Technology & Trends - IP cameras

Open architecture in access control - room for improvement

Integrators and end users should be aware that their definition of open might differ from those of security manufacturers Much of the buzz in the industry today about open architecture is driven by the IT world, with many security-related decisions now falling on an organisation’s IT department, where true open architecture has been around for a long time. Closed systems like we’ve experienced in the security world are not just viewed as foreign to the IT world; th...

How video storage ensures critical data isn’t lost

The fundamental value of data is widely apparent in modern society, and its loss may have significant consequences Video data is critical to today’s enterprise. The latest video storage systems must offer dependable operation that doesn’t risk loss of that critical data. DDN - When performance matters “Not only is bandwidth very important, but functionality cannot be lost when a storage system is having a bad day,” says Jeff Adams, director of sales,...

Rethinking DIY: new opportunities for recurring revenue

According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should start looking at do-it-yourself (DIY) systems such Google’s Nest and other devices as an opportunity for existing security contractors – those that are open-minded anyway – to bring in additional customers and new streams of recurring monthly revenue (RMR). DIY systems continue to proliferate in the marketplace and are availab...

How SIP-enabled intercoms open up communication with security departments

The trend towards greater unification is facilitated by an all-encompassing shift to IP technologies As more organisations are looking for ways to maximise resources and increase operational efficiencies, unification of multiple security and business systems is gaining popularity. From the central command center, there is significant time lost when operators have to jump from video surveillance to access control systems to analyse an incident and take appropriate measures. Eve...

Convergence of VMS and access control

Michael Byrden, Sales Director of ACT, considers the convergence of facility management. He describes how ACT, the access control manufacturer, has acquired a VMS and analytics development house in order to unify security solutions and bring customers nearer to the goal of a truly intelligent building. Desire for open systems Major acquisitions have been dominating the news recently and, even if this lays me open to a charge of naivety, I genuinely believe that they aren’t predatory. As...

Networking basics for security professionals: Understanding the role of midspans to supply power

Just as with network switches, there are no real standards for midspans In general terms, a midspan is a power over Ethernet (PoE) power source that is placed between a network switch and the device being powered, hence the term midspan. The real question is, with almost all network switches providing PoE power, why do we need a midspan? The answer is, in some cases we don’t, but in others we do. As with any other product we have discussed, we need to first consider that...

Technology contributes to holistic security approach at primary/secondary schools

Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting primary/secondary schools. Technology can contribute to a broader, holistic approach to security that is customised to meet the needs of each educational institution. Honeywell has helped many schools customise security systems to meet each school’s unique needs, says Bruce Montgomery,...

Challenges to video analytics adoption

see bigger image Figure 5: Providing correct and useful results requires intersection of user intentions, VCA interpretation, and results provided by VCA tool The term Video Content Analysis (VCA) is often used to describe sophisticated video analytics technologies designed to assist analysts in classifying or detecting events of interest in videos. These events may include the appearance of a particular object, class of objects, or action. VCA technology employs a comple...

Security needs persist despite budget challenges of primary/secondary education market

Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades Limited financial resources are a common pain point for primary/secondary schools looking to implement cutting-edge security technology. But security needs persist despite scarce resources. All school administrators want to do everything in their power to secure their facilities against threats. More schools are recognising the benefits and, in some cases, requiremen...

Integrity matters for business success, not gender, says Chicago-based integrator

Wong was the first Asian woman to obtain the Alarm Contractor License Mun C. Wong, PSP and president of VinTech Systems Inc. in Chicago, is a successful entrepreneur who has brought new technologies and a knack for superior service to her integration business.  In fact, at the age of 29, she was the first Asian woman to obtain the Alarm Contractor License from the State of Illinois and its Department of Financial and Professional Regulation. But she doesn't focus on gend...

Battling the $36 billion U.S. problem of retail shrinkage losses

Employees are the front line of defence — as well as the most economical defence — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...

Integrators should foster relationships to increase primary/secondary education sales

Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (primary/secondary) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience...

School security: Communication and controlling access

Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...

Networking basics for security professionals: What do layers really mean?

Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...

Convergence of IT networks and physical security

Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...

The Internet of Things presents new cyber-vulnerabilities

Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...

Deploying a high-performance computing environment to minimise processing costs

Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...

Impact of school shootings on demand for security systems

School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (primary/secondary) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase in de...

Networking basics for security professionals: Considering 4k’s impact on networks

Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HDTV, which in some cases was defined in terms of its resolution of 1920 hor...

Networking basics for security professionals: Do you believe in specifications?

Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...

Addressing the unique security challenges of primary/secondary schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Lower costs by getting security assessments right

A comprehensive security assessment will tell how to plan and manage security in the facility A comprehensive security assessment will tell you how to plan and manage security in your facility. Without an assessment, you can only guess about security. For facilities with existing security programs, an assessment can also reveal whether the pieces of the system are working as they should. As a security director, can you do the assessment yourself? Sure, although a large school...

Sports security: Ensuring safety at sports venues a continuing challenge

Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across several countries during a week when UBM announced that Protection & Management 2015 (which includes the IFSEC International trade fair) will feature Karren Brady (Baroness Brady), a career soccer executive, as one of its inspirational keynote speakers. As I type, inquests are being held into the deaths of some of the 96 people who were kill...

Insights From More Than Two Decades of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Smart thermal cameras protect perimeters in transportation applications

Thermal cameras can often be used to cover larger areas than standard visible light cameras Smart thermal cameras use on-board video analytics and a high degree of video processing to detect people very accurately in complete darkness, bright sun, and bad weather over the typically large perimeters associated with transportation applications. Combining manpower and smart thermal technology makes security for transportation assets more effective. At the end of the day, it takes...

Electric grid security: A closer look at CIP-014-1 standard

The FERC standard CIP-014-1 became effective, according to the Federal Register, on January 26, 2015 The electric power industry works with several federal agencies, including the Federal Energy Regulatory Commission (FERC), the Department of Homeland Security (DHS), and the Department of Energy (DOE) to improve sector-wide resilience for cyber threats. The industry also collaborates with the National Institute of Standards and Technology (NIST), the North American Electric Re...

Networking basics for security professionals: What network switches don’t do

Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors immediately turn to two favourites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by i...

Networking basics for security professionals: The 60 Watt dilemma

Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power. Many of these involve pan-tilt-zoom (PTZ) domes and heaters and blowers that require additional power. This development created two areas of confusion which is highlighted in this article by N...

Addressing false alarms in video analytics

Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated – concerns about false alarms. Companies providing video analytics systems say the question isn’t whether false alarms can be eliminated, but rather how they can be managed. “We’re still very far away fro...

Learning to use visitor management technology in schools

It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools.  However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...

Related videos

Enhanced security with S617 video door station

Remote Guarding Video Series Part 1: Overview and Basics.

Remote Guarding Video Series Part 5: Future and Technology

Quick poll
What is the most significant challenge facing smart building security today?