Technology & Trends - Intruder Alarms
Physical and cyber security convergence, perimeter intrusion detection systems and fibre optic-based sensors were some of the security trends that picked up pace in 2015 and will continue to grow in the coming year as well. The beginning of 2015 started out slowly as the implementation of security projects by a number of organisations was postponed for various reasons. Mid-year picked up momentum, and the year is ending on a strong note. A significant trend was the gradual progression of conve...
Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorised person follows an authorised personnel through a controlled entrance. More than 50 percent...
With every technological advance that canbenefit museum management comes anotherthat may assist thieves When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as m...
Williams Meredith recently stepped out of his Kentucky home to see a drone hovering over his porch, videotaping his young daughters by the family pool. It wasn’t the first time one of these small flying devices had wandered over to take a look, but it had never gotten so close. So he did what any red-blooded American would do when confronted with a home invader – he blew it from the sky with a single shotgun blast. The confrontation is another example o...
The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...
The CertAlarm scheme is today the only European certification scheme that has been endorsed by the EA Today, manufacturers who plan to sell their fire and security products in different European countries are faced with uncertainty regarding the standards against which their products should be developed, tested and certified. There are no harmonised EU-wide standards or certification schemes for security equipment, instead there is a suite of EN standards plus a variety of co...
Observers suggest asking open-ended questions and focusing in on specific details as the conversation moves ahead If a trained interviewer has ever questioned you, you may have started out by promising yourself to keep certain information secret. Then during the interview, you spilled it all. Police detectives, officers and savvy security professionals have learned how to talk to people in ways that will elicit information that subjects prefer to conceal. How do they do th...
Social media channels have active and consistent users and may constitute a promising audience for security integrator’s marketing efforts If you have any lingering doubts about the impact of social media, consider this: Worldwide, there are over 1.44 billion monthly active Facebook users, which is a 13 percent increase year over year, according to the social media giant. In addition, 936 million people log onto Facebook daily (as of March 2015), whi...
(Click to see larger image) The ASIS Foundation & the University of Phoenix College of Security and Justice's Enterprise Security Competency model Are you competent in your security job or profession? How do you know? According to research carried out by the ASIS Foundation, security has begun to evolve beyond guarding doors, checking IDs and screening briefcases and purses. Today, something called Enterprise Security Risk Management (ESRM) is subsuming the...
Major art heists often feature audacity that defeats even the most thorough security protocols Museum security, like art, is ever-changing. Traditional security practices like manned guarding alone are not sufficient to keep thieves at bay. Modern security technologies such as video surveillance, motions detectors, intruder alarms and other physical security devices also play an equally important role in securing museums and its art work. Regrettably, having all the...
Conley’s security officers must study for and acquire a Certified Protection Officer (CPO) certification After nearly 40 years of a sustained and concentrated effort to transition the security industry to the security profession, Tom Conley is still beating his “security profession drum” at full volume. He still hopes that the security industry-to-profession movement will one day be a reality. He sees himself as an eternal optimist embarking on a feat of...
The vision of a utopian urban future restsheavily on the success of Open Dataand a Cloud Computing paradigm Confronting urban challenges using technology requires the private sector to work in tandem with governments to enable "smart cities." In fact, one report predicts the number of safe cities worldwide will quadruple in the next decade. It’s a topic that is increasingly top-of-mind. For example, the Safe Cities Asia 2015 conference in Singapore in May brought to...
For high value individuals such as the Pope,agencies have access to unlimited publicresources in terms of money and people The Pope’s visit to the United States reminds us that protecting big-name executives, celebrities and dignitaries is a highly specialised security function. Public and private executive protection groups begin preparing for the visit of major world figures months ahead of time. “It is a task of massive proportions,” says Tom M. Con...
NVRs make it easy to benefit from HD solutions and integrations to access control, alarm systems, intercoms and other technologies Developments in the IP video camera market have a direct impact on the other components in a system. With the emergence of higher definition cameras – whether 4K cameras or 8K or even higher – the market now needs back-end devices that can perform the decoding work. Also, more intelligence is needed, including smart functions such as pe...
7K cameras are best suited for large openspaces such as stadiums and city centres,capturing the finest details in their footage With several manufacturers now offering 4K CCTV cameras, Avigilon, based in Vancouver, British Columbia, raised the bar in April 2015 with the launch of their 7K HD Pro surveillance solution. The 30-megapixel camera is the latest addition to the company’s Professional Series, an innovative model Avigilon believes will drive competition in the se...
Enterprise security strategies identifyliabilities & ways to mitigate risks, showinghow the cost of mitigation prevents largerliabillity costs The security profession continues to take on new risk management responsibilities. The big thing now is called Enterprise Security and Risk Management (ESRM). ASIS International has issued a standard on the subject: ANSI/ASIS/RIMS RA. 1-2015, and a couple of booths at the recent ASIS International 2015...
