CCTV cameras News

Gunshot localisation solution ShotPoint triggers VMS in case of active shooters

A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. “For responders, the police department doesn’t have to manage cameras, but has the instant availability of a camera feed,” says Kathleen Grigg...

What is an open system? Is there a consensus in the marketplace of the definition of “open?”

Open systems are great at providing freedom for end user customers. But does the term “open system” mean the same thing throughout the industry? In the bad old days before the introduction and broad acceptance of open systems, security vendors produced proprietary systems that used only their own hardware and software. This locked in a customer to a specific vendor’s product line, and if another vendor offered a better product, the only way to get it was to switch to that vendo...

Milestone pledges to 'Make the World See' at upbeat MIPS 2017

Are the glory days of IP video behind us? Not by a long shot, if you listen to the upbeat message at ‘Milestone Community Days’ in San Antonio this month. Pledging to ‘Make the World See,’ the community of technology partners, distributors, integrators and customers joined in a celebration of past successes, with an emphasis on future possibilities, at the yearly gathering hosted by the video management system (VMS) vendor. Milestone software integrations "The industry...

Increased power grid security tackles natural and man-made threats

Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a mode...

Protecting cultural and hospitality venues from terrorist attacks

Cultural and hospitality venues are attractive targets for terrorists due to their public accessibility Over the past 40 years there have been numerous attacks carried out against cultural and hospitality venues in the furtherance of religious, ideological, criminal or political beliefs. By default, cultural and hospitality venues are attractive targets for terrorists due to their public accessibility, the volumes of visitors and guests or because of what the venue represents;...

Simplifying multi-site security management with the Cloud

Cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management Facility managers and security operations staff are often bombarded with calls from multiple tenants, across several sites — each with unique needs — but traditionally they had no insight or control on the spot. Now, cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management — enablin...

What will Donald Trump's presidency mean for the security industry?

The border with Mexico is an obvious starting point for the security community. Many had assumed that 'wall' would mean a high-tech fence or possibly just a virtual barrier of perimeter intrusion detection systems (PIDS), video surveillance with analytics and thermal imaging. However, during a press conference shortly before inauguration, Mr Trump put journalists straight. Unless there is a mountain or river already doing the work along the 2,000 miles to be protected, this really...

Developing an antiterrorism plan: A step-by-step guide

Counterterrorism tells antiterrorism about threats and antiterrorism tells counterterrorism about unusual or suspicious activities The most terrifying thing about terrorism is its reliance on the element of surprise. Most people don’t see the attacks coming, or don’t recognise the indicators when they see them. When terrorists strike, law enforcement is disadvantaged, the victims shocked and by the time an effective response is mounted the perpetrators are oft...

How to approach campus outdoor security

The locks, alarms and access control solutions used for buildings have little impact outdoors Large campuses – colleges and universities, hospitals and office parks – face difficult security challenges in protecting people and property across wide-open outdoor spaces. Outdoor security requires a different approach. The locks, alarms and access control solutions used for buildings have little impact outdoors. Outdoor security may include protecting a student on an...

Innovation and Internet of Things to influence 2017 security market

Continued consolidation and price pressures were factors in 2016 in the security market, which grew as expected.However, there is still interesting innovation being developed to further the market, such as the industry’s first PTZ with laser focus, says Fredrik Nilsson, VP, Americas, for Axis Communications. “While the video surveillance market is getting close to being 100% converged over to IP, there are many other IoT markets that are early in the cycle of convergence, such as int...

Video surveillance storage: What decision makers and integrators need to know

Video storage is the foundation for new video surveillance infrastructures. Depending on your platform, storage can enhance your surveillance system’s capabilities, or it can limit them. But one thing is certain: your storage decision can no longer be an afterthought. Tremendous growth in data storage Digital technology is transforming the surveillance industry. In fact, it’s estimated that 66 million network cameras and 28 million high-definition CCTV cameras will sh...

Expert views on PSIM, analogue HD, video analytics and more

Some Expert Panel Roundtable topics are more challenging than others. Occasionally a question will “stump” the panel – i.e., no one will choose to answer it. Other times, only one or two panellists will step forward to answer a question. One comment does not a “panel” make. Taken together, however, these varied comments offer their own range of insights into the evolving physical security market. Let’s look at some of these assorted Expert Panel comments over...

“Anti-surveillance clothing” creates a new wrinkle in facial detection

The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly common facial recognition technology It’s a...

Robotics are trending in the security solutions sector

The emergence of smart technology into the security sector is changing risk management economics and strategy in unique ways. Such technology leverages information management at its core for a more effective security program. Case in point is the burgeoning role of autonomous data machines (ADMs or robots) that are purposely built for security. Will the advent of robots eliminate physical security officers at a site? Not any time soon, but robots are a real force multiplier by adding effec...

Global security market focused on organisational collaboration in 2016

In the past year, we have continued to see that the global security market is both dynamic and evolving. The term “security” no longer means simply protecting the perimeter of a building; it also involves securing corporate networks and sensitive data. In 2016, this trend was driven by a change in organisational threats. Businesses as a whole are much more focused on cyber-threats, a growing paradigm that challenges business and security leaders to stay one step ahead of crime and fr...

