Industrial & commercial security applications - Expert commentary

Private security: A shift in industry responsibility

The role of physical security has expanded and grown rapidly over recent years. Below are some of our observations, particularly throughout the pandemic, and a look towards the changing times ahead.  The new era of physical security The role of private security has shifted dramatically over the last decade and beyond. Historically, the focus was on protecting assets such as property and goods, but more frequently now the sector is being asked to play an even bigger role in protecting the...

Securing your business while working remotely

It's a very common purchase for people to seek a smart security camera to remotely link them to their home whilst at work. Now the emphasis has shifted, with a lot more people working from home, business owners should consider a surveillance device to deter would-be thieves, protecting valuable equipment crucial for businesses to operate successfully. A robust security camera setup can aid existing security staff, and give business owners peace of mind out of h...

Moving to sophisticated electric locking

In part one of this feature, we introduced the shotbolt – a solenoid actuator – as the workhorse at the heart of most straightforward electric locking systems. Shotbolts remain at the core of most sophisticated electric locking solutions as well. But they are supplemented by materials and technologies that provide characteristics suited to specialist security applications. Here we look at some more demanding electric locking applications and contemporary solutions. Preventing forced...

Evaluating and selecting AI video analytics solutions for your organisation

As the multi-billion-dollar market for artificial-intelligence-based video analytics continues to grow, so does the number of video analytics solution providers. In Q3 of 2018, Stockholm-based consulting company Memoori identified 128 active companies in the supply chain for AI video analytics [i]. This list is far from exhaustive, considering how analytics has been gaining interest and becoming mainstream in 2020, with users expecting more accurate alerts based on object detection instead of m...

Optimising business security during COVID-19

Many businesses will already have some form of security in place, but what is often overlooked is the need to assess whether the protection is suitable enough for the nature of their business, or efficient enough for the premises they are utilising. As the country continues to face unprecedented times, it is crucial than ever to protect your business, particularly outside working hours or if at present the majority of your workforce is working remotely for the foreseeable future. So, what can y...

Fingerprint, facial and iris: Defining which biometrics work best for you

Recently contacted by your credit card company because of a data breach or were you a victim of identity theft?  Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction...

Has facial recognition won the race for biometric authentication?

Fingerprint identification had once been the most widespread biometric technology around the world. However, many argue that this technology has quite a lot of shortcomings. For instance, even expensive fingerprint reading scanners have a hard time identifying dirty or wet fingers, plus, some people's fingerprints are unreadable. Furthermore, being vulnerable to the temperature and precipitation, such scanners consequently cannot be used outdoors. Plus, fingerprint reading scanners do not meet...

How to deter thieves on construction sites

Construction site theft can cause project delays, property damage and loss of profit for companies in the construction sector. It is imperative to deter thieves from targeting construction sites with the help of construction site security. Here, we look into the various security options and how they can help protect your firm from the threat of a break-in. Construction theft has soared during the COVID-19 Pandemic Construction site theft is an ever-increasing problem in the UK, costing the ind...

AI in security: The crystal ball you’ve been waiting for

One of the biggest trends in security and technology today is centered around solutions that take advantage of the wealth of connected security systems and devices powering the organisations all over the world. As the number of cloud-powered systems and sensors have massively grown in recent years, security leaders in the private and public sectors have started to look at ways to leverage the data from these devices to better the lives of employees, customers, and residents. But while the drea...

Building security: How audio tells the whole story

Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and see...

AI deployed to safeguard cities: how, where and what

The threat landscape we operate in today is changing all the time. Around the world, pressures on law enforcement bodies remain incredibly high as they face the challenge of rising international threat levels and a backdrop of intense political, social and economic uncertainty. It is a challenge that demands a considered, proactive and dynamic response. It’s clear that new technologies, such as Artificial Intelligence (AI), can dramatically improve the effectiveness of today’s physi...

How thermal technologies improve facility security and workforce safety

Blind spots in surveillance coverage, incompatible video and access control systems, lack of adequate perimeter measures—these are common issues that facility directors must address with their security teams. At the end of the day, facility executives need technology that accomplish more with less—that expand situational awareness, overall system functionality, and real-time response capabilities while generating cost-savings. By leveraging technology like thermal imaging, this is...

Pandemic-proofing your proptech stack to address top safety concerns

A recent survey compared how employees, tenants, property owners and managers, and developers feel about returning to the workplace, and what would make them feel safer. Among the responses from employees and tenants, 63% don’t feel comfortable returning to work, and cited their own health and safety, as well as the safety of their loved ones, as the main cause for concern. However, 73% of business owners said they plan on reopening as soon as possible, within 2-4 weeks. How can we fix the...

The retail industry: securing life after lockdown

For bricks and mortar retailers, there’s no going back to how it was anytime soon.  Even before the COVID-19 pandemic and economic crisis, they had been fighting a fierce battle against online shopping and significant e-commerce players.  The high street has done a pretty good job of evolving over the years. From its humble beginnings in the late 19th century to its boom in the late 20th, it’s constantly adapted to meet changing consumer needs. The risk to retail But, i...

Secure, pinpoint location with UWB-enabled indoor positioning

Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an...

Security considerations for embedded system RFID readers

In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers very much belong to the ecosystem wherein personal or user i...

