Technology & Trends - Audio, video or keypad entry

School security: Communication and controlling access

Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...

Sounds of security: convenience stores adding audio to reduce crime

Audio systems can enhance liability protection. Recently, a large regional convenience store chain with units across the Midwest and South supplemented its video surveillance security system with an audio monitoring system. Retail stores with Louroe audio system: The technology has been installed in more than 700 of the convenience retailer’s locations. The Louroe Electronics systems feature omni-directional capability and sensitivity and pick up sound within a 15-foot...

Online and offline locks: Leveraging the best of both options

Online wireless locks enable real-time online access control functionality Organisations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customised system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...

Addressing the unique security challenges of primary/secondary schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Is home automation driving a security renaissance?

According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal 22 percent or so. According to research firm IHS, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015. Perhaps this increase is due in part to the rise of interactive ser...

Q&A: Integrator weighs in on the security of web-based services

Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Serv...

Grants drive education and healthcare communication systems purchases

 Grants continue to be available for schools to purchase products such as our intercoms and communication systems 2014/2015 Aiphone Review and Forecast: Video surveillance, audio, access control and locks are the four security solutions that typically work together as part of an overall security plan. Demand for video may have been the prime driver, but 2014 was a solid year for each of these solutions as the economy improved noticeably. Also, federal and state governmen...

How cloud-based services will transform the access control market

Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...

Key trends driving access control growth

Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...

Key control and management for emergency situations at educational facilities

It used to be that the word “lockdown” was only ever used in reference to an emergency protocol to restrict movement in a prison environment. Today however, the term is in common usage in educational and other environments to describe measures taken under certain conditions of threat. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, explains that lockdowns, along with building evacuation and sheltering procedures, are an integral part of a...

Biometric technology - Identifying values and benefits

What is it about biometrics that triggers so much worry?  Initial resistance gives way to mainstream acceptance when biometric technology allows convenient and secure access to healthcare, banking services, amusement parks, office buildings. What is it about biometrics that triggers so much worry? In the past, concerns seemed to have their foundation in the use of fingerprints in law enforcement; the association between fingerprints and criminality was strong.&n...

Importance of open technology platform for electronic access control

Looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analysing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike. Breaking down individual doors into a series of classifications can be most helpful in assuring that the EAC is performing to the highest standards that the budget allows. Karen Keating, Allegion Portfolio Marketing Manager, Electro...

Fault tolerant access control for business continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...

Security by design or designed for security?

Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles.  These principles of physical security, many of which can be drawn from proven principles of IT security, su...

Access control with mobile phones: the future with Near Field Communications

  Keys could be a thing of the past as Near Field Communication technology enables mobile phones to be used as keys Near Field Communications (NFC) technology is a catalyst that will hasten the use of mobile phones as mobile electronic keys for access control. Though the technology already exists, the necessary infrastructure and supporting devices still have some way to go. In this article, Rachel Sa of ASSA Abloy Future Labs evaluates the benefits an...

Tips to reduce false security alarms with proper installation, education and training

  False security alarms can be reduced with simple business practices In today's security conscious environment, repeated false alarms can be costly to a business, and not just in financial terms. A false alarm is simply the activation of one's security alarm system for no apparent reason. With the introduction of European standards and the UK implementation of PD6662 (scheme for the application of European Standards for intruder and hold-up alarm systems) and DD243 (code...

Protecting financial organisations from emerging security risks with integrated solutions

  Globalisation and new technologies have led to increased threats for financial organisations The banking and financial sector needs to be constantly prepared to manage an increasing range of security risks, from fraud and anti-social behaviour to data mismanagement. Organisations must anticipate such potential risks and have well-established plans in place to address them.  Honeywell, with more than 50 years of experience in the security industry, is helpin...

Voice recognition – benefits and challenges of this biometric application for access control

Consumers prefer voice recognition technology for biometric identification Voice recognition is the most preferred form of biometric identification among consumers. Derek Scheips for ASSA ABLOY Future Labs outlines the concept behind this technology and some of its uses and drawbacks. With all types of biometric applications on the rise, voice-based authentication is one approach that seems to engender less resistance among users than other biometric forms of s...

Extending Ethernet capabilities to enable better network security applications

PoE technology allows for safer environments through better security systems Power over Ethernet is both convenient and affordable, says Jonas Rehnberg of ASSA ABLOY Future Labs. The benefits to network security are immense, be it in powering security cameras with added features or enabling better access control systems and intruder deterrents. Hailed as a watershed innovation when first standardized in 2003, Power over Ethernet (PoE) offers a way of supplying electricity to n...

The future of intelligent doors

  HID and Abloy UK are creating the future of intelligent doors At IFSEC 2009, ASSA Abloy launched Hi-O, a new concept for electronic door solutions that improves and simplifies the installation, service and upgrade of access control systems and allows end users to create the first truly "intelligent doors". SourceSecurity.com spoke with Matt Thomas, Managing Director of Abloy UK, and Ian Compton, Director of Sales for UK, IE and Nordics for HID Global, to find out more ab...

Biometrics - a view of the future

Biometric technology has been with us for over two decades, but how will it evolve over the next ten years?  John Davies, Managing Director of access control specialist TDSi, looks at the impact of biometrics and considers how future developments might shape the security industry. Biometrics is quite rightly viewed to be at the cutting edge of security technology.  From the very first commercial application of a finger print reader in 1984, we have seen new systems and applications in...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?