Expert commentary
Over the next year end users will push to get more value out of their investments Frontier 2014/2015 Review and Forecast: One of the big trends we see playing out over the next year is a push to get more value out of the investments that end users make in their solutions. Certainly the solutions must meet the core needs of customers, but more focus is being applied towards how those solutions can improve processes, increase efficiency and provide better visibility of th...
Companies will resort to cooperation in a mutually beneficial and complementary way Dahua 2014/2015 Review and Forecast:The global economy is in recovery, and China’s domestic market keeps its strong momentum. Politically, the terrorist attacks and uncertain factors still exist; and with years of market cultivation, people’s safety awareness continues to grow. Important trends include the popularisation of HD, intelligence, integration and the increasing impac...
Interest in mass notification systems appears to be growing in the security community as a response to active shootings and workplace violence 2014/2015 Boon Edam Review and Forecast: The security industry seems very healthy and continues to experience solid growth. We have observed an increased level of corporate and government expenditures, which allows for expanding security upgrades in general. Looking ahead to 2015, I see interest in mass notification systems appears to...
Working with proximity readers now will let even more end-users use biometrics on high security openings Zwipe 2014/2015 Review & Forecast:All of the news reports in 2014 about the mishandling and hacking of card information has made both consumers and institutions more leery of using a card only to verify the cardholder. Looking ahead to 2015, there is an increasing demand for both a more affordable, and more secure way to integrate biometrics into the payment process wit...
Technology that was traditionally used as a tool for security is now coming in to its own, providing multi-functional uses Traka 2014/2015 Review and Forecast:Despite tentative economic recovery, businesses in 2014 were still very much focused on tightening expenditure. Traka, the key and asset management specialist, has seen a spike in demand for systems that protect a company’s assets. This year, Traka has processed significant orders for high-profile companies who ar...
Integration of wireless and edge technology will continue to change the economics of installation 2014/2015 D/A Central review and forecast: As a security systems integrator, we are seeing some improvement in the industrial sector. It appears that projects that were deferred during the recession are now getting funded. Healthcare continues to have complex needs with continuing consolidation, which then creates opportunity. One question that remains is military spending a...
“Winners” in 2015 will be multinational security solutions companies and recruiters for mid-to senior-level employment placement ASIS International 2014/2015 Review and Forecast: Spending on security systems was up in 2014: In general, it seems that there was an increase in capital projects for 2014. Two likely contributing factors are a slightly better economic outlook, and the previous capex holding patterns of many organisations wanting to move out of tha...
There are signs of a change in the electronic access control industry in favor of systems based on interoperability as proposed by ONVIF ONVIF 2014/2015 Review & Forecast: The year ahead certainly looks to be an important one. Interoperability, data security and ease of installation will all be of concern to the physical security industry. We see an increased awareness for interoperability among the end users in the industry, which in turns reflects back on the need f...
AMAG saw growth across all vertical market segments, making 2014 an incredibly exciting year 2014/2015 AMAG Technology Review and Forecast: AMAG Technology saw growth across all vertical market segments, making 2014 an incredibly exciting year. End users are demanding unified, end-to-end total solutions, and I see that trend continuing into 2015 and beyond. Some users want access control and video management from the same manufacturer to eliminate integration challenges, or...
Grants continue to be available for schools to purchase products such as our intercoms and communication systems 2014/2015 Aiphone Review and Forecast: Video surveillance, audio, access control and locks are the four security solutions that typically work together as part of an overall security plan. Demand for video may have been the prime driver, but 2014 was a solid year for each of these solutions as the economy improved noticeably. Also, federal and state governmen...
With the entry of more manufacturers and mergers and acquisitions in the security industry, the competition is undoubtedly getting fiercer VIVOTEK 2014/2015 Review and Forecast: Total solutions have become more important than individual products in the industry. Security brands are starting to turn themselves into solution providers instead of product manufacturers. Moreover, with technology advancement, the adoption of intelligent video content analysis is on the rise. I...
Big Data is a challenge that emerging technologies are working to address Quantum Secure 2014/2015 Review and Forecast: As demonstrated by end users’ continued desire to identify and implement technologies that provide the greatest level of protection for people, property and assets, it’s clear that security will always be a necessity. Today, customers demand strong, demonstrable ROI from those technologies and expect solutions to align with their overall business...
2014 was a year for eye-popping merger and acquisition (M&A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market – Google, which made not one but two acquisitions this year that could impact the future security market. It was also the year that a smaller player in the video camera market (although a huge familiar brand overall) bought a large, open systems V...
Uncoupling software from hardware allows manufacturers to respond faster to changes Nedap Security Management 2014/2015 Review and Forecast:Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. External factors such as these do provoke change in physic...
End users continue to move to smart cards and smart readers, wanting the extra flexibilities they offer 2014 was very good year at Farpointe Data. Significantly, it became part of the DORMA group, which helps cement our standing as a global partner of premium RFID solutions, including proximity, smart card and long-range solutions, for access control professionals around the world. This is a good market as there has been sustained migration among end user customers of Farpoint...
