Retail security applications - Expert commentary

The role of storage in video surveillance applications

Maricopa County installed a fully integrated security controls system, featuring a VMS Larger IP video systems require plenty of storage, and several high-profile applications help to demonstrate the value of storage in today’s networked video environment. Maricopa county security project One example is the Maricopa County (Ariz.) Sheriff’s Office, which is nationally recognised for its zero tolerance toward crime and unwavering focus on innovation in law enforce...

Insights From More Than Two Decades of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Designing security systems: Project management techniques

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...

Strengthening Loss Prevention with Unified and Cloud-Based Security Solutions

Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organisations is sometimes still viewed as a necessary evil. But at a time when shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximise any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales...

Key trends driving access control growth

Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...

Corporate data security and access control needs evolving with growth of BYOD and cloud applications

Applications that reside in the cloud offer enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprise cloud deployments now successfully up and running, plus the integration of the Bring-Your-Own-Device (BYOD) culture into the workplace, the complex issue of data security and access control have leapt to the fore. Ian Lowe, Senior Product Marketing Manager...

Improving security system installations with Acceptance Testing

Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from a company’s...

Fault tolerant access control for business continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...

Redefining access control with NFC-enabled smartphones

Comprehensive and robust security programmes and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Fur...

Security by design or designed for security?

Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles.  These principles of physical security, many of which can be drawn from proven principles of IT security, su...

Panoramic megapixel cameras boost wide area surveillance

High definition (HD) megapixel cameras can help in the surveillance of larger areas with fewer cameras while delivering superior detail and improving overall security operations. This translates into lower infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video systems with megapixel cameras and achieve better performance and functionality. In this article, Scott Schafer, Executive Vice President of Arecont Vision ex...

A long-lasting alliance between system integrators and customers promises to be favourable for both

Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for system integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced c...

Unifying identity management and access control

For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...

IP network requirements for video surveillance/physical security

IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world,...

Managing Physical Security Systems & Information in a Multi-Building Campus

The requirements of a physical security solution for a multi-building campus are quite different from those for the security of a single building. Gadi Piran, President of OnSSi, lists the immense potential and benefits of implementing an integrated security solution and the key characteristics of an effective solution. Multi-building campuses such as universities, research facilities, convention centers and hospitals face unique problems in implementing a total physical security s...

Security guard company selection - a checklist

The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services.  In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...

Power supplies: critical component of security solution effectiveness

Security integrators prefer to standardizetheir choices of system components such as power supplies using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight; however, they play a critical role in the effective functioning of security solutions.  Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In...

Video systems: delivering value to enterprise business intelligence

If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a range of different vertical markets. The advances in video management systems that include cutting-edge video analytics present a huge opp...

Security system implementation: "bleeding edge" versus leading edge security technologies

The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge proven technology. In this article, Stephen Malia - Vice President of Engineering Services and Marketing at North A...

Fibre optic transmission in security and surveillance solutions

  Fibre optics enhances the operation and business bottom line of surveillance solutions Designers and end users of security systems, integrators and installers must consider and balance the functionality required of a video surveillance camera with its methods of transmission. This is the first of a 3-part examination by Mark Wilson, Marketing Vice President of Infinova, of how chief security officers (CSOs), directors and managers can understand the benefits of and...

True open platform IP video: the distinguishing characteristics

  Acquiring a true open platform surveillance software requires an informed decision Research reports pertaining to the IP video surveillance market repeatedly talk up the trend of "Open Platform". Keeping with that trend, it seems that every manufacturer is claiming its offerings to be IP-based and Open Platform. In the security industry these days, it has become almost embarrassing for a company to admit having a proprietary (single vendor) solution - there seems to be a...

End-user challenges to digitalisation and security systems integration: a retail perspective

  Integration of security systems is a priority for retail sector managers With the assumed digitalisation happening on the end-user side, progressive security systems integrators stress the importance of changing the business concept from being installers to being service and solution providers. However, less is known about the details of this process on the end-user side, Markus Lahtinen of LUSAX project explains. An online survey of loss prevention managers in...

Network video offers an important route to reducing shrinkage for retailers

Axis Communications is seeing strong demand for its network video products in the retail sector following an extended period of engagement with a range of retail solutions providers.  Phil Doyle, managing director of Axis Communications (UK), points out some of   Network video provides ideal solution for retailers faced with rising shrinkage the more successful and practical applications of network video in the sector. The natural focus of any discus...

Axis Communications considers the future for the security industry

SourceSecurity.com took the time to catch up with the CEO and President of the company that invented the network camera more than 10 years ago, Axis Communications, to ask him whether the era of IP-based surveillance had arrived and what obstacles remain in the way of more widespread adoption. SourceSecurity.com: Do you think IP-Surveillance has finally come of age? Ray Mauritsson: Yes and it is not just Axis saying this.  You only need to look at the growth of sales of the network...

Where there's smoke and wire, thieves perspire: applications of artificial smoke systems

In his previous article, Matt Gilmartin of Concept Smoke Screen introduced the... well... concept... of artificial smoke as a defence against burglars.  Here he explores the practicalities of the technology and introduces us to a few of its many applications. Originally, security fog systems were exclusively a means of preventing loss through burglary, and were utilised only in the manner described in my previous article.  But advancements in technology (partly fuelled by ever-growin...

Security Smoke Systems

In the first of two articles, Matt Gilmartin of Concept Smoke Screen introduces the idea of using artificial smoke as a final - and telling - barrier against burglary, and explains the basics behind this wildly under-reported technology. Around twenty years ago, a dramatic increase in the amount of smash-and-grab and "ram-raid" style burglaries made it apparent that for a lot of premises, the three layers of "conventional" security measures were no longer enough: Physical security...

Quick poll
What's the primary benefit of integrating access control with video surveillance?