Technology & Trends - Access control systems & kits

Integrator Preferred Technologies adopts value engineering and custom expertise to simplify end-user interface

System integration is about adding value, and value-engineering is the solution to address the challenges facing the customer and their facility Leading systems integrators continue to embrace new technology and add a range of services focusing on IT, connectivity and integration. The trend will continue for forward-thinking companies seeking to differentiate themselves from the competition and gain a loyal following of end-user customers.  Pref-Tech - History and backg...

Pure IP access control technology: 10 things you need to know

 IP is here and is continuing to proliferate in the security industry and its next major advancement is in pure IP access control IP technologies in the security industry are nearly ubiquitous today. End users and integrators have adopted and embraced IP cameras, building automation systems, wireless mesh networks, alarms, monitoring, and regularly view all of these technologies from the palm of their hand, on their smart phone. The technologies are easier to install, oft...

Insider threat – overcoming internal security risks

The worst insider threats are existential, dangerous enough to literally destroy an organisation The key to maintaining an effective security system is timely detection of security breaches. Widespread use of technology has resulted in massive amounts of data transfer which in turn makes organisations vulnerable to both internal and external threats. Mass shootings, data thefts and other internal breaches of security have cast a spotlight on the issue of insider threats. Accor...

French train attack highlights challenges of railway security on inter-continental networks

The sheer number of travelers and lack of passport control in the Schengen Area in Europe tests railroad security’s capabilities Railway security faces the unenviable task of monitoring hundreds of thousands of passengers travelling between countries every day, and an attack on a train in Europe last month has cast a spotlight on the conflict between offering fast and efficient transport services whilst conducting thorough surveillance of passengers and luggage in transi...

Key management and access control systems deter security breaches at data centres

A variety of control and usage options are available for automated key management systems in data centres The protection of networks and data centres is a growing concern given the recent spate of high profile security breaches, and it is forcing organisations into taking serious steps to improve protection. For many businesses, this means implementing a combination of passive and active security measures designed to deter, detect and react against threats. Included in these m...

Aviation security and counter terrorism since 9-11 terrorist attacks

Preventive security measures and security training of personnel in the line of fire have improved dramatically Aviation security has significantly intensified since 9-11, and we’re making it more and more difficult for terrorists to get to us on the ground and in the air. In February the FBI arrested three men in Brooklyn plotting to hijack an airliner, and in the 14 years since the terrorist attacks of 9-11, officials have foiled dozens of plots against airlines, buildi...

RFI Enterprises talks security systems integration, change, competition and building community in an exclusive interview

RFI Enterprises has a Central Station Alarm Association (CSAA) Five-Diamond Monitoring Center RFI Enterprises started in a small town and has over the years grown to a large regional business. The company has developed innovative security solutions to fulfil customer’s requirements for a secure environment. It has managed to stay ahead of growing competition within the systems integrator sector and design solutions for customers ranging from aerospace, banking and health...

Celebrating 40 years, The Protection Bureau continues to lead new technologies and services, with a customer focus

The Protection Bureau is one of the top-10 security integrators in the US You really can’t talk about The Protection Bureau without discussing its founder, the late Keith Ladd. If you’ve been in the industry any length of time, you probably had a chance to meet him. I certainly did. In fact, when I was a cub reporter with one of the first security publications I ever worked for, my inaugural visit to a customer and central station was to The Protection Bureau. That...

Mobile access control and smart phones proving convenient in hoteling world

More and more commercial buildings today are replacing mechanical keyed locks with card access systems. The basic reason is familiar to security professionals: card systems, once installed, cost less to manage and maintain. “When people are let go, if you don’t get their keys back, you have to rekey the locks and give everyone new keys,” says Brett St. Pierre, director, education solutions with Austin, Texas-based HID Global. “With a card system, all y...

Dakota Security Systems on what security integrators want from manufacturers

Manufacturers need to come to integrators with a multi-faceted approach on how a wholesale change could be made Dakota Security Systems Inc., Sioux Falls, S.D., a security systems integration company is nearly 40 years old and started as a lock shop. Eric Yunag, president and chief executive officer, has been at the helm of the award-winning company for nearly 10 years. In an exclusive Q&A, SourceSecurity.com asked Yunag what he looks for from his manufacturer-partners. S...

