based functionality to their surveillance toolkits In today’s market, both end users and resellers seek new technologies to make security programs more effective, while also helping business and employees be more efficient. Cloud-based monitoring services are gaining a significant amount of attention as an emerging solution to meet these needs. Maria Cambria, Vice President, Technical Center of Excellence, DVTEL says that end u...
More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; on...
Third instalment of 4-part series: One question that comes up when talking about security for the cannabis industry is “why aren’t there more companies getting into the business?” While a number of small operators and larger companies have begun offering their services to marijuana retailers, some very big players have largely passed on the opportunity. According to a report by CNNMoney, security giant ADT won't "sell security services to businesses engaged...
Unscrupulous companies reversing positive steps made by security industry to remove stigma of being known as "trunk slammers" ABC news report reaffirms need for industry action For the businesses that make up the electronic security industry, it’s an issue that undermines all the progress we have made to date. It’s deceptive door-to-door sales tactics, and it’s still having an impact on the alarm industry. It affects the entire industry – from lar...
Suffice it to say 2014 was a pivotal year for the majority of alarm dealers and installers. Many have had to change their way of thinking and their method of doing business, while adapting to ever-changing technology. But those who continue to reinvent their go-to-market model prove that the integration business is the place to be – and there’s money to be made, albeit it not in simply installing boxes and hardware. In fact, that mind-set changed several years ago, and...
Security cameras can earn a return on investment (ROI) that goes beyond security Today’s security camera technology can help speed entrance screening and provide video under very low light conditions. In each case, security cameras can earn a return on investment (ROI) that goes beyond security. One difference between today’s security cameras and older generations of camera technology is something called wide dynamic range or WDR. It is a feature that enables a ca...
Access control and alarm worlds are going digital and plugging into the network Open tech standards are integrating diverse security technology systems — and security people — into the corporate mainstream The digital technology revolution has begun to course through the public and private worlds of government and commerce, replacing old analogue technology. Chief among the many benefits of digital over analogue is the ability to integrate diverse technologies...
Browse expert commentaries
Expert Section
Related videos
OPTEX REDSCAN mini series protects The Londoner Hotel
Time challenge: installation of battery powered Aperio cylinder
IDIS launches efficient AI-powered security camera range
Security beat
Cybersecurity for enterprise: The essential guide to protecting your business
Download5 surprising findings from OT vulnerability assessments
DownloadThe 2024 state of physical access trend report
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
Download