Healthcare security applications - Round table discussions

Which security vertical markets are impacted by seasonal changes in demand?

The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?

What’s new “on the edge” of security and video surveillance systems?

By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...

How can security manufacturers improve after-sale service?

What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of afte...

What technology will impact security most in the rest of 2018?

Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?

Where is it inappropriate to install video cameras?

Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can...

What are the security challenges of the hospitality market?

Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...

How do developments in storage impact the video surveillance market?

In the analogue era, videotape was the storage media of choice for CCTV systems. Since the advent of digital video, and of IP-based systems, a variety of other storage formats have come to the fore, including hard drives, flash drives, SD cards and others. Now we are in the age of the cloud, which offers new opportunities to store vast amounts of video and presents challenges such as bandwidth and cybersecurity. For a current perspective on storage, we asked this week's Expert Panel Roundtable:...

How important is packaging in the commercial security market?

High-quality products are the building blocks of successful physical security systems. How they are packaged may sometimes be seen as an unimportant detail or an afterthought. But should it be? Effective packaging can serve many functions, from creating a favorable customer impression to ensuring the product isn’t damaged in transit. Packaging can also contribute to ease of installation. On the negative side, excess packaging can be an environmental concern, especially for customers who ar...

Are integrators and end users overwhelmed by too many choices?

Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is alwa...

What role does social media play in promoting security?

Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What...

Has consolidation shifted to the security integrator/installer market?

Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered...

What are the benefits of case studies as a marketing tool in physical security ?

Knowledge shared among peers is often afforded more credibility than information from manufacturers. An approximation of that principle is at work in the use of case studies as marketing tools in the physical security industry. Case studies are aimed at telling real-world success stories – from actual customers – about how various technologies are used to accomplish security goals and make the world a safer place. But how useful are they? We asked this week’s Expert Panel Round...

How do privacy issues and GDPR impact physical security systems?

You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do t...

How successful was ISC West for exhibitors and visitors?

The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?

How can you get the most out of ISC West?

A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. How, can attendees maximise the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked the panel: How can attendees get the most out of a big trade show like ISC West?

How does the residential/smart home market impact commercial security?

The residential/smart home market is undergoing revolutionary transformation, with a flood of new products and technologies helping to make our homes more connected, easier to manage and, yes, smarter. These massive steps forward provide challenges, and also opportunities, for the security industry, which has played a major role in protecting homes and residents for decades. We asked this week’s Expert Panel Roundtable: How are changes in the residential/smart home market impacting securit...

What are the most valuable features of cloud security?

Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this wee...

Security manufacturers: does size matter?

The manufacturers behind today’s security technologies are a varied bunch. There are large manufacturers with deep pockets and plenty of resources. And there are smaller manufacturers who are nimble, can react faster to changing market conditions and to whom each customer represents a hard-fought win. There are also plenty of manufacturers in the middle ground. But what impact does the size of a company have on the quality of its products? We took the question to this week’s Expert P...

Has the gap closed between security fiction and security reality?

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our indus...

How should your security company measure total cost of ownership (TCO)?

How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We...

Round table roundup: Security robots, deep learning and the race to the bottom

In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over t...

What are the security challenges of the enterprise market?

Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the en...

What will be the biggest surprise for security in 2018?

The new year presents new opportunities for the physical security marketplace. In many ways, 2018 will undoubtedly see further development of trends we saw in 2017. In fact, some of the trends determining the future of the physical security industry have been in place for many years. However, not every event in 2018 can be foreseen or easily predicted. To be sure, it is sometimes the surprises that keep life interesting! We asked this week Expert Panel Roundtable: What will be the security marke...

Was 2017 a good or bad year for security?

The end of the year is a great time to take stock of one’s accomplishments during the year, and to reflect on successes and failures, where we are and where we’re going. 2017 brought a lot of change to the physical security market, but were the changes positive or negative? Our Expert Panelists tend to be a thoughtful and reflective group, so we wanted to get their thoughts and insights at year-end about 2017 in the security market. We asked this week’s Expert Panel Roundtable:...

What are the challenges of body-worn cameras for the security industry?

Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?

How does the IT department influence security purchases?

In recent years, information technology (IT) departments at end user companies have often been seen as adversaries of traditional security departments – or, at least, as a thorn in their side. One of the issues is territorial: As physical security products have migrated to use of Internet protocols and the network infrastructure, the IT and security departments have clashed – erm… make that interacted – more and more often. New realities such as cybersecurity have made i...

How can security systems be used to predict bad things?

It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most com...

What is the impact of smart buildings on the security market?

We have been hearing about smart buildings for more than a decade, but the increasing profile of the Internet of Things (IoT) expands the possibilities for intelligent building systems and makes them even more attainable. Security is often among the “smart” functions of a building, and the capabilities of many physical security systems can contribute in new ways to building intelligence. We asked this week’s Expert Panel Roundtable: What is the impact of “smart buildings&...

What is the impact of standards on security systems and technologies?

Industry standards make it possible for systems and technologies to connect and work together. Standards enable today’s integrated systems. But does adherence to standards stifle innovation? Does the necessity to interface using an industry-wide standard slow down the implementation of newer (and possibly not standards-compliant) capabilities? Or do standards eliminate extraneous variables, empower more integration and encourage greater innovation? We asked this week’s Expert Panel R...

What are the security challenges of critical infrastructure facilities?

They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than fo...

Quick poll
Which feature is most important in a video surveillance system?