Hotels, leisure & entertainment security applications - Expert commentary
Everybody has been hooked on the discussions about Analogue HD or IP systems, but shouldn’t we really be thinking about WiFi and 5G connectivity, removing the need for expensive cabling? Are wireless networks secure enough? What is the potential range? Even the basic question about whether or not the network is capable of transferring the huge (and growing) amount of data required for High Res Video, which will soon be quadrupled with the advent of 4K and higher resolutions. The future o...
A childhood friend of mine has made a nice career in coaching college football. As with most coaching careers, he’s had to make several moves over the years. He was the Linebackers Coach at a national powerhouse FBS school for a few years before getting promoted to Special Teams Coordinator. From there, he moved into a Defensive Coordinator at another FBS school. Not a national powerhouse, but he was the D.C. – a huge promotion. Although I’ve kept up with his progress, and have...
Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users. Find out m...
In a world where hacking and denial of service are everyday threats, many feel that it is about time for the world of the Internet of Things (IoT) to undergo a reality check over its strategy and promotion before disaster strikes, reputations are lost and investors pull up stakes and run for the hills. What is new about IoT? Having made, lost and then re-made my fortune in and around the industry over the past 20-plus years, I cannot help but smile over the level of hype — an...
To say the surveillance industry has changed over the last quarter of a century is an understatement. From high-definition cameras and TVs to high flying drones and video analytics – the surveillance industry has shifted in ways we never expected to see in such a short space of time. What’s more, with such advancements in both quality and choice that’s now available in the market, it’s no wonder that revenue in the video surveillance market is set to double to $75.64 bill...
For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today’s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts – an important component of predictive analys...
A new study reveals that intelligent fire detection systems have the potential to unlock more than 30 percent cost-savings on routine maintenance checks through real-time, data-driven remote monitoring. Kevin Mears, Product Manager for Kentec Electronics, describes how remote monitoring and predictive maintenance can meet the competitive challenges of the digital age. Leading economists have identified the convergence and synergies delivered by The Internet of Things – the interconnection...
Edge storage technology - the recording of video and storing it at the camera or on a directly attached storage device instead of in a centralised recording facility across the network - is quickly gaining acceptance and is being more broadly adopted into IP video surveillance applications. The use of edge storage in an IP camera enables video surveillance solution developers more flexibility and cost benefits in system design. By leveraging local microSD card-based storage, system integrators...
“Netflix,” “twerk” and “selfie” were added to the dictionary. Boston Marathon bombing. Activist Nelson Mandela and actor Paul Walker died. Edward Snowden gave NSA classified documents to Wikilinks. These events may seem like they happened only yesterday, but they are some of the top news headlines from four years ago. Four years can feel like a very short time, and in four short years, every security panel installed by dealers to date will go dark. The curren...
Security and systems integrators across the nation are recommending and providing long-term security solutions to their customers. But when it comes to physical security entrances, integrators can easily fall into the trap of simply fulfilling an end user’s exact request without much pushback. Why? We believe the complexity and variety of entrances available makes it difficult to consult on the best solution, but also because there are a lot of assumptions at play. 1) Ask questions to d...
The security industry as we all understand it today is due for a much-needed paradigm shift. The solutions that security dealers and integrators are installing and deploying today have advanced considerably and for many, those systems do an excellent job safeguarding the homes and small businesses of their customers. However, all of those installed solutions have one inherent flaw: traditional fire alarms and security systems are only reactive in nature. By reactive, we mean that although today...
Recent developments in physical security systems have enabled us to expand access control using IT infrastructure. By eliminating the need for hard wiring to a central panel or controller, IP-based systems enable installations that are non-proprietary, flexible and scalable. This means not only a more versatile solution, but also a more cost-efficient one. A network-based system can be enlarged by one door, and one reader, at a time, unlike some traditional systems where controllers or panels o...
Nowadays, there is a lot of hype around data and its utility for almost any industry – from security and law enforcement to business operations and retail. While we are inundated with information about data and its significance to business success, technological development and fulfilling the promise of the Internet of Things, we don’t always get practical feedback as to how to obtain this valuable data from the resources available to us. Security teams feel this challenge acutely....
The need for interoperability, which is making different types of devices or technologies communicate with one another, is certainly nothing new in our industry. At Anixter, we have been testing interoperability in our Infrastructure Solutions Lab for many years, connecting devices and clients from different suppliers to our test server site to ensure that integrations and multi-supplier solutions are going to work correctly for our customers in real-world scenarios. Open standards in access co...
Sea ports have a long tradition of handling important cargo, including equipment for oil and gas fields. These critical sites require complex security to protect vulnerable areas such as storage locations and unloading areas, as well as monitoring the surrounding waterways for emergency situations. Often, upgrading these sites with a future-proof security system can prove challenging, as there are likely to be expansive legacy systems in place. New systems may also need to be integrated w...
