Industrial & commercial security applications - Expert commentary
The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data ne...
According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should start looking at do-it-yourself (DIY) systems such Google’s Nest and other devices as an opportunity for existing security contractors – those that are open-minded anyway – to bring in additional customers and new streams of recurring monthly revenue (RMR). DIY systems continue to proliferate in the marketplace and are availab...
Maricopa County installed a fully integrated security controls system, featuring a VMS Larger IP video systems require plenty of storage, and several high-profile applications help to demonstrate the value of storage in today’s networked video environment. Maricopa county security project One example is the Maricopa County (Ariz.) Sheriff’s Office, which is nationally recognised for its zero tolerance toward crime and unwavering focus on innovation in law enforce...
Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...
Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at least mitigate those risks. This article explains the need to identify and respond to risks involved in a supply chain. Manufacturers should make efforts and develop strategies to enhance supply ch...
2014 was a year for eye-popping merger and acquisition (M&A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market – Google, which made not one but two acquisitions this year that could impact the future security market. It was also the year that a smaller player in the video camera market (although a huge familiar brand overall) bought a large, open systems V...
Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organisations is sometimes still viewed as a necessary evil. But at a time when shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximise any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales...
Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...
At what time of day do you have most people in your building? Do you have enough parking spaces for your employees? Are there always enough first aiders in the building to meet safety requirements? Security systems provide a wealth of data, which can provide the answers to these questions and more. By extracting reports from your system, you can gather valuable information to increase safety or improve business processes. Wiebe Koopmans, owner of Linked Solutions, advises bus...
On April 16, 2013, snipers fired for 19 minutes on PG&E Corp.'s Metcalf electric power transmission station near San Diego, California, knocking out 17 giant transformers that supply electricity to Silicon Valley. At least 100 rounds were fired from at least one high-powered rifle. The power grid was rerouted to avoid a blackout, but it took 27 days to make repairs and get the substation back up and running. The incident got the attention of regulators and security prof...
Applications that reside in the cloud offer enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprise cloud deployments now successfully up and running, plus the integration of the Bring-Your-Own-Device (BYOD) culture into the workplace, the complex issue of data security and access control have leapt to the fore. Ian Lowe, Senior Product Marketing Manager...
Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from a company’s...
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...
Comprehensive and robust security programmes and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device. Fur...
Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles. These principles of physical security, many of which can be drawn from proven principles of IT security, su...
High definition (HD) megapixel cameras can help in the surveillance of larger areas with fewer cameras while delivering superior detail and improving overall security operations. This translates into lower infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video systems with megapixel cameras and achieve better performance and functionality. In this article, Scott Schafer, Executive Vice President of Arecont Vision ex...
Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for system integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced c...
Video surveillance software now allows retailers to monitor a location from anywhere Beyond loss prevention, video surveillance can also boost operations and business intelligence. Gadi Piran of ONSSI details how surveillance video can be a powerful management tool for retailers which they can use to monitor and improve operational efficiencies, personnel productivity and save costs by integrating it with other important applications. Almost every retail location uses a...
One alternative purpose for a 360-degree camera is the ability to provide a panoramic view in a wall-mounted orientation Surveillance cameras that capture 360-degree images are unique. However, cameras with technology that enables a user to retrospectively track an incident back in time are even more unique. This combination provides customers with total situational awareness—a field of view much larger than the capability of narrow-field, fixed-view cameras. In this art...
For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...
Many forward-thinking organisations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively, discuss the benefits of biometric technology in the protection of people, businesses and assets. Highlighting the many...
IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world,...
Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of nuisance alarms. In this article, John Romanowich, CEO of SightLogix, lists some of the typical challenges with outdoor surveillance as well as...
The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services. In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...
Security integrators prefer to standardizetheir choices of system components such as power supplies using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight; however, they play a critical role in the effective functioning of security solutions. Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In...
If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a range of different vertical markets. The advances in video management systems that include cutting-edge video analytics present a huge opp...
As per DHS, Tier 1 facilities will go through a preliminary round of site inspections called pre-authorisation inspections (PAI) In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law in the US. Section 550 of the Act ordered the Department of Homeland Security (DHS) to “...issue interim final regulations establishing risk-based performance standards for security of chemical facilities and requiring security vulnerability assessments a...
The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge proven technology. In this article, Stephen Malia - Vice President of Engineering Services and Marketing at North A...
Network-enabled "intelligent" security components increasingly have better computational and memory capacity The use of Internet Protocol (IP), or networking, is commonly associated with convergence. In this article, Markus Lahtinen of Lund University's LUSAX project, contends that the shift to network-enabled "intelligent" security components which increasingly have better computational and memory capacity has a significant impact on the present and future dy...
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download