Electric locking: more than meets the eye

Electric locking is among the most ubiquitous examples of everyday security. Yet the complexity of electric locks and the advanced technologies deployed to provide simple, dependable and, for the most part, impenetrable locking often goes unnoticed. And that’s a good thing: when we take things for granted, it usually proves they’re fit for purpose. As experts in the field of solenoid actuated designs, we’re okay knowing that remote electric locking solutions are taken for grant...

How innovations in security can increase freedom and protect lives in our communities

People have always had an innate need to feel secure, from building fires at the front of caves that ward off predators in prehistoric times, to today’s efforts of locking your front door. This need for security extends to venturing further afield from the home and is critical for communities to thrive and survive. More than ever, people want to be and feel safe; protected against physical and now biological threats. When it comes to staying safe, populations around the world have recentl...

In a cybersecurity 'wild west', look for the sheriffs!

As the media often reports, the world of cybersecurity can be seen like the ‘Wild West’. There’s now a wide range of Internet of Things (IoT) devices connected to the web, making this a hot topic. Among these devices are security cameras. IoT devices are computers that use software that makes them vulnerable. As the famous cybersecurity evangelist Mikko Hypponen says, "If a device is smart, it's vulnerable!" Hypponen is right. On a daily basis, new vulnerabilities are found in...

Transport security: utilising the cloud to manage passenger flow and improve health & safety

Throughout the COVID-19 pandemic, ensuring the safety of passengers and staff aboard public transport has been an ongoing concern. The scenes of underground trains, still packed with commuters as infection rates soared, will have raised alarm bells with bus and train managers, transport officials and government representatives alike. Now, as infection rates hold steady and people slowly return to the workplace, a rise in commuter levels, coupled with a need for strong infection control protocols...

Be our guest: How to manage visitors with both safety and service

In today’s fraught times, business continuity and success hinges on how you manage the visitors to your company. By prioritising safety and security, and coupling them with top-notch attention and customer service, you win loyalty and gain a reputation that will serve you in years to come. An excellent way to accomplish this is by identifying and implementing the best visitor management system for your company. And visitor management systems go beyond ensuring the safety of your visitors...

Why the touchless office is another argument for going passwordless

Security experts have discussed the demise of the passwords for years. As early as 2004, Bill Gates told the RSA Security Conference that passwords “just don’t meet the challenge for anything you really want to secure.” Change has been slow, but the sudden increase in remote working and the need for enterprises to become touchless as they try to encourage teams back to the office is increasing traction. Here we look at the future of passwordless authentication - using the examp...

Why RMR is more important than ever for security integrators

The security industry knows the value of recurring revenue, as it’s the foundation of the residential security monitoring market. Commercial systems integrators have traditionally taken a different approach, focused on one-time commodity-based sales that lack the financial benefits provided through long-term serviced-based agreements. Cash flow is one of the biggest challenges faced by security systems integrators. And the truth is,  during economic uncertainty, businesses will find...

In pursuit of providing a safe and secure environment in the workplace

All public properties are faced with a diverse and complicated set of safety and security risks, from health and safety to violence, terrorism, natural disasters, fires, political and environmental. Reducing safety and security risks requires the hands-on support of all operating teams, not just the security team, each playing their part in the pursuit of providing a safe and secure environment for all customers and staff. The challenge is twofold, one many still rely on antiquated logbooks, ch...

Deploying video analytics for contact tracing during COVID-19

Developing an effective contact tracing system in the UK to monitor the spread of COVID-19 has proved to be problematic. The trials of the app developed by the government and its partners encountered numerous challenges, and despite the reopening of restaurants, pubs and shops, the current approach to contact tracing is inconsistent, with recent reports suggesting not all establishments are following the government guidance.  At the same time, businesses are being encouraged to ask employe...

Home office security: keeping your data safe

Since lockdown came into effect, organisations globally have undergone years' worth of transformations in a matter of months. Whether it’s been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the “next normal” there remains a great deal of uncertainty around what the next twelve months hold...

Smart cities: deploying threat detection platforms

Today, 55% of the world’s population lives in urban areas. According to estimates from the UN, this number is expected to increase to 68% by 2050. As urban areas become more densely populated, the ability of law enforcement to uphold law and order becomes ever more critical to public security. It’s a challenge that must be constantly reviewed, and issues addressed where needed. One such area is the detection, identification and interception of physical threats, which has traditiona...

How to prevent your surveillance camera system from being hacked

IP cameras for video surveillance has been a trending topic amongst enterprises across the world due to rising concerns for security and safety. IP CCTV cameras are revolutionising security measures, and technology has evolved to allow for a more diverse security monitoring system through high resolution, larger digital storage options and compatibility for integrated analytical software. According to Global CCTV Market Forecast 2022, analysts expect the market for global CCTV to grow at a CAG...

The benefits of LiDAR for security and surveillance

Security and surveillance applications require accurate, scalable, and cost-effective solutions. However, traditional security technologies pose many risks and challenges including frequent false alarms and high costs—both for system installation and ongoing maintenance. Because of the shortcomings of these technologies, many organisations have adopted 3D LiDAR-based security solutions to improve reliability, reduce false alarms, and streamline their operations. Integrated with cameras a...

Introducing medical health checks to access control

What many security professionals are yet to realise is how COVID-19 has led to fundamental changes in security policies that will ultimately affect them. The introduction of medical technology, such as thermal scanners, to access control implementations is a new phenomenon. The coronavirus pandemic has propelled a new requirement onto organisations to conduct health checks – specifically, body temperature checks – at the door before an employee, contractor or visitor is given access...

Quick poll
What's the primary benefit of integrating access control with video surveillance?