Technology & Trends - Bollards

The intruder within-why humans are the weakest link in your CNI security chain

Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even 'mac addresses' or a person of interest's gait, now all make up the technology toolbox of forward-thinking organisations' security policy. However, humans remain the weakest link in any security chain, and the only way to correct this is to eliminate the human burden, argues Richard Hilson, head of sales for secu...

2025 Access Control Solutions: Key trends & Innovations

Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience.  New access control...

Enhancing collaboration in physical security operations

In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of th...

Mind the gap: Addressing cybersecurity at every phase of technology management

In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their...

When choosing an access solution, make Total Cost of Ownership a key part of the calculation

Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and...

Healing through innovation: Securing healthcare in the cloud

As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, adm...

Unlocking new potential in video security through AI

Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basi...

Five considerations to make when building a scalable security program

Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology....

Comprehensive K12 security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common...

Optimising modular security solutions

Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own busine...

How mobile technology is redefining duty of care in organisations by Mark Niblett

When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls...

Modernising your identity governance for today’s security challenges

These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity go...

Strengthening retail security: strategies to combat the surging shoplifting epidemic

Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023,​ where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concer...

ADT: Five ways to maximise your home security

The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that bu...

The evolving role of access control in healthcare

Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications.  From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physi...

Bridging the consumption gap: A guide for systems integrators

Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies.  Consumption...

PR raises your cybersecurity company’s trust level

There are about 3,500 cybersecurity companies across 17 categories operating throughout the United States right now, according to both IT-Harvest and Cyber DB. So, on any given day, an IT security firm must beat back competitors in the market before it can even begin to battle the bots, phishing scams and ransomware attacks that are a part of your trade. And, you won’t be able to do that with marketing and advertising alone. Most, if not all, of your competitors are probably using a sim...

The King’s Coronation: Essential security considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasises the significance of implementing and upholding robust security measures, highlighting their role in safeguarding national and public events. In light of a number of tragic incidents, safeguarding public venues has become increasingly prominent in recent years. Despite ongoing threats from terrorism and spontaneous acts of violence, it is imperative that government entities, local authorities, and venue operators t...

Physical security management trends 2023

As the cost-of-living crisis intensifies in 2023, owners of construction companies will place a greater emphasis on environmentally-friendly materials, public safety, and strategies to increase value. Physical protection Key events in 2023 will have an impact on the physical protection of people, property, and businesses. King Charles III's coronation in May will be the focus of nationwide large-scale gatherings and celebrations and is already receiving security preparations. Even though this...

How schools can make outdoor learning safe and secure

Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head...

Key considerations for robust residential security

In the UK, one burglary occurs every 106 seconds. This means by the time you've finished reading this article, at least three will have taken place. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates and deter opportunistic intruders. With 58% of burglaries said to take place while the homeowner is in, it seems that even the second wave of lockdowns, and an increased number of people confined to their homes, won't do much to eli...

Securing healthcare facilities

COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020.  Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets...

3 key security tips for public event planners

Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented...

How Atlanta’s new Mercedes-Benz Stadium sets the standard for protection against vehicle attacks

Atlanta’s new $1.5 billion stadium, home to the NFL Atlanta Falcons football team and MLS Atlanta United football club and site of the recent NCAA national college football championship, is protecting fans, personnel and athletes from terrorists and errant drivers from using vehicles as weapons. While the threat of terrorists planning to attack soft targets, such as stadiums increases, stadium security professionals, such as those at the new Mercedes-Benz Stadium, must look for the weak p...

2017 security trends: Lone wolf terror encourages vehicle access control system installations

With the changing “lone wolf” style of terrorism, there will be a trend toward many more installations of vehicle access control systems and smaller numbers of units. Where a university, military base or airport might have 20-plus systems scattered among its grounds, there will be a growing number of smaller applications needing one, two or three systems. These will include customers such as primary and secondary education facilities; pedestrian locations such as shopping centres,...

Saving lives with effective security control centre design

When people think of control rooms, images from James Bond movies or intense action stories come to mind. What they fail to realise is the incredible level of ergonomics, technology, precision and craftsmanship required to create a top-notch command and control room. “These are rooms of complex functionalities, where hundreds of elements must be integrated and function in sync,” says Jim Coleman, National Sales Manager, AFC Industries. Professional teams from several different indus...

Vehicle attacks: Security professionals must protect pedestrians

On 19th December, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 people and injured more than 50 others. Less than a month before, the US State Department had warned about such attacks in public places throughout Europe, saying that extremist groups including the Islamic State and Al Qaeda were planning to focus on such locales during the Holiday Season. Two types of vehicle access point To stop these attacks, security pr...

Security lapses and hooliganism dampening Euro 2016 – How will France re-structure security focus and ensure fan security?

No matter how strong the security planning, it will take only one small failure tocreate an opportunity for unimaginable events(Photo credit: Marco Iacobucci EPP / Shutterstock.com) Successful security at UEFA Euro 2016 may well depend on the ability of the French to bring cohesiveness to disparate technologies. Given the scale of the threats, a variety of security solutions are being used visibly and behind the scenes – in addition to the presence of 90,000 police, gend...

Terrorism drives global demand for crash-resistant barriers, barricades and bollards at embassies and consulates

As terrorism continues to rear its ugly head, we at Delta Scientific have been upgrading high-profile embassy and consulate facilities for several major counties around the world. 2015 was a strong year for us. We saw an increase in manufacturing output on our complete line of vehicle barricades and guard booths. 2016 shows no signs of slowing down.    Increased global security measures for explosive-laden vehicles  The Middle East is a particular hotbed for increas...

How public and private security operations protect celebrities, big-name executives and dignitaries

For high value individuals such as the Pope,agencies have access to unlimited publicresources in terms of money and people  The Pope’s visit to the United States reminds us that protecting big-name executives, celebrities and dignitaries is a highly specialised security function. Public and private executive protection groups begin preparing for the visit of major world figures months ahead of time. “It is a task of massive proportions,” says Tom M. Con...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
Which AI-powered capability will dominate in the years ahead?