Millions of dollars are spent annually at border crossings on technology such as buried volumetric sensors Border control forces, train operators, ferry companies and humanitarian organisations have spent much of 2015 concerned with people trafficking between the northern coast of France and the United Kingdom. Now the focus has switched to migrants fleeing civil war in Syria. It is one of the biggest migrant crisis that Europe has witnessed so far, with hundreds of refugees s...
The open and exposed nature of rail yards exposes railway assets to tremendous risk The importance of rail transportation in driving the U.S. economy cannot be overstated. In recognition of this, America’s railroads are investing in the infrastructure and technology necessary to improve security for the tracks, bridges, tunnels and other vital components that make up this critical transportation network. The unique security requirements of these assets present a nu...
Aventura continues to expands expand its feature set of products beyond PSIM As the 61st annual ASIS 2015 kicked off in Anaheim, Calif., it became increasingly clear that physical security continues to move from the realm of traditional intrusion detection, video surveillance and alarms into value-added applications that extend into new markets, uses and purposes – many of them centred on business and operational processes. While video surveillance, intrusion detection,...
Have interactive services lost their edge? Are users discouraged and disenthralled? That’s a myth that needs busting, because security companies continue to have success offering these solutions to customers. Alarm companies who began their business with traditional intrusion detection continue to deliver interactive services as part of a total, connected home solution. Companies like Complete Security Systems, Marlboro, N.J.; Marshall Alarm Systems, Yorktown Heights, N.Y.; and The Securi...
The pre-seminar will also offer educational sessions on cutting-edge subjects It is that time of the year again, when security industry stalwarts gather together at ASIS to showcase the latest in physical security systems and other technological innovations. The event will focus on domestic threats as well as intelligence gathering tools to protect organisations against social media threats. The organisers of the ASIS International 61st Annual Seminar and Exhibits — ASI...
ASIS is a great opportunity to not only learn about new technologies first hand, but also to benchmark offerings against competitors Now in its 61st year, the American Society of Industrial Security (ASIS) Seminar & Exhibits is more than an end-user show. Many systems integrators also attend, walk the show and even exhibit to meet with potential customers and perhaps see technology they may need to apply to their clients’ security challenges and issues. This ye...
Police intelligence can help security directorsto understand the criminal trends across theirarea or city Corporate security has changed dramatically over the last few years. Traditionally, security has always been associated with physical protection and installation of security systems. In this article, Tom M. Conley, president and CEO of The Conley Group, discusses the importance of information received from law enforcement. A good rapport with law enforcement can help...
The sheer number of travelers and lack of passport control in the Schengen Area in Europe tests railroad security’s capabilities Railway security faces the unenviable task of monitoring hundreds of thousands of passengers travelling between countries every day, and an attack on a train in Europe last month has cast a spotlight on the conflict between offering fast and efficient transport services whilst conducting thorough surveillance of passengers and luggage in transi...
Preventive security measures and security training of personnel in the line of fire have improved dramatically Aviation security has significantly intensified since 9-11, and we’re making it more and more difficult for terrorists to get to us on the ground and in the air. In February the FBI arrested three men in Brooklyn plotting to hijack an airliner, and in the 14 years since the terrorist attacks of 9-11, officials have foiled dozens of plots against airlines, buildi...
RFI Enterprises has a Central Station Alarm Association (CSAA) Five-Diamond Monitoring Center RFI Enterprises started in a small town and has over the years grown to a large regional business. The company has developed innovative security solutions to fulfil customer’s requirements for a secure environment. It has managed to stay ahead of growing competition within the systems integrator sector and design solutions for customers ranging from aerospace, banking and health...
9-11 caused a sharp refocus of attention on security assessment and risk management Fifteen to 20 years ago, security was a relatively sleepy, small-time business. Companies typically hired a guard or two to walk around the property, usually at night, sometimes during the day. If a guard spotted someone who wasn’t supposed to be there, he (it was usually a he) ran the person off. Larger companies had more sophisticated video and access control systems, but those system...
Any wireless device can be a soft target for hackers Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure. Internet of Things securi...
The Protection Bureau is one of the top-10 security integrators in the US You really can’t talk about The Protection Bureau without discussing its founder, the late Keith Ladd. If you’ve been in the industry any length of time, you probably had a chance to meet him. I certainly did. In fact, when I was a cub reporter with one of the first security publications I ever worked for, my inaugural visit to a customer and central station was to The Protection Bureau. That...
The police have a new IT system that could provide fast and secure transmission of video evidence CCTV systems for public safety across Scotland are fragmented, lack strategic direction, are in parts obsolete and may be breaching data protection laws, according to an internal police report. With governments everywhere focusing on tightening security checks for public spaces, it is highly essential to have a robust security surveillance system in place. Government bodies must e...
Browse expert commentaries
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
Milesight 4x5MP AI Multi-Directional Camera
Anviz AI-driven Fisheye Dome Network Camera
Honeywell SMX: Cybersecurity for Operational Environments
Maximising security and performance
DownloadThe truth behind 9 mobile access myths
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
Download