Round table discussions
The ability to view surveillance footage on mobile devices adds greater flexibility to an organisation's security monitoring system. But of course, there are drawbacks. In the age of mobile devices, we are able to do more and more while "on the go" and are less limited by the need to be at a desktop computer with internet / network connectivity. We are seeing the proliferation of mobile apps designed to enable us to access our most important files and perform important tasks...
"Going green" is not a new initiative, but rather, one that businesses and individuals are constantly aware of and continuously making a conscious effort to contribute to. The global population has become increasingly environmentally conscious over the years. Businesses and homeowners alike are investing more in green alternatives for their various needs. Many businesses adopt a green business ethic by ensuring that their products and ways of working are compliant with certa...
Just like many things, security systems have their own life cycles. Most end users would say that a "good" system should last a certain amount of time. Each system or device has a generally established and expected life span, and anything that falls short of its life expectancy is generally deemed as "poor quality." We asked some of our panellists to reflect on the life cycles of security systems. We wanted to get their insights on trends they have observed i...
The general public often has misconceptions about security systems. How should security industry experts educate the general public to better understand security systems and their capabilities? As security industry professionals, our panellists are more than used to explaining security systems to customers and other members of the general public. As experts in the field, it is their prerogative to help set the records straight when it comes to what people understan...
Customers sometimes look at how old or new a company is when having to decide between different security suppliers. But should they? There are several decision-influencing factors in the security industry. Other than the actual technical specifications of the security systems and solutions, there are several other factors people take into consideration such as customer service, technical support offered, product warranties and interoperability, just to name a...
Information overload. That's how tradeshows can seem. You're being fed lots of information by several different people in a short amount of time. It can all be very overwhelming. So what do you do? It's relatively easy to create a plan for smaller shows. But with larger events such as Security Essen, IFSEC and ASIS, it's far easier to become overwhelmed by the amount of choices and options. With Essen and ASIS just behind us, we asked some of our panellists to reflect on the...
We are in the midst of tradeshow season. With Security Essen and ASIS International back to back this year, several manufacturers are present at both. ASIS is one of the largest security tradeshows in North America, but not nearly as huge as Security Essen. Some prefer Essen, and others prefer smaller shows like ASIS or IFSEC. We asked some of our panellists for their thoughts on smaller versus larger tradeshows. Let's see what they had to say.
Surveillance cameras in public places and private properties are rather ubiquitous these days, but what is less obvious is whether a camera is a "dummy" camera or not. Installing fake surveillance cameras to use as a deterrent is a common tactic used when the price of a real security camera falls outside of one's budget. But when should dummy cameras be used? What are the implications this poses? Let's see what some of our panellists think.
You can expect to pass through tight security checks in environments, such as airports and government buildings, which are greater targets for terrorist attacks or other forms of violence. You don't expect to pass through the same level of security checks in neighbourhood shops and schools. It's a simple rule that there will be more security systems in places where there's a greater need for them. Generally speaking, there isn't such a high need for very high end securi...
In today's world of mobile devices, the number of apps available to the general public is increasing daily - apps that are designed to make our lives simpler and help us be more efficient. With about three-quarters of the world's population having access to a mobile device, it's no surprise that the range of different types of apps available today is so wide and varied. For the general public, there's an app for nearly everything. You can do your banking, order groceries, find th...
Maintaining a high level of customer service can be a challenging experience when an acquisition takes place.This issue is of particular relevance to the security industry, where merger and acquisition activity continues to rise. We asked some of our Expert Panellists to share their thoughts on how both the acquired company as well as the company making the acquisition can retain the focus on their customers throughout the integration process. Here’s what they had to say.
How often have you been caught in the midst of animated chatter and swept up in the anticipation of "the next big thing in X", only to look back and think it was all overhyped? It happens everywhere and with everything, from pop culture films and new budding artists, to aspects in professional industries such as new consumer products and technology. The security industry certainly has its share of overhyped technology. We asked some of our Panellists on their thoug...
Seeing surveillance cameras everywhere is becoming more of a norm these days, especially for large cities such as London, New York and Beijing. Many members of the public have their reservations about this for privacy reasons. Often, this can be solved through educating the greater public about security technologies. However, concerns still remain that such captured data can fall into the "wrong hands". Surveillance footage is meant to be used for security purposes only, bu...
With economic ups and downs, the global population finds itself responding and adapting in different ways to these changes. There is no doubt that changes in the economy will lead to changes in buying practices across all industries, and the security industry is by no means an exception to this. In times of economic growth, individuals and organisations will be more inclined to "splash the extra cash" on the best of the best. Whether it be deploying several new surveillance cameras in an e...
Return on Investment (ROI) is crucial for any security installation. Most people consider what return on investment they are getting when making a purchasing decision. Usually, customers will select the option which provides them with the greatest ROI. But how can ROI be measured? Individuals involved at different points of the security buying chain will have different ideas of how to measure ROI. Here are a few thoughts from our Expert Panel. As you will see, ROI is more of a subjecti...
There's no doubt that the security technology buying decision is a complex one. There are several factors to consider, and no one application will have the same exact needs as another. This is generally where security consultants come in - to help out with the security buying process and help the end-user decide on the best technology to suit their specific needs. But more specifically, what is their exact role in the security technology buying decision? Let's take a l...
"Impact", "technology" and "trends" are three words often found together, not just in the security industry, but in any industry. And with talk about technological impact often comes talk of game changing developments. Tradeshows are a great place to get a feel of what different security industry professionals think about technological advances in the industry. While a particular new technology may be undoubtedly a popular topic of discussion at a given time, there is rarely ever a unanimous tr...
Security experts
Expert commentary
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadThe truth behind 9 mobile access myths
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
Download