SourceSecurity.com's top 10 expert panel roundtable discussions in 2016

SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions. The very most-clicked-on Roundtable discussion in 2016 was about how to choose between a cloud-based system and a server-based system. Other hot topics that made the Top-10 list of Roundtable discussions included edge-based video storage, the challenges of commoditisation, and mistakes customers make when buying and installing security systems. Here is...

SourceSecurity.com’s 10 most clicked articles posted in 2016

Again in 2016, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 articles we posted in 2016 that generated the most page views. They are listed in order here with the author&r...

Physical and cybersecurity convergence led the way in 2016

With security, as with any business cost-centre, business leadership wants to find savings where they make sense. As a result, one of the trends we are seeing is that security departments are teaming up with other departments - IT, operations, marketing - to maximise their investment in security systems and leverage the data collected by their physical security sensors to inform their business strategies. Rise in cyber-attacks We have also seen a worrying increase in cyber-attacks, like the hi...

Edge analytics and cybersecurity key trends in 2016

The past year has seen growth in the deployment and use of edge analytics, plus a significant emphasis placed on robust cybersecurity. The expectation for 2017 is that these two trends will continue to be a driving factor for value-based decision making of large, influential customers. IP camera product lines from reliable and well-regarded brands that include edge analytics and offer a trusted, secure platform will be at an advantage over those that don’t. Looking back at the expectation...

Internet of Things trends boosting the commercial security industry

The single largest group of consumer IoT devices being deployed is for home automation and residential security Business and technology analysts are in unanimous agreement that the number of IoT devices will explode into the many 10’s of billions within the next five years. These billions of new computing devices will produce enormous volumes of data about ourselves, our society, and our physical environment. The security industry is at ground zero of this upheaval. In f...

Holiday season loss prevention plans for retail

The holiday season generates 34% of annual sales for retailers but accounts for 37% of annual losses It is that time a year again, when shoppers and shoplifters converge on our retail outlets looking for that all important deal or steal. Peak shopping season This year, the National Retail Federation estimates holiday spending will rise 3.6% from 2015 to more than $655 billion. While the peak shopping season used to be defined as the time between Thanksgiving and Christmas Ev...

Tackling security market commoditisation with innovation

Innovation is not an end goal but an ongoing process that must be sustained Regardless of market, the challenge of commoditisation is very real for manufacturers as companies producing lower-end products continue to imitate the most advanced technologies. This creates a perception among customers, and the marketplace in general, that even leading-edge products with greater features, functionality, and value are indistinguishable from others on the market. As a result of commod...

Building integrator/provider partnerships for enhanced VMS solutions

Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...

How can integrators and end users stay informed about the changing technology landscape?

In a fast-moving market like physical security, sharing information is an essential component of growth. However, there often seems to be more information available than an integrator or end user could ever digest and put to use. How does one go about finding the information he or she needs in an environment that can seem to be drowning in information (sometimes the wrong information). We asked this week’s Expert Panel Roundtable to share their strategies and suggestions. Specifically, we...

Bosch-Sony partnership amounts to a new variation on M&A

Long-predicted consolidation in the video surveillance market seems to have slowed somewhat lately – no big mergers or acquisitions have been announced. However, the announced “partnership” between industry giants Bosch and Sony this week presents a new variation on the theme. No companies changed hands, but the result is one fewer player selling video equipment into the market. In the latest deal, Bosch will handle the sales and marketing globally for all of Sony’s vide...

Best practices for reducing outdoor video nuisance alerts

Thermal cameras see heat rather than light, so they are a perfect “human detector” Safeguarding outdoor assets in a reliable and cost-effective manner often comes down to a single requirement: Accurate intruder alerts and timely information about the unfolding event. While there are many technologies available for outdoor security, smart cameras with video analytics have emerged as the solution of choice for detecting intruders in real time outdoors. Yet the best...

Panoramic cameras are everywhere, but it started with Arecont Vision

Arecont Vision created the category of multi-sensor panoramic cameras back in 2006. Now the market is taking off, and many manufacturers now offer panoramic cameras. I recently spoke with Jeff Whitney, Arecont Vision’s Director of Marketing, on the current market for panoramic cameras, and also about some other hot topics – from cybersecurity to making the installer’s job easier. SourceSecurity.com: Where do you see the category of multi-sensor panoramic cameras going from he...

When do video systems yield information other than images?

A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?

4 trends affecting physical security power solutions

As the trend from analogue to IP continues to progress, more and more security devices are IP-enabled for seamless network integration With rising concerns over organisations’ physical security and potential network vulnerabilities, it has become more important now than ever for security professionals and other decision makers to take actions that will guard against potential problems and help prevent system failures. One specific area of heightened focus is the implemen...

Growing need for open protocols in the security industry

If all the components within a security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities The widespread use of open protocol systems is one of the most important developments in the security and safety sector for decades. With a heavy reliance upon various security softwares (even for physical security), using open systems has gone from being a desirable selling point to a necessity in the security indus...

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?