Round table discussions
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this we...
The security industry is full of individuals who call themselves consultants. It’s a term that is thrown around rather loosely, and in some situations the term can be roughly translated as “between jobs.” But “real” consultants provide real value to their clients in a variety of subject matter specialties. We asked this week’s Expert Panel Roundtable: What role should consultants play in the security technology buying decision?
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will...
Cybersecurity continues to be a major theme in the physical security industry, but effective cybersecurity comes at a cost. Higher cost is contrary to another major trend in the market: lower product pricing, which some have characterised as a ‘race to the bottom’. Chinese manufacturers, whose products tend to have lower prices, have been the target of cybersecurity concerns and even a government ban. So what is the overall impact of cybersecurity on pricing trends in video products?...
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
In many regards, 2018 was a turbulent year for the physical security marketplace, driven by evolving technologies and changing customer needs, among other factors. Year-end is a great time to reflect, so we asked our Expert Panel Roundtable: What caused the most disruption in the physical security marketplace in 2018?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as poss...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A...
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s...
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level...
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a CCTV system and why?
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panellists explain. We asked: What new technologies...
Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?
When is it too late to learn that a video camera isn’t working properly? As any security professional will tell you, it’s too late when you find that the system has failed to capture critical video. And yet, for many years, system administrators “didn’t know what they didn’t know.” And when they found out, it was too late, and the system failed to perform as intended. Fortunately, in today’s technology-driven networked environment, monitoring a system&rs...
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Exper...
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Pa...
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...
What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of afte...
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can...
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...
In the analogue era, videotape was the storage media of choice for CCTV systems. Since the advent of digital video, and of IP-based systems, a variety of other storage formats have come to the fore, including hard drives, flash drives, SD cards and others. Now we are in the age of the cloud, which offers new opportunities to store vast amounts of video and presents challenges such as bandwidth and cybersecurity. For a current perspective on storage, we asked this week's Expert Panel Roundtable:...
ISC West 2025 news
ISC West 2025, organised by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s pioneering comprehensiv...
ADI | Snap One is demonstrating its expansive portfolio at ISC West 2025 from April 2 – 4, at The Venetian Expo in Las Vegas, Nevada, USA. In Booth #12043, visitors can explore an assortment of...
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., announced the expansion of its popular RIO™ solar-powered, mobile security solution li...
At ISC West 2025, Resideo Technologies, a pioneering provider of solutions for home comfort, security and safety, introduced the new First Alert® CX4 Camera Series. Compatible wit...
The Security Industry Association (SIA) has announced its new Board of Directors chair-elect and presented its new and returning members to the SIA Board of Directors on April 1 at The...
SWEAR, a pioneer in digital content authenticity, announced the official release of the enterprise version of its video content authentication tool, SWEAR Security. The enterprise tool integrate...
Antaira Technologies, a pioneer in industrial networking solutions, is launching at the International Security Conference and Exposition (ISC West) its new Airolinx 6 Series of environmental...
Untether AI®, a pioneer in energy-centric AI inference acceleration, is teaming up with AI Platform Alliance members Ampere® Computing, NETINT, ZoneMinder, AVC Group, and ASA Computers to...
Digital Watchdog (DW), the industry pioneer in digital recorders, surveillance cameras, system peripherals and related management software, announces the strategic technology collaboration with Allied...
Artificial Intelligence Technology Solutions, Inc., announced that its wholly owned subsidiary Robotic Assistance Devices, Inc., (RAD), has received two major awards at the 2025 Securit...
Allied Universal®, the world’s pioneering security and facility services company, announced its Unified Command Centre solution was recognised as an honourable mention in the 2025 Security I...
At ISC West 2025, April 2-4, in booth 11053, they are launching a reintroduction of the name Radionix, a fresh take on a classic brand that is synonymous with innovation and trust in the intrusion sec...
Power over Ethernet (PoE) network switches are frequently used to supply outdoor IP cameras with electricity. Powering IP cameras becomes a challenge, however, when only non-PoE legacy switches a...
The Security Industry Association (SIA) has announced the 2025 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards program presented in partnership with ISC West, recognisi...
LVT (LiveView Technologies, Inc.), the pioneer of rapidly deployable security solutions, announced multiple new capabilities powered by proprietary AI models that empower security teams to implement p...
The Security Event 2025 news
Altronix, a recognised pioneer in power and data transmission for the professional security industry, is showcasing its latest innovations at stand 5/K30 during The Security Event 2025 in Birming...
Morse Watchmans, the industry pioneer in key control and asset management systems, is highlighting its advanced solutions at stand 5/E20 during The Security Event UK 2025. The company will demonstrat...
Integrated Access Control and Security manufacturer TDSi announces its upcoming appearance at The Security Event 2025, which is being held at the Birmingham NEC from 8th to 10th April 2...
PACOM, a pioneering provider of integrated security and business management solutions, will highlight its next-generation cloud-based platform VIGIL CORE at The Security Event 2025. The scalable sec...
3xLOGIC, a pioneering provider of integrated and intelligent security and business solutions, will showcase new product developments for video management, and business intelligence solutions at The Se...
At The Security Show (TSE), on stand 5/G55, i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, will showcase i...
A rapidly growing European team, exciting new product releases and new look stand are the hallmarks of what looks set to be a calendar highlight for Gallagher Security at this year’s, The Securi...
Genetec Inc., the pioneer in enterprise physical security software, will be present at The Security Event, which is being held 8–10 April 2025 at the NEC Arena in Birmingham. The company...
Global security manufacturer, Gallagher Security, has again demonstrated its people-first ethos, partnering with the UK’s Skills for Security to support the next generation of security professio...
DNAKE, a pioneering innovator in intercom and home automation solutions, is excited to announce its participation in The Security Event 2025, taking place from April 8th to 10th, 2025, at th...
barox Kommunikation AG is delighted to announce the launch of their new technology partnership with Network Optix, the latest addition to their already extensive integration portfolio with market-pion...
Wavestore is set to showcase its latest advancements at The Security Event (TSE) 2025, taking place at the NEC Birmingham from 8–10 April. Visitors to stand 5/K125 will experience Wavestore's n...
Keynetics, the provider of the well-recognised SentriGuard key management solution, is set to showcase its latest integration with AJAX alarm systems at The Security Event, taking place at the NEC Bir...
Skills for Security has continued its collaboration with WorldSkills UK for the 2025 season, announcing the Electronic Security and Fire competitions will be merged into a single category. This strat...
Comelit-PAC is ready to make an impact at The Security Event 2025, with an opportunity for visitors to connect and explore the latest portfolio of security and fire safety systems. On stand 5/F60, th...
Security experts
Expert commentary
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download