In the security industry today we see many installers and integrators using standard consumer grade monitors for video surveillance. This is primarily due to budget constraints, but can end up costing significantly more over the life of the install. This is because most installs are now using HDMI connections primarily. A consumer monitor has HDMI input, so why isn’t it good enough? Well, consider the average cost of a 19.5” consumer monitor. The retail price is around $80-100 compa...
There has never been closer integration between physical and logical security systems, so there has also never been greater importance when it comes to defining and maintaining the security culture within an organisation. Unfortunately, with increasingly complex security protocols required on a daily basis (and used by every employee), a security regime can easily become lax through apathy – which offers the perfect opportunity for potential intruders to take advantage. Whilst security t...
In today’s world, businesses face a growing threat landscape. Looking back on just the past few months, there have been increased incidents of workplace violence (the recent New York city hospital shooting), terrorist activities (London Bridge attack, Manchester attack), and cyberattacks (Petya and WannaCry). While critical events have become more frequent, more complex, and costly to businesses, organisations’ emergency communications systems, plans and processes have remained surpr...
The corporate mantra “Utilise TCO instead of purchase price when making purchasing decisions” means evaluating a project’s Total-Cost-of-Ownership over its lifetime period as the primary cost factor. It requires the corporate buyer to scrutinise the entirety of the investment as opposed to just the upfront purchase price. Like an iceberg, where the majority of the ice is below the surface, the total cost of ownership of a security system is typically much larger than the upfro...
Workplace violence (WPV) cannot be 100% prevented. However, we know from experience that well-placed preparedness and prevention measures can significantly diminish the probability and severity of potential workplace violence. A prime example comes as an outgrowth of the multiple “going Postal” shootings at the U.S. Postal Service (USPS) by employees or ex-employees (mostly in the 1990s). Out of necessity, USPS implemented a comprehensive workplace violence programme throughout thei...
Robots have been in the spotlight lately, as tycoons like Elon Musk discuss the perils of automation and artificial intelligence (AI), and roving robots meet their watery demise. These recent events have unmasked a particularly interesting topic: The value of robots in the broader sense, especially as a security tool. The emergence of robotics, automation and AI is not new, but the ongoing discussion about how best to use these continues to fuel critics and supporters alike. Seattle-Tacoma Inte...
Can you imagine what it would be like if you could only look at your CCTV cameras eight hours after an incident, when your security team finish their shift? That is what 99% of current body cameras offer. Most body cameras can only record video, which limits them to settling arguments after the fact – who said what first in an altercation with the police? What sparked an incident with the door security team at a nightclub? This leads to a curious asymmetry of video and immediacy between m...
It seems schools still need to be alert when it comes to the risk of terrorism. Following a recent security threat, Bury College has set an example that schools across the UK need to be aware of the threat of terrorism. As reported by the Manchester Evening News, the incident at the Great Manchester college saw the facility being put in lockdown as a precaution before an evacuation took place. Hundreds of staff and students were caught up in the event. Bury College released a statement followin...
With 60 percent of all of the world’s data expected to be created and managed by enterprises by 2025 according to IDC, it’s not surprising to learn that enterprise players have moved swiftly to help their customers and organisations maximise the opportunity around this massive data growth. However, when it comes to one of the most significant drivers of this growth in information—surveillance data— many enterprises struggle to understand how they can apply it to do more...
Remember the old adage “The whole is greater than the sum of its parts?” Nowhere is that truism more evident than when you add network video to the current generation of Internet of Things (IoT) solutions. Whether we’re talking about industrial IoT applications, “Smart – X” (city, building, parking etc.) or retail operations, integrating network video into the solution provides value far beyond simple situational awareness. Optimising sophisticated video tec...
Workplace violence has been on the rise in mental health facilities, schools, and detention centres across the country. According to the Occupational Safety and Health Administration (OSHA), “Nearly 2 million American workers report having been victims of workplace violence each year.” As such, security directors are looking for technologies to help identify and mitigate these incidents. Increasing use of vocal aggression detection technology Shift from video surveill...
What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department. In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system...
Video surveillance systems have some unique requirements that set them apart from other types of enterprise applications. Determining where and how the cloud can support these systems depends on a set of five primary requirements: bandwidth, storage, cost, security and accessibility. This March Networks white paper outlines some of the key considerations mid- and large-sized enterprises need to examine before deciding to move their video surveillance systems into the cloud...
Since the introduction of smartphones with downloadable applications, vendors have been trying to replace the traditional plastic identification (ID) card with a mobile phone application. People might lose or misplace an ID card, but most people immediately recognise if they are without their mobile phone. Mobile ID badges for access control Bluetooth Low Energy iBeacon technology Technical challenges of mobile ID apps The logical extension is to replace or augment the traditional corpor...
According to the FBI’s most recent data, there were almost eight million property crime offences in the United States in 2015, while the Occupational Health and Safety Administration (OSHA) estimates roughly two million employees per year are affected by some form of workplace violence. Don’t let your business become part of these statistics. June is National Safety Month, so it’s the perfect time to reassess your facility security measures and look for improved and effic...