Increasing demand for biometric and face recognition applications: TDSi IP access control sales surge in Europe

Customers are seeking systems integration as a solution rather than a component The migration of access control systems from conventional technology to IP has had a positive impact on TDSi’s sales for IP equipment.  Increasing demand for biometric and face recognition applications has also paved the way for better and improved access control systems. According to John Davies, Managing Director of access control company TDSi, the state of any given market depends on...

Airport security to school safety – effective access control measures

Airport security has tightened ever since the September 9/11 catastrophic event. Post-incident investigation of such events often brings to light a particular weakness in security. As a result, security and safety protocols are developed in reaction to such traumatic events. Similar to the security measures adopted by airlines, school safety systems have also undergone major changes with a variety of electronic and mechanical access control products that prevent assailants fr...

Wavestore’s Better Together partner programme supports VMS security solution installation

Wavestore’s Better Together programme is designed to offer benefits to security installers and integrators An independent video management system (VMS) offers an open platform that can support the “best-in-breed” components of security systems, according to James Smith, director of marketing at Wavestore. “We offer a truly open platform and are truly independent – what we do really well is bring disparate technologies together,” says Smith....

Big players, startups, technologies driving future of home automation

Small-timers with big ideas can always make their way into the industry In recent years, home automation technology has given birth to the “Smart Home” in which internet-enabled and controlled devices are bringing a new level of comfort to the standard house. From locking doors to setting the temperature to opening the blinds for a view of the sunset, technology is transforming the home into something reminiscent of the now-quaint 1960s sci-fi cartoon, The Jetsons....

Voice biometrics improve security levels, expands to commercial applications

Voice biometrics is fast becoming a security imperative due to increasing instances of fraud and identity theft. From identifying customers at banks and call centres to securing mobile devices in a “bring your own device” world, the use of a person’s unique “voiceprint” is fast gaining ground as an identifier. The global voice biometrics market is expected to reach $4.7 billion (U.S.) by 2020. Much of it is being driven by the increasing need to...

Improving video surveillance effectiveness with IP and analytics

The key driver to growth in the IP market is the effectiveness and efficiency of the technology Technological advances in video surveillance are allowing end users the flexibility to do more with their systems than previously imagined. 2014 saw several new technological trends that shaped the future of the security market, with 4K and cyber security being the main drivers. The drift continues this year too with end users demanding HD video surveillance and wide-spread...

Casino security - HD IP cameras offer better video surveillance capabilities

Large busy casinos must maintain continuous surveillance of multiple tables and machines High-definition (HD) cameras are a perfect fit for the casino market. HD security cameras provide six times the resolution of analogue cameras, supplying images with sharper edges that easily identify faces, cards, dice, chips, currency, and fill slips. In addition, high-definition IP cameras can reduce camera count. A single, 1080p camera can effectively cover poker, roulette or craps tab...

Complete Security Systems discusses future security industry trends

According to Chris Mosley, President of Complete Security Systems self-monitoring with video security is a moving trend Complete Security Systems Inc., Marlboro, New Jersey, is a UL-listed central station and security installation company serving New Jersey and other East Coast areas. According to Chris Mosley, President of Complete Security Systems, attracting young people to the security industry is a challenge. Chris highlights Complete Security Systems' new products, servi...

DIY home automation vs professional home security systems

Once home automation – controlling everything from HVAC to door locks to lights to security cameras – was solely the providence of the high-end home. Custom systems were pricey – some ranging upwards of $100,000 or more. That was before widespread access to broadband internet and before everyone started carrying a powerful internet-connected mini-computer – called a smart phone – in their pocket. Home Automation goes mainstream These days the Smart Home has gone...

Tyco lawsuit pending; warehouse security systems' loopholes allegedly exploited

National Union Fire Insurance Company claims that Tyco failed to protect confidential details of the warehouse security systems A civil trial against Tyco Integrated Security was adjourned by a federal judge on July 14 and is now rescheduled for October 19. The lawsuit arose out of the burglary of a pharmaceutical warehouse in Enfield, Conn., owned by Eli Lilly. Eli Lilly’s insurance company, National Union Fire Insurance Company claims that Tyco failed to protect confid...

