Round table discussions
Any business sees its share of highs and low, of flare-ups and lulls. In the security market, several factors can impact general business trends, whether at the macro level or for an individual manufacturer or integrator. The economy is always a factor in the business climate, but are there others? We asked our Expert Panel to assess the impact of another variable – the seasons. Specifically, we asked this week’s Expert Panel: What is the seasonal impact on sales of security technolo...
Violence in our schools and colleges often makes headlines, suggesting a growing and scary trend. A consequence of high-profile school shootings and other reports of violence is to increase awareness of the need to ensure safety and security of students, faculty and staff. The events have prompted more than one educational institution to take a second look at their security policies and infrastructure, with an eye toward improvement. But to what effect? Has greater awareness of violence in educa...
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to m...
We have all heard the sales pitch: Use of megapixel cameras lowers the camera count needed to provide adequate video coverage, thus making the overall system less expensive. Use of fewer cameras equates to less infrastructure, bandwidth and storage, according to the claims, and megapixel cameras provide enough detail that you don’t miss anything using fewer cameras. It’s a compelling pitch, but one that has sometimes been questioned in the market. To look beyond the marketing hype, w...
Salesmen may face pressure to “seal the deal,” but might an overemphasis on the ABCs of selling (“always be closing”) actually work to the detriment of an unsuspecting customer coerced into buying too much (or the wrong) technology to meet his or her needs? Not likely, according to our Expert Panel, who this week address the topic of salesmanship in the security market. We asked: Can an end user trust a security salesman’s advice? Our responses are overwhelmingly in...
For many years, generally speaking, the use of video surveillance has been seen as an extension of an end user customer’s security system. However, recently, we have also heard about how video can help customers more generally, providing benefits that extend beyond security and encompass better operations and management. Easier economic justification is one important aspect of looking more broadly at the benefits of video surveillance to the enterprise as a whole. Better return on investme...
The crystal clear images provided by new 4K cameras have attracted a lot of attention at recent industry trade shows in the security market. But the improved video resolution comes at a price. The cameras are more expensive, and the systems to support them – more bandwidth, more storage – portend even more expense. There have been higher-resolution cameras on the market for years, of course, but an advantage of 4K security cameras is that they represent a standard that could be appli...
The evolution of IP video has placed a lot of attention on the resolution of video, as measured in the growing number of pixels in a frame. But another variable, receiving less attention, is the number of frames captured per minute (fps). We inherited the idea of “full-frame-rate” video from the analogue world, but increasing numbers of pixels (and more data!) have sometimes led to use of slower frame rates. We asked our Expert Panel: What is the value of “full-frame-rate&rdquo...
Rapid technology innovation in the physical security market comes with it a commensurate need to dispose of older systems as they are replaced. Some technologies can help minimise the waste, providing, for example, the ability to use existing coaxial cable with newer IP video systems. However, absent the ability to reuse equipment, how should integrators manage disposal of systems at end-of-life? Here are some responses from our Expert Panel.
Going back to the days when we asked our children to program our VCRs, many of us are challenged by the intricacies of technology. However, a benefit of newer inventions such as smartphones and tablets is that they are easier to use and “intuitive” – whatever that means. Security and video surveillance systems are becoming more complex in lockstep with consumer electronics, so we asked this week’s panellists: How does technology innovation in security systems impact the s...
Megapixel and panoramic camera manufacturers have been predicting the demise of pan-tilt-zoom (PTZ cameras) for several years now. They contend that PTZs can be replaced by the higher resolutions of newer cameras, coupled with their ability to “zoom” in digitally on a specific area of an image and show sufficient detail. New panoramic cameras also capture everything in a wider field of view, while a PTZ camera runs a risk of missing important action because it is pointed in the wrong...
Seeking to manage uncertainty is part of the core mission of security professionals. When it comes to the technology systems they depend on every day, extended service agreements are a tool to manage uncertainty as it applies to system operation. We asked our Expert Panel this week to comment on how extended service contracts benefit users, integrators and/or suppliers. Their answers effectively enumerate multiple benefits to all parties involved. Ongoing service and maintenance help to ensure c...
There’s almost no such thing as a local business anymore. Even the smallest of entrepreneurs find they have immediate access to a global marketplace via the Internet, and larger companies continue to find new ways to maximise their successes throughout the world. We asked our panellists this week to comment on how they see globalisation impacting the physical security market. Their broad-ranging responses emphasis the opportunities and challenges of succeeding the global marketplace.
As we unpack our bags – literally and figuratively - from the recent ISC West in Las Vegas, it seems an appropriate time to reflect on the busy show. Specifically, it’s a good time to consider how the exhibition could be improved to be more valuable for attendees and/or exhibitors. We asked our panellists for their opinions, and we’re also interested in any other post-show commentary – please share in the comments section.
The U.S. physical security market will be focused on Las Vegas this week and the big ISC West trade show for 2015. But what should attendees expect when they get to Sin City? We asked our panelists for their insights into what will be making “big news” at this year’s show. Fortunately, the suspense is almost over!
Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...
If we didn’t have manufacturers, integrators wouldn’t have anything to sell. But what is the role of manufacturing companies when it comes to taking those products to market? Effectively managing the sales channel – helping resellers be successful without somehow undermining their efforts or (heaven forbid!) selling direct to an end user – is an ongoing and delicate challenge for manufacturers. They want to do everything in their power to ensure success of their products...
“Buyer beware” is always good advice in the security marketplace – or in life for that matter. But the age-old warning is more timely than ever in our age of global commerce and given our fragmented market with thousands of products manufactured all over the world. Complicating the picture: our market is also inching toward commodisation and facing downward pricing that shrinks margins for manufacturers. So the question becomes: When is an item merely a good deal or somehow &ld...
This week’s Expert Panel revisits a classic question that has been around since the advent of IP video: Should an enterprise’s video system have its own network, or should it share the corporate network? Our panellists' responses reflect new IT trends, technology changes and shifting priorities that are impacting how the question is approached. Rising concerns about cyber-security (such as fears that video might provide a hacker entry into the enterprise system) are one new aspect. N...
The retired police officer who takes a cushy job as a security director is almost a cultural cliché. Like any cliché, the idea has roots in the real world, where police departments have often been a rich source of the security industry’s leadership talent. Former military personnel often find their way to the security industry, too, and realise that the familiar elements of discipline and command structure translate well. We wondered about the impact of this historic trend an...
The people element is a huge variable in the operation of any security system, and in any aspect of business for that matter. Training is a valuable tool to manage that variable, especially as it relates to newer, more complex networked physical security systems. Training can be a challenge throughout our market, which needs well-trained employees at the security front lines of our end users companies as well as competent, knowledgeable technicians handling installation and maintenance of securi...
We live in a global market, and goods can easily be manufactured anywhere in the world and then shipped anywhere else. For many years, companies have taken advantage of the consequent flexibility to save costs and increase profits by manufacturing products around the world, especially in low-cost areas such as China. Historically, goods made in China (and some other locales) have been characterised as somehow lower in quality, and yet many of the top companies (such as Apple, for example) have m...
This week brought a big surprise to the security and video surveillance market; specifically, the announcement of Canon’s plans to acquire iconic IP camera manufacturer Axis. But surprises happen all the time, especially in a dynamic, technology-driven market like physical security. Those who have been involved in this market for many years have often been surprised, for better or worse, at the various twists and turns over time. It’s part of what keeps life interesting! This week, w...
There’s a cloud hanging over the security market. Or rather, The Cloud is portending great change for our market (and other markets, too). But with all the talk about cloud-based systems, limitations still linger along the path to optimum implementation in the security market. We asked our panelists to reflect on those limitations and look ahead five years to how the situation is likely to change. From bandwidth and connectivity challenges, to geographic limitations and even a need to chan...
We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximise the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilising existing technology capabilities are a waste of money, aren’t they?
Video surveillance, or CCTV, is becoming increasingly common in cities and other public places all over the world. The benefits of video surveillance cameras to prevent crime and aid police investigations have been well documented, and there have been several high-profile cases in which video was instrumental in solving a crime. Still, whenever video surveillance is proposed in a public place, there can be opposition, based on privacy concerns, from various interest groups and the general public...
What lessons, if any, are there to be learned from the recent attacks in Paris? Recent events in Paris highlight the deadly and changing face of terrorism in 2015. Two gunmen armed with Kalashnikov assault rifles attacked the Paris offices of satirical magazine Charlie Hebdo on 7 January, killing 12 people in all, including eight Charlie Hebdo employees and two national police officers. Two days later, the terrorism continued with a hostage crisis at a printing firm at Dammartin-en-G...
There have been a number of developments in the last year which have impacted the security industry in one way or another. As we begin a new year, we thought we'd ask our panellists to reflect back on 2014 and tell us what changes they think have made the largest impact in their areas of expertise within the security industry.
Value isn't always just about monetary worth In any sales conversation, price will inevitably be one of the points of discussion. When it comes to large investments such as security systems, customers want to ensure that their money is well spent. Where price is concerned, systems and solutions providers would want to impart the worth of their products. At the end of the day, in the consumer world, customers want the best value for the least amount of money po...
How do you stand out in a world of commoditisation? We live in a world of commoditised consumer goods. You probably own at least one item which would be considered "commoditised" by the majority of the population today, but you can probably also remember the days when it would have been described as "new" and "unique". Think about smart phones: most people you know are likely to own a smart phone. But remember when not everyone had a regular mobile phone? Now they're no...
Security experts
Expert commentary
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadThe truth behind 9 mobile access myths
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
Download