Articles by John Davies

Secure access control is helping to shape the post-pandemic world

With the continued rolling back of COVID restrictions in the UK, there is a palpable sense of relief. A mixture of mass vaccinations, widespread testing, and track and tracing of the infection is helping to enable a healthy bounce back for businesses – with secure access control taking an important role in facilitating this. However, rather than just being a reaction to the wake of the pandemic, there is every sign that the economy, and consequently the security sector as well, are both r...

How to optimise mobile access control authentication with smart devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...

Security technology training will stimulate post-Brexit UK economic growth

Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge t...

How moving to Security as a Service benefits both providers and end users

The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products.   With the physical...

Preventing terror threats: Lockdown procedures for public spaces

The threat of international terrorism has changed the way the domestic security industry thinks about protection, just as much as it has for national security services. Whilst violent attacks and terrorism were once predominantly aimed at government, military or political establishments, an uncertain global political climate means the ability to rapidly lock down facilities has risen to the top of any organisation’s security wish list. In reality though, just how easy is it for most organ...

Key practical steps to an effective business security culture

There has never been closer integration between physical and logical security systems, so there has also never been greater importance when it comes to defining and maintaining the security culture within an organisation. Unfortunately, with increasingly complex security protocols required on a daily basis (and used by every employee), a security regime can easily become lax through apathy – which offers the perfect opportunity for potential intruders to take advantage. Whilst security t...

Growing need for open protocols in the security industry

If all the components within a security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities The widespread use of open protocol systems is one of the most important developments in the security and safety sector for decades. With a heavy reliance upon various security softwares (even for physical security), using open systems has gone from being a desirable selling point to a necessity in the security indus...

Misguided trust leads to increase in security risks and potential attack from intruders

Stringent security policies are necessary in an organisation to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

Biometrics market poised for rapid growth

2014 has been a year of significant growth for TDSi TDSi 2014/2015 Review and Forecast:In 2014 we saw continued growth at TDSI, largely through unprecedented interest in integrated IP security systems. Asian markets have continued to be very buoyant, although there have continued to be some flat spots geographically, such as Europe. Compared to other technology markets, security has grown very quickly since the recession, and TDSi has enjoyed double-digit growth. Manufa...

Quick poll
Which feature is most important in a video surveillance system?