Articles by Larry Anderson
Part 4 in our Intercoms in Security Series The ONVIF standard makes it simple to integrate the intercom with other ONVIF-compliant video management systems, access control solutions, and cameras Open standards are enabling new capabilities in the intercom market, some of it driven by the transition to systems based on Internet protocol (IP). Today’s most-used phrase in the intercom business is interoperability, given that the intercom is integrated with solutions s...
The ASIS International 63rd Annual Seminar and Exhibits, held between September 25th-28th in Dallas, will see several changes in 2017. The ASIS Board of Directors has directed ASIS staff members to look for new ways that the yearly show can provide more value, while continuing a 63-year tradition and demonstrated ability to serve the market. Under the general leadership of the Board, ASIS staff members have evaluated feedback from members, exhibitors and attendees to guide them as they seek to r...
Part 3 of our Intercoms in Security Series: Zenitel’s Call Access Panel manages intelligible critical communications through a security operations centre or control room Greater connectivity, security software enhancements, more customisation, and better sound quality are some of the enhancements driving the intercom market.An advantage now offered on Code Blue’s emergency speakerphones include self-diagnosing software that monitors the status of the phones an...
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and informat...
Part 1 in our Intercoms in Security Series Lambert-St. Louis International Airport uses Code Blue intercoms Organisations are demanding a new level of interoperability among mission-critical security systems. Intelligible audio, the ability to hear, be heard and be understood, is critical to communication, which is essential to the core security processes within an organisation, as well as to emergency situations. Intelligible audio provides a platform to optimise various...
Part 2 of our Intercoms in Security Series The 2N Helios IP family intercoms present a comprehensive portfolio of security offerings for businesses and individuals Some integrators and end users may think of intercoms as older technology that isn’t required as part of a robust security system. Not true. Intercoms include innovative technologies that have developed rapidly, keeping pace with other categories. Just as cameras and access control systems have made techn...
The enthusiasm of ISC West 2017 continued through to the final hours of Friday, reflective of a show jam-packed with new technologies to address industry trends. Exhibitors seemed happy enough with booth traffic, which held up even on the final day. Security industry trends Industry trends drove much of the technology. For example, cameras are getting less expensive, which means it’s more cost-effective to specify systems with higher camera counts. Also, cameras are providing more data...
For all its value in the security market, one has to wonder: How much captured video is actually used for security? Among hours and hours of video, only brief segments here or there are ever actually viewed or used for security applications, such as to review an incident or to provide evidence in court. But what about all that other video, much of it stored for 30 or 90 or 120 days or longer? Does it have to be merely a costly consequence of providing the security benefits of video? Not necess...
ISC West in Las Vegas kicked off Wednesday with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of “the security industry.” Qognify QBlock and Cloudscann “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the...
The attack on Parliament in London is another reminder that a facility's security is only as strong as its weakest point. In this case, it was a frequently used gate in New Palace Yard that was left unlocked. Known as Carriage Gates, the entrance is generally monitored by police officers. Could the weakness have led to the attack? Could the attack have been prevented (or minimised) if the gate had been bolted shut? Planned ‘complete security overhaul’ Finger pointing in the wake of...
Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual devices and controls In effect, a s...
Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control: 1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected. 2. Longer-distance communication, which allows readers to be mount...
Artificial intelligence and deep learning are poised to transform how video images are used and managed. In today’s surveillance systems, video from more and more cameras leave operators at risk of drowning in data, requiring hours of manual effort to track assets or persons of interest. They need more intelligent systems. Among the new tools is use of neural networks to create video analytics systems that are trained, not programmed. In effect, the systems have the ability to “lear...
Several of the hot trends in the physical security industry – robots, drones, video analytics – have one thing in common: The need for greater intelligence. More complex physical security systems that incorporate artificial intelligence, deep learning, speech recognition and other sophisticated functions depend on a higher-than-ever level of computing power inside embedded devices at the edge. Graphics processing unit Graphics processing unit (GPU) manufacturer NVIDIA is empowering...
A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. “For responders, the police department doesn’t have to manage cameras, but has the instant availability of a camera feed,” says Kathleen Grigg...
Are the glory days of IP video behind us? Not by a long shot, if you listen to the upbeat message at ‘Milestone Community Days’ in San Antonio this month. Pledging to ‘Make the World See,’ the community of technology partners, distributors, integrators and customers joined in a celebration of past successes, with an emphasis on future possibilities, at the yearly gathering hosted by the video management system (VMS) vendor. Milestone software