2014 saw more organisations making data-driven decisions with insight or foresight provided by intelligent analysis of the data Morse Watchmans 2014/2015 Review and Forecast: 2014 saw a year of continued change in the security marketplace. A healthier economy triggered growth in new projects and helped loosen the purse strings for capital expenditures. From a technology standpoint, the industry evolution to a more network-centric environment created additional opportunitie...
Open standards for access control and integration will offer end users far greater levels of choice ASSA ABLOY 2014/2015 Review and Forecast: Editor’s Note: This article is based on Mr. Bone’s answers to several questions about the 2014/2015 Review and Forecast posed by SourceSecurity.com. We will continue to see a two-speed economy in general terms in Europe in the New Year, with the northern countries doing well and the southern countries continuing to be d...
The decriminalisation of marijuana has left the security industry apprehensive to collaborate with the industry If ever there was a market tailor-made for security companies, it’s the growing cannabis industry. Although only two states – Colorado and Washington – currently allow the sale of recreational marijuana and 22 other states permit limited medical use, many within the industry believe the tide has turned in favour of legalisation. [After the recent el...
With a growing threat from home-grown terrorists, there will be a greater need to protect soft targets as well as to use portable barriers Delta Scientific 2014/2015 Review & Forecast:In 2014, hard targets, such as government facilities, airports, refineries and similar installations continued to boost sales for Delta Scientific by protecting themselves from car- and truck bombers using crash-rated vehicle access control equipment including bollards, barriers, barricades a...
2015 will see Multifocal sensor cameras opening up new markets for Dallmeier Dallmeier 2014/2015 Review and Forecast:The resolution of megapixel cameras is always going to be higher. But people are starting to understand that resolution is not everything, nor does it solve the problem of the customer. In addition, many megapixels on a single chip have unpleasant side-effects related to things like light sensitivity, lens quality, image rate and bandwidth. What really interes...
Developers have made huge strides in the effectiveness, convenience, and reliability of the technologies used in video surveillance AxxonSoft 2014/2015 Review and Forecast:Video technology began with simple CCTV systems, but these systems have gradually become more sophisticated, offering both scene analytics and forensic post-analysis. The payoff is found in today's smart security systems. Video analytics are in use today in real-world conditions – on motorways, underg...
Winning companies are those that continue to be proactive rather than reactive to the changing security environment Scallop 2014/2015 Review and Forecast: In the last few years, we have seen a number of developments in the security industry – including organisations taking a more proactive approach to security. As a result, the demand for surveillance solutions has continued to grow at a high rate and, in turn, the data being collected has hit record levels. As...
The major trend ECKey has seen in 2014 is an increased demand for “accountable” access control that is both convenient and affordable ECKey 2014/2015 Review and Forecast: The major trend we have seen in 2014 is an increased demand for “accountable” access control that is both convenient and affordable. Tight budgets are shining a light on the true cost of ownership of card reader and biometric systems. In many ways these systems are similar...
Customers look to leverage video surveillance technologies to optimise and monitor operations within their business MicroPower 2014/2015 Review and Forecast: In 2015, we will continue to see customers look to leverage video surveillance technologies to optimise and monitor operations within their business. Solutions that enable organisations to shift from more situational awareness to situational assessment – for example, using images collected from the surveillanc...
There is convergence of both the video and access control technologies, and of the companies themselves Milestone Systems 2014/2015 Review and Forecast: Milestone Systems is always in touch with our vast ecosystem of partners around the globe as we support them in their customer projects and needs. We partake in hundreds of industry events, road shows, and meetings, also holding our own partner conferences in every region to ensure face time with our stakeholders. We do...
Biometric cards provides an easy way for to provide a biometric upgrade to access control systems using card readers More and more, security professionals using card-based front ends for their access control systems have been worried about the security of their proximity systems. They know, that for $200 or less, their proximity system can be violated. Kim Humborstad, CEO of Zwipe points out that proximity systems do not offer a challenge response; they only use passi...
Two reports recently resurfaced – one online and the other on national television – that cited potential vulnerabilities of wireless intrusion door contacts and window sensors, devices commonly used to secure the perimeter of protected premises. These reports came after two independent researchers who work in the industry, but announced their findings independent of their positions, cited that alarm signals from sensors and detectors to the control panel could be subve...
2014 has been a year of significant growth for TDSi TDSi 2014/2015 Review and Forecast:In 2014 we saw continued growth at TDSI, largely through unprecedented interest in integrated IP security systems. Asian markets have continued to be very buoyant, although there have continued to be some flat spots geographically, such as Europe. Compared to other technology markets, security has grown very quickly since the recession, and TDSi has enjoyed double-digit growth. Manufa...
Retailers can get more use from video surveillance data, ultimately targeting profitability As the holiday shopping season kicks into high gear, retail organisations have two primary concerns: making a profit on notoriously slim margins and shoring up potential areas of internal (employee) and external threats, including organised retail crime. According to the Global Retail Theft Barometer 2011, published by the Centre for Retail Research, total global shrink in 2011 cost r...
Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analogue to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus on camera, NVR an...
Browse expert commentaries
Expert Section
Related videos
OPTEX REDSCAN mini series protects The Londoner Hotel
Time challenge: installation of battery powered Aperio cylinder
IDIS launches efficient AI-powered security camera range
Security beat
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download