Body Search 2015 considers aviation security technology and applications

Intimate body search at airports also takes a psychological toll on the person conducting the search SourceSecurity.com's European Correspondent, Jeremy Malies gives an account of the Body Search 2015 security conference that was held at Hounslow, London. Along with emphasis on aviation security, the conference also covered an array of safety and commercial applications. Some of the topics outlined in this article include: New techniques in body scanning, the exasperation publ...

School security & safety best practices: Designing physical security framework

School security has increasingly become an area of focus among school boards and municipalities. Officials are constantly seeking to implement or improve security and safety policies, procedures and technologies to offer the highest level of protection for students, staff and visitors. Every second counts in an emergency or crisis, making it imperative that schools have policies and procedures in place that make it possible to lock down buildings instantly while simultaneousl...

PSIM transition to Converged Security and Information Management (CSIM)

(see bigger image) The very nature of true enterprise PSIM software is that it has the capability to connect to other systems and subsystems In this article, James I. Chong, CEO & Founder of Vidsys, sheds light on true PSIM (Physical Security Information Management). He mentions how Vidsys is continually innovating and accelerating its roadmap for PSIM toward Converged Security and Information Management or CSIM. Citing various analysts’ projection, James s...

Honeywell, Twitter integration for situational awareness and emergency communications

Honeywell, Twitter integration brings security communication to its life safety products Honeywell, Northford, Conn., is leveraging the Twitter social media platform to bring higher levels of situational awareness and emergency communications to its life safety products. This move focuses to improve emergency response by monitoring various security, safety or building systems and providing information to identify potential threats. Gamewell-FCI’s Focal4 Now, Gamewe...

Home automation standards and protocols

As the home automation industry has expanded with an ever growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Wave and ZigBee. Companies are also using a variety of other standards including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s ClearConnect. Next-generation protocols: Bluetooth and Wi-Fi “Right now companies are releasing really i...

EMERgency 24, dealer value and RMR with critical response services

EMERgency 24 developed the Incident Command and Control platform to deliver faster and more succinct data to first responders and others At ISC West 2015 in Las Vegas, EMERgency24 introduced a groundbreaking web-based software platform called Incident Command and Control Service, which allows system owners to generate alerts for situations such as lockdown, severe weather or HAZMAT (hazardous materials) situations and enables instant communication to pre-defined contact groups...

Body search and airport security – maximising safety and dignity for travellers

A US Department of Homeland Security investigation showed that undercover agents defeated airport screening in 95 percent of cases by smuggling mock explosives and weapons past checkpoints. With admirable transparency, U.S. Office of Inspector General (OIG) has described how so-called “Red Teams” posed as regular passengers and exposed inadequate measures at some of the busiest airports across the United States. The revelations came a few days before Body Search 2...

Physical security solution buying guide: 7 things to consider

All seven decision factors contribute to an effective physical security solution Installation of an effective physical security solution can enable end users to avoid serious mistakes. This article presents a comprehensive and consultative decision methodology to help end users make the best decisions about security entrance products for the long term. The decision-making process is based on Boon Edam’s more than 100 years of experience in installing thousands of entry s...

Smart home security risks with Internet of things (IoT)

Security and technology are rushing to offer home automation solutions and build out the Smart Home of connected devices and applications. As cameras, alarms, as well as, thermostats and other appliances become controllable and programmable using Internet-enabled smart phones, they are becoming part of a vast web called the internet of things (IoT). Achieving greater value through smart data exchange This network of physical objects or "things" embedded with electronics, software, sensors and...

Role of interactive services in maintaining steady RMR stream

Affiliated Monitoring’s UL-Listed monitoring centre with a second floor dedicated to areas for security company meetings Central monitoring stations have innovative approaches to assist security installing companies in growing their account base, adding value and boosting recurring monthly revenue (RMR). These companies do much more than simply monitor accounts – today they provide a host of services to give security installing companies the added edge in an extrem...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
Which AI-powered capability will dominate in the years ahead?