Healthcare security applications - Expert commentary

Open platform security solutions: Managing customer expectations

It’s not hard to see why more and more locations are requesting security solutions that operate on an open system. Selecting products and platforms that utilise open standards—Session Initiation Protocol (SIP), HTTP, IEEE, RESTful APIs, etc.—provide additional levels of interoperability, scalability and versatility that give organisations the flexibility they want to be proactive with safety and security. Unfortunately, creating the right solution today isn’t quite as si...

How to make school security effective and unobtrusive for students

Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem...

Selecting the right security systems integrator for casino and gaming facilities

Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring...

GDPR-compliant video surveillance enhances data protection for businesses

As most of us are well aware by now, from 25th May 2018, every EU country will be subject to the new General Data Protection Regulations (GDPR), changing the way personal data is handled by strengthening compliance requirements and introducing strict penalties for failing to adequately protect personal data. All UK businesses must be conscious of the new rules and make the necessary changes, since non-compliance can result in data breaches and massive fines of up to 20 million Euros, or 4% of t...

How the convergence of physical security and cybersecurity will benefit businesses

The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West...

Video surveillance must modernise in storage, recording and on-demand access

Dollars spent by video surveillance customers must go towards ensuring high-availability capture, storage and on-demand access to live and archived video. Reaching this goal mandates high-availability of independent components – camera, network, storage (edge, external), internet connectivity, display, all Video Management Software (VMS) components and an architecture that can take advantage of this. In this note, we focus on seeing our way through to a video surveillance architecture, t...

Video surveillance technologies evolve to meet data and cybersecurity challenges

The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make impr...

How effective security departments bust multi-million dollar crimes

It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging a curious incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the...

School security benefits from advanced communication technology

With the recent tragic events in Florida, it’s evident that schools require more tools to help ensure their students’ safety. With that, school and municipal officials all over the country are looking for more advanced ways to combat gun violence. While there is no perfect solution for the myriad of threats and emergencies with which our schools are confronted, many have looked to technology to help improve communications before, during and after incidents. For schools across the...

Artificial intelligence is changing intrusion detection dynamics in the security industry

With the ever-growing availability of video data thanks to the low cost of high-resolution video cameras and storage, artificial intelligence (AI) and deep learning analytics now have become a necessity for the physical security industry, including access control and intrusion detection. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry. What is artificial intelligence? Artificial intelligence is the ability of machines to...

Live-streaming mobile surveillance takes cameras to the action

Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being "fixed." The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Ins...

Impact of sophisticated IT technologies on the security market

Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualisation and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being l...

Security technology training will stimulate post-Brexit UK economic growth

Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge t...

How video analytics maximise the value of your surveillance system

Despite the huge amount of video data collected, statistics show that only 10 percent of data is ever used and most loses its value within seconds of being generated. Why use such a limited amount of data? Many security organisations are focused on delivering the right information in case of an emergency or providing the correct evidence after a criminal act. Yet the fact is, a new video security system can be a large investment. Together with the service, maintenance and management costs assoc...

How security education and industry partnerships will help us prepare for a safe future

When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many...

How artificial intelligence is aiding first responders in natural disaster relief

The year 2017 saw some of the worst natural disasters in North America, with Hurricanes Harvey and Irma wreaking havoc on Houston, Texas, and the Caribbean with force of which we haven’t seen before. While many people chose to evacuate these areas, many were left to deal with the devastation and first responders had the difficult job of assessing the damage, rescuing trapped victims and delivering food and supplies. AI-enabled drones and robotics to assess damage In addition, more than 1...

Government institutions should utilise VSaaS for an integrated video surveillance system

Video surveillance as a service (VSaaS) is not just for commercial organisations. Federal, state and local governments can also realise benefits from the technology—and use it to deliver an integrated video surveillance system that addresses some of their unique security needs. Video Surveillance as a Service (VSaaS) What is VSaaS? Simply stated, it’s a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending...

Smart access control is essential to the future of smart cities

Throughout the UK there are many examples of smart city transformation, with key industries including transport, energy, water and waste becoming increasingly ‘smart’. A smart city is a one that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and resident welfare. Smart access is an important step forward in providing technologically advanced security manag...

GDPR raises questions about where to draw the line between privacy and security

While US market is being sensitive about cybersecurity through their popular camera products, European countries and the UK are preparing for the new privacy regulation to apply in two months’ time. But how would these challenges affect the global security market? What are the main problems in it for the manufacturers? What should investors in security industry look at right now? We’ve all recently heard about acquisitions of market-leading companies by technological ‘monsters...

How access controlled revolving doors can protect businesses from crime

Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot ge...

Why we need to look beyond technology for smart city security solutions

Most cities have at very least a plan and in most cases an existing program to make themselves safe cities. Increasingly, cities around the world are transitioning to become smart cities: urban areas where security solutions work in unison with other systems, extending the benefits of technology beyond security and into other city operations. Whilst this transformation has yet to become a widespread the next crucial transition—from smart city to cognitive city—is already appearing...

How managed detection and response enhances cybersecurity management in organisations

There was a time when one of our biggest challenges was securing our physical assets, whether that was our people or our property from crime. We researched and deployed the very latest in video solutions, intrusion systems, fire alarms and access control devices, all in an effort to keep the bad guys out and the good guys safe, along with protecting our facilities from break-ins, robberies and countless other crimes. However, times are changing. No longer must we only be concerned about keepin...

Safeguarding enterprises against cybersecurity threats is essential for the future

In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organisations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global ente...

Why drone use for security will increase significantly in 2018

While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilised the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones for effective surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate...

Drawbacks of PenTests and ethical hacking for the security industry

PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisat...

How moving to Security as a Service benefits both providers and end users

The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products.   With the physical...

The five questions bank security and IT leaders need to answer about cybersecurity

Organisations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organisations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth in cyber-attacks Additionally, cyber-threats have taken a...

Why security systems must be implemented to aid food factories

The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of havin...

How increasing security efforts can prevent fly-tipping

Fly-tipping – the illegal act of dumping large amounts of waste on unlicensed land without authorisation – occurs on both private and business land and can be a real annoyance to those in the UK. Items that fall under the banner of fly-tipping include tyres, mattresses, beds, garden waste, and construction rubbish. Unfortunately, the property owner will be responsible if somebody dumps their rubbish. Although this seems unfair, following some basic steps will help handle the proble...

How to manage physical security data in compliance with EU GDPR

Until recently, data laws have differed from one country to the next. This meant that for those organisations conducting business or protecting assets abroad, they needed to localise both their infrastructure and policies dependant on the country they were operating in. However, with the impending arrival of the EU GDPR (General Data Protection Regulation), which comes in to force on the 25th May this year, all of that will need to change. Data management in CCTV surveillance Surprisingly, des...

Quick poll
Which feature is most important in a video surveillance system?