IP Dome cameras News

Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance system

Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analogue to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus on camera, NVR an...

How cloud-based services will transform the access control market

Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...

Getting crisis management and emergency planning requirements right

Think of crisis management and emergency planning as a  customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it?Developing and writing a corporate or organisational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...

Measuring value of security systems - price versus benefits

Value isn't always just about monetary worth In any sales conversation, price will inevitably be one of the points of discussion. When it comes to large investments such as security systems, customers want to ensure that their money is well spent. Where price is concerned, systems and solutions providers would want to impart the worth of their products. At the end of the day, in the consumer world, customers want the best value for the least amount of money po...

Costs, usability, and support among access control challenges

Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillanceas it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...

Today’s CCTV Systems: Would George Orwell approve?

Orwell’s 1984 depicts a post-apocalyptic dystopia in which camera surveillance is used to oppress the individual The phrase “Big Brother” has been in our vocabulary for eight decades now. Its use is linked exclusively with negative images of a surveillance state (and, of course, a bad reality television show). But would George Orwell, a non-religious democrat, be happy with the way the anti-CCTV lobby has appropriated the phrase? The fact is, Orwell would app...

Access control market working to overcome tradition of proprietary systems

Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition from closed systems to more open integration provides benefits for integrators, and especially for end users looking to maximise their system return on investment. End users want greater flexibility, specifically in terms of hardware choice. As a result, more non-proprietary solutions are coming to market. For the integrator, offering more o...

Vivint CSO brings lessons of government cybersecurity to home automation

Cybersecurity is an ongoing concern in the realm of home automation and security systems. Joe Albaugh brought a unique perspective to the subject in July when he became Chief Security Officer (CSO) of Vivint, the second largest residential security and home automation provider in the United States. Albaugh’s approach to the cybersecurity aspects of home automation is based on his 20 years of experience including past positions as chief information security officer for three large, critical...

Using body-worn cameras in "prosumer" applications

The shooting in Ferguson, Missouri has highlighted the value of body-worn cameras for police officers. However, the largest manufacturer of body-worn cameras is also actively promoting their use by others outside law enforcement, including security officers, human resource (HR) professionals and even CEOs. Body-worn camera manufacturer VIEVU, Seattle, Wash., sees a growing market among “prosumers” (i.e., professional consumers). A “prosumer” might be anyone who needs to...

Remote video monitoring – the smarter way to enhance business security efforts

Remote monitoring offers a multiplying effect on security efforts The growth of IP-based networks has made it possible for security professionals to easily monitor surveillance activity from any internet-enabled PC, smartphone, or tablet anytime, anyplace. More and more, businesses are realising that remote monitoring can have a significant impact on their bottom line. Whether you’re a retail outlet, bank or hotel, remote monitoring offers a multiplying effect on securit...

MBX Systems: Working behind the scenes to optimise pairing of software and hardware

Sometimes companies want to buy their physical security software separate from the servers it runs on. Other times, companies prefer to buy an “appliance” – a purpose-built machine that is perfectly matched with the software it is running. The latter category is especially popular among small- and medium-sized business customers. For example, preconfigured video management appliances contribute an element of simplicity. That’s why you see video software companies –...

Demands for covert video surveillance in the home increase

Demand for covert cameras in the home has doubled in the last two years, according to one camera supplier. These additional “hidden” cameras are also increasingly being networked into home security systems, and installation of the newest covert IP cameras is do-it-yourself easy. Covert cameras appeal to consumers who don’t want the industrial look of video cameras disrupting their décor. They are also the latest variation on “nanny-cams” that keep watch...

Strengthening Loss Prevention with Unified and Cloud-Based Security Solutions

Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organisations is sometimes still viewed as a necessary evil. But at a time when shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximise any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales...

How cybersecurity impacts the physical security world

Cybersecurity is a critically important aspect in today’s increasingly IP-driven world of physical security The physical security market tends to dismiss issues of cybersecurity as outside its area of expertise, but cyber-threats are a problem that has been ignored for too long. The fact is, cybersecurity is a critically important aspect of the systems our industry provides in the increasingly IP-driven world of physical security. And the risk isn’t just reserved...

What is an acceptable life cycle for a physical security or video system? Are you seeing a trend toward systems being replaced more or less often?

Just like many things, security systems have their own life cycles.  Most end users would say that a "good" system should last a certain amount of time. Each system or device has a generally established and expected life span, and anything that falls short of its life expectancy is generally deemed as "poor quality." We asked some of our panellists to reflect on the life cycles of security systems. We wanted to get their insights on trends they have observed i...

Vanderbilt's acquisition of Siemen's Security Products business in Europe creates new global player

There’s a new international company in the security market this week with the acquisition of Siemens’ Security Products business in Europe by Vanderbilt Industries, a new U.S. company that rebranded the Schlage Security Management Systems (SMS) product line after acquiring it from Ingersoll Rand in August 2012. The European arm of the new global player will be called Vanderbilt International, based out of Germany and led by Managing Director Joseph Grillo, who many remember from his...

An ASIS exhibitor notices how trade show attendees are changing

Are attendees at the ASIS trade show becoming more business-savvy? Have they mastered the technology basics and moved on to more complex issues of how various products can be used to help their businesses? One exhibitor at ASIS 2014 in Atlanta says they have, and the change is impacting how the company displays its products. “Boon Edam has been exhibiting at ASIS for 15 years, and we have observed a new trend in how our customers approach us today versus just a few years ago,” says...

