Technology & Trends - Access control systems & kits
The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control centre. The post of security officer was a minimum wage job requiring little more than a high school diploma, if that. Educated and experienced security officers a prerequisite No more. “Today, when we read our requests for proposal (RFPs), we’re...
Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...
Online wireless locks enable real-time online access control functionality Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customised system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...
Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...
School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (primary/secondary) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase in de...
According to ASSA ABLOY the market knows less about wireless locks Let’s begin with something that’s hardly front-page news: the market potential for wireless access control is huge. At January’s Intersec exhibition forecasts of 15% annual growth in the Middle East region alone were suggested. ASSA ABLOY’s own data predicts that wireless locks could make up 30% of the total market within a decade. The potential is there. Market knows less about wirele...
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...
Questions surrounding the Germanwings Airbus A320 air crash centre not just on mental health, but on a topic we deal with daily – access control. According to the flight recorder, the co-pilot of the doomed aircraft locked himself alone in the cockpit and deliberately slammed the plane into the side of a mountain in the French Alps, killing himself and 149 people. Early in the investigation and based on incontrovertible evidence from the flight recorder, Brice Robin (a prose...
A BBC report Monday alleges instances when Security Industry Authority (SIA) licences were fraudulently obtained, prompting questions about licencing processes and whether unqualified candidates are being "fast-tracked" and provided SIA cards without taking the required hours of training and passing exams. Following is a statement provided to SourceSecurity.com by Robert Buxton, head of communications, Security Industry Authority, about the matter: SIA assures investigation over...
A comprehensive security assessment will tell how to plan and manage security in the facility A comprehensive security assessment will tell you how to plan and manage security in your facility. Without an assessment, you can only guess about security. For facilities with existing security programs, an assessment can also reveal whether the pieces of the system are working as they should. As a security director, can you do the assessment yourself? Sure, although a large school...
Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across several countries during a week when UBM announced that Protection & Management 2015 (which includes the IFSEC International trade fair) will feature Karren Brady (Baroness Brady), a career soccer executive, as one of its inspirational keynote speakers. As I type, inquests are being held into the deaths of some of the 96 people who were kill...
Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...
Rob Martens, Allegion's futurist and director of connectivity platforms, is a leading strategist on the Internet of Things (IoT). He will be a featured panelist at the IoT Global Innovation Forum in April. In the following interview, Martens unfolds more about Allegion's IoT position and strategy. Question: There's a lot of buzz about the IoT. How is Allegion playing in this space? Rob Martens: Allegion is very active in the IoT space and is widely respected by many other peer organisatio...
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged to a group promoting the unification of North and South Korea and that South Korean President Park Geun-hye called the event an attack on the South Korea-U.S. alliance. You would want to know where in Seoul the attack occurred as well as many...
The FERC standard CIP-014-1 became effective, according to the Federal Register, on January 26, 2015 The electric power industry works with several federal agencies, including the Federal Energy Regulatory Commission (FERC), the Department of Homeland Security (DHS), and the Department of Energy (DOE) to improve sector-wide resilience for cyber threats. The industry also collaborates with the National Institute of Standards and Technology (NIST), the North American Electric Re...
With the industry’s largest security trade show just weeks away, we spoke with leading systems integrator Securadyne Systems, Austin, Texas, for their assessment of ISC West and how they use the show to benefit their organisation. Terry King, vice president and regional general manager, shares his thoughts on what Securadyne Systems plans to accomplish at this year’s event. SourceSecurity.com: What is your take on ISC West and what do you get out of it? Terry King: ISC West has al...
There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the rewards. New opportunities for integrator companies, especially related to recurring monthly revenue (RMR), are among the benefits of new cloud-based systems. For insights into those opportunities, we spoke with Robert Hile, currently director of strategic accounts for SureView Systems and a strong proponent of cloud-based systems, whose backgroun...
Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and an automated key control system is a valuable tool. Key management systems offer multi-site transportation facilities increased security and control to help prevent authorised key access as well as reducing the number of lost or misplaced keys. As an example, road repair is often done at night and requires equipment, vehicles, lights, gene...
It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools. However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...
According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal 22 percent or so. According to research firm IHS, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015. Perhaps this increase is due in part to the rise of interactive ser...
Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at least mitigate those risks. This article explains the need to identify and respond to risks involved in a supply chain. Manufacturers should make efforts and develop strategies to enhance supply ch...
The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on data-centre resources and accumulating at a rate faster than anyone can process. Is the proliferation of sensory data simply evidence of an increasingly intrusive world, or can IoT be used for the improvement and development of intelligence-equipped cities? We believe that with the right steps the convergence of city operations with IoT...
Veterans are able to use their skills from the military to help develop strategies Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role in frontline positions, but also their exposure to a diverse array of security challenges make them increasingly valuable in formulating security management strategies. At the same time, such companies also offer the veterans an alternative and re...
Recent news of Canon’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many could easily digest the move as more consolidation of the marketplace, especially the crowded video surveillance space. Systems integrators weighed in on what they expect and the long-term outlook for IP camera leader Axis and Canon, a Japanese firm predominate in broadcast, optics and consumer electronics. Joe Liguori, a partner at Access Co...
Regular upgrading ensures all systems communicate correctly In the IT world, innovation moves quickly. New versions of software are launched every day to keep business processes running smoothly. So frequent upgrading isn’t even a choice anymore – it’s a must to avoid losing valuable time and data. In this article, Dirk Kappert, IT specialist and CEO of the German company ACEA, explains about the relevance of upgrade assurance and how it applies to phys...
Many purpose-focused stand-alone systemsaddress business goals aside from security Transportation gets passengers and goods to their destination safely and in a timely manner. Making transportation possible are purpose-focused stand-alone systems – many that address business goals and others that achieve safety/security goals. Some systems can impact both business and security goals. For example, access control can eliminate the expense and maintenance of locks and keys...
Organisational resilience takes all appropriate actions to help ensure the organisation’s continued viability In this day and age, the traditional components of security officers, cameras, access control and alarm systems aren’t enough to protect a company or organisation. No matter how good your preparations, security sometimes breaks down, and bad things happen. That can take a toll on a business. Today, security’s role extends to organisational resilience...
CPTED focuses on designing crime prevention into buildings and campuses In recent years, jurisdictions across the United States have enacted ordinances or codes requiring the use of Crime Prevention Through Environmental Design (CPTED). Enforcement of these measures arises through required jurisdictional review and approval of CPTED measures in the design drawings. CPTED has emerged in recent years as an effective crime prevention and security technique that focuses on design...
Whether you are a contractor, installer, dealer or systems integrator depends on where you live and how you are perceived by the real world Because I have been in the industry for a considerable amount of time, I have seen quite a few changes, albeit the bulk have come over the last five or so years. Before that, the advent of the digital dialer was our big innovation – that tells anyone with any history in the industry just how far back I go! But today, change is fast a...
Browse expert commentaries
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
Dahua 4MP WizColor Bullet Camera with Fixed-Focal and WizSense AI
Hikvision WonderHub: Interactive Displays for Collaboration
Verkada GC31 Cellular Gateway for Seamless Device Connectivity
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download