Technology & Trends - Intruder Alarms

Next generation PSIM solutions widen scope for traditional command and control systems

 PSIM systems extend their value beyond emergencies by including routinemanagement tools, that provide value during daily operations, such as automatingmaintenance activities Physical Security Information Management (PSIM), an acronym termed to describe a family of software platforms that claim to replace traditional command and control (C&C) systems, primarily used to provide situation awareness in control and monitoring centres of Critical Facilities. Traditional C...

Manned guarding equipped with latest technology improves security and threat detection

Technology solutions enhance and make manned guarding moreeffective and efficient the quickest way Most companies believe manned guards can help mitigate disturbances and neutralise situations, while at the same time reducing the chance of criminal activities and/or accidents occurring. However, people cannot be omnipresent or always be in the right place at the right time. When combining manned guards with the power of today’s technology, the results are unmatched. Dev...

Developing effective security applications for the operational technology environment

Many operators don’t know what’s actually transpiring on their OT networkand,even if hacked, have no knowledge of the assault Innovation in the oil and gas, utility, healthcare and transportation industries is heavily reliant on connectivity - between devices and systems, machines and data, people and processes. This connectivity is great for productivity upstream, mid-stream and downstream, but is also exposes these systems to greater cyber threat. Furthermore, as...

The all-IP future of public transport surveillance networks shows a growing demand for video analytics for better incident management

The report says almost 50% of the public transport organisations are willingto broaden the type of video analytics used A detailed survey of public transport operators shows a growing demand for networked/IP systems and video analytics to help cope with the requirements of large surveillance systems. The report, Video Surveillance in Public Transport, published by the international public transport association UITP and Axis Communications, is based on 74 respondents across 30...

Misguided trust leads to increase in security risks and potential attack from intruders

Stringent security policies are necessary in an organisation to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

Developing innovative aviation security technologies to prevent future terrorist attacks

What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police office...

Access control challenges in a changing world - from managing nurse servers in hospitals to securing sterile facilities

ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...

ISONAS Global VP of Sales Robert Lydic highlights importance of IP open platforms for access control

IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends in access control technology SourceSec...

ISC West 2016 - Educational sessions and opportunity to grasp new security trends attracts systems integrators

ISC West educational sessions bring into focus some of the challenges, issues and opportunities faced by systems integrators What will be the hot technology at ISC West 2016 this year? Devices to detect drones, more affordable biometrics, or cameras with 360 degrees of clear vision? You’ll probably see some of the above and much more if you’re attending the security industry’s largest trade show, scheduled for April 6 through 8 at the Sands Expo Center in Las...

Adopting smart security operational methods for greener businesses

Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...

Festival security – combining security personnel and security structures

Festivals bring together a huge number of people, often to large open areas andvenues, which requires a high level of security and protection fromthe organisers Festivals might be all about fun, but the fact that festival goers are out for a good time is an extra reason why the responsibility for safety and security lies predominantly with the organisers. Security during festivals plays an important role in ensuring safety of citizens. Since festivals witness congregation of...

Smart thermal cameras emerging as cost-effective outdoor security solution

Thermal cameras with video analytics detect with great accuracy in bright sun,fog, rain and other conditions Smart thermal cameras are rapidly becoming the intruder detection solution of choice for securing outdoor assets. Whether for smaller-range applications like protecting entranceways or gates, or securing large perimeters around energy, utility, chemical, or transportation assets, thermal cameras paired with video analytics offer an accurate detection solution that provi...

Modern public security systems enhance safety and security for citizens

It can be taken as proven that the trends in urbanisation, the mobility of the population and the demographics, have had and will continue to have tremendous impact on our daily lives. These impacts were and are supported by disruptive technology changes (such as the evolution of the internet and mobile communication) and result in higher dependencies of almost all economic and social processes. Compared with former generations, we are spending most of our time in buildings or closed mobile con...

Proactive PASS security guidelines address school security challenges and lessen potential for shooting incidents

The PASS guidelines don’t just point to specific technologies; they address security issues and help guide school administrators to make their schools safer and more secure From K-12 to college campuses, schools need integrated solutions and proactive measures to lessen the potential of active shooters while targeting general loss prevention and security. The good news is that technology is available to address nearly every threat and challenge, and systems integrato...

Technological innovations in security industry move towards greener performance

The development of PSIM security systems and the move towards smart buildings and cities holds huge potential for environmental performance in the security industry Is the drive to give clients improved CCTV, perimeter protection, intruder alarms and access control making our industry any greener? Is technological innovation consistent with reducing security industry’s carbon footprint? In any case, green operating practices are more a side effect of current developments...

Formulating background check strategies to minimise insider and post-hire threats

Employers are increasingly concerned about the risks associated with employees, temporary workers, independent contractors, and others who have the ability to wreak havoc on an organisation from the inside. This is often referred to as “insider threat.” There are numerous types of insider and post-hire threats that range from embezzlement, theft of trade secrets, workplace violence or active shooters, and everything else in between. Potential insider threats are...

CSAA/ANSI alarm verification standard to improve law enforcement responsiveness & reduce false dispatches

Improved alarm verification standards will help reduce the number of false dispatches of law enforcement officers The verification of alarms continues to progress with more affordable technology as well as an updated industry standard set for release as soon as the end of February 2016. The definition of alarm verification is getting a makeover in the standard, guided by a range of stakeholders including the security industry, law enforcement, associations and other intereste...

Wireless technology attracts security installers’ attention for its reliability and cost-effectiveness

Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signalling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programming, de...

Border security technologies "Trump" Presidential candidate Donald Trump's proposed U.S.-Mexican border wall

Trump’s border wall proposal reflects a rising demand forgreater border security When GOP presidential candidate Donald Trump proposed building a wall along the length of the U.S.-Mexican border, some ridiculed the idea. Yet, it also struck a nerve among Americans deeply concerned about unchecked illegal immigration. "I would build a great wall, and nobody builds walls better than me, believe me, and I'll build them very inexpensively. I will build a great, great wall o...

Lone Worker Conference: Measures for personal safety and mental wellbeing

There are between 4 and 6.8 million lone workers in the UK, and many of us arelone workers at some point in our working lives The Suzy Lamplugh Trust was set up to highlight the risk faced by lone workers and to offer information and advice to reduce the risk of violence and aggression for everyone. It was established following the disappearance in 1986 of 25-year-old estate agent, Suzy Lamplugh, after she had gone to meet an unknown client. This article is based on a present...

Sophisticated analytics of high-definition video security systems set to drive growth in surveillance market

Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from...

NCS4 supports sports and stadium security with training, research and academic programmes

NCS4’s research has mainly been on professional sports venues, but they alsodevelop best practices for all levels of sports – including high schools and colleges Some of the most profound changes in the way sporting events are secured have come about since the terrorist attacks on Sept. 11, 2001. A realisation that stadiums could be a target for terrorists has transformed sports security into a highly sophisticated profession that works closely with local and n...

Affordable cloud-based cybersecurity subscription adds value with email alerts and 24/7 service for resellers and SMB customers

SIPcurity is a new breed of security product that is a key element of anyAdvanced Threat Protection (ATP) framework As cyber threats continue, there’s no business or market immune from malicious takeover and data compromise. Now, systems integrators have a new, cloud-based weapon in their arsenal designed specifically as an affordable monthly subscription service to prevent telecommunications attacks and takeovers directed at small to medium businesses (SMBs).  Acc...

Enterprise command software integrates data sources to analyse security, business and risk profiles

The role of today’s security leader continues to evolve as they are faced with an ever-expanding risk environment that includes active shooters, crime, natural disasters, liabilities and cyber threats. Most recently, the terrorist attacks in Paris and the active shooter violence in California once again served as reminders of the threats organisations face on a daily basis.   Intelligent technologies for proactive security management Over the past year, the increased fo...

Situational awareness and emergency response solutions strengthen security infrastructure

The security environment is unsettling and continues to require focus and continuing vigilance to increase security measures. Sensors in active technology systems play an important role in situational awareness, which helps in identifying and responding to emergency situations.   As of October 2015, there were 45 school shootings in the United States. There continues to be grave concern about potential “lone wolf”-type events for individuals and businesses. Situati...

3xLOGIC on the value of “dark data” collection from video, access control, intrusion and biometrics

2015 was one of the more stable of the last five years. We’re seeing a fundamental increase in confidence that is freeing up capital spend. There’s a good bit of pent-up demand, and larger projects are being funded. We’re seeing more M&A deals, not an explosive change, but a marked increase and more quality deals. These deals reflect an interest and demand for services and solutions. The commoditisation of cameras and NVR/DVRs is putting pressure on long-term players as we...

5 basics for implementing effective physical security

Deadly terrorist attacks on buildings have highlighted the need of a well-designedand well implemented physical security programme What constitutes a well-designed physical security programme? Deadly terrorist attacks on buildings such as the San Bernardino Administrative Centre, Riverside Countyin California., have highlight the need of a well-designed and well implemented physical security programme. S.Steven Oplinger, Chair of the ASIS Physical Security Council, outlines 5...

Reactive to proactive - central command centres transform security capabilities for organisations

Command centres allow physical and IT security to collaborate for greatersituational awareness and responsiveness Conventional command centres focus on video and access control system monitoring. When something happens at a door, the video system reports the event to one monitor in the command centre, while the access control system reports to another monitor. It is up to the operator to imagine the possibilities, draw the right conclusions, decide on a response and, if necess...

SourceSecurity.com 2015 Review and 2016 Forecast

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.   Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...

Security industry’s top 10 mergers & acquisitions of 2015

For the second year in a row, Canon made the biggest M&A move in the security marketplace in 2015. How could Canon top the industry shockwaves it created in 2014 when the Japanese giant acquired VMS company Milestone Systems? That’s easy: They bought Axis Communications for $2.8 billion in 2015.   Although the Canon-Axis deal grabbed the most headlines and was easily the most shocking M&A announcement of 2015, it was certainly not the only big news on the mergers...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
Which AI-powered capability will dominate in the years ahead?