Enhancing video security with physical detector technology

Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by movement in the areas where cameras are located. Event-driven video can be achieved by using intelligent motion detection or video contents analytics (VCA) on the camera, recorder or PC server. Recently, performance of VCA has improved; however, some conditions can still affect detection using the camera image. Tomo Ito, Business Development Man...

Why is (or isn't) company longevity important when choosing a security supplier?

Customers sometimes look at how old or new a company is when having to decide between different security suppliers. But should they? There are several decision-influencing factors in the security industry. Other than the actual technical specifications of the security systems and solutions, there are several other factors people take into consideration such as customer service, technical support offered, product warranties and interoperability, just to name a...

What's next for Vicon? We asked the new CEO

The merger of Vicon and IQinVision has been one of the more interesting business developments in the security and video surveillance markets in 2014. Wondering how the merger is working out, I spoke with Eric Fullerton, CEO, Vicon Industries Inc., at the ASIS 2014 show in Atlanta. Here are some of his comments: SS.com: What drew you to Vicon; what opportunity do you see here? Fullerton: The merger of Vicon and IQinVision was announced at the end of Q1, and I thought: What is that? My first rea...

Role of health and performance monitoring in preventing security system downtime

If a security or video surveillance / CCTV system isn’t working, who’s to blame? Or more to the point, what’s to blame? Is the problem the malfunction of a specific device on the edge of the IP network, or is it a network or other system failure? How can an end user or dealer / installer know what the problem is? How can a camera manufacturer know if a call to their overworked tech support department is really about the manufacturer’s camera or cau...

Axis Communications and SightLogix announce strategic agreement at ASIS 2014

A busy first day at the ASIS International Seminar and Exhibits in Atlanta ended with a surprise strategic announcement by one of the industry’s largest suppliers and one of its most successful up-and-comers. Axis Communications and Sightlogix announced a strategic agreement to sell both technologies cooperatively to end-user customers through dealer channels. Despite the broad product range Axis brings to market, the company does not have a perimeter security solution, which is the stren...

The Threat of Commoditisation – and new opportunities

Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic security cooperative encompassing some 250 electronic security systems integrators, and aligning them with over 150 vendor partners. Multi-million-dollar manufacturers are taking advantage of economies of scale to drive down pricing of many of the components our industry uses, and lower prices are poised to have a long-term detrimental imp...

Dispatches from Security Essen 2014: Big event bolsters the European market

Just days before the ASIS International conference and exhibits in Atlanta, the global security market's attention last week has been focused on the big Security Essen 2014 trade show in Germany. With more floor space, exhibitors and attendees than ASIS, Security Essen highlights a wealth of technology resources to an eager international audience every two years. Several SourceSecurity.com staff members attended Security Essen last week, and my colleagues reported that the well-attended show ref...

Harnessing the power of smart phone video for surveillance

I love Wikipedia, not just because I use it every day, but also because it reflects the value that can be created when a large community works together. When each member of a community contributes a small part, the result is monumental. I saw an estimate somewhere that it would take a million pages to print out Wikipedia. Is there an opportunity to leverage video in the same way; that is, to tie together the capabilities of millions to create a central repository that could be useful? Consider...

When is it desirable to use “dummy” cameras as a deterrent? What are the liability/legal implications of using dummy cameras?

Surveillance cameras in public places and private properties are rather ubiquitous these days, but what is less obvious is whether a camera is a "dummy" camera or not. Installing fake surveillance cameras to use as a deterrent is a common tactic used when the price of a real security camera falls outside of one's budget. But when should dummy cameras be used? What are the implications this poses? Let's see what some of our panellists think.

Video surveillance is everywhere – even in the woods

The Silver Comet Trail is a 61-mile hiking and biking trail west of Atlanta that follows a route previously travelled by the Silver Comet passenger train from 1947 to 1969. I heard about the train when I was growing up but was never a passenger. As an adult, I have been on the Silver Comet Trail a couple of times; it’s mostly level and great for biking (or walking). The former route of the railroad tracks has been paved over, extending through a beautiful, natural environment that feels li...

Sometimes security equipment is the solution (but sometimes it isn’t)

Abraham Maslow's "law of the instrument" says: If the tool you have is a hammer, then everything looks like a nail. To avoid the pitfall Maslow describes, let’s remember that the nature of a threat profile should decide the choice of security equipment, not the availability of that equipment. When we hear about a school shooting, for example, some of us immediately think “they should have had a camera system?” The ones thinking that probably sell camera systems. Although we...

Should video of public places be made available to the public?

If a video surveillance system is installed using public funds, should the resulting video therefore be accessible to the public? A poll in the United Kingdom suggests the majority of Britons think it should. 64 percent of 1,345 people surveyed believe that British taxpayers, who pay for cameras placed in public places, should have access to the video feeds through live web streaming. The survey was conducted by installer CCTV.co.uk. There could be advantages to providing public access to vide...

How does a corporate acquisition affect service and support provided by an acquired supplier? What about the company making the acquisition?

Maintaining a high level of customer service can be a challenging experience when an acquisition takes place.This issue is of particular relevance to the security industry, where merger and acquisition activity continues to rise. We asked some of our Expert Panellists to share their thoughts on how both the acquired company as well as the company making the acquisition can retain the focus on their customers throughout the integration process. Here’s what they had to say.

Related videos

Time challenge: installation of battery powered Aperio cylinder

HID powers secure mobile banking for Santander International with HID Approve

Top-of-the-line intercom systems by DNAKE

Quick poll
Which feature is most important in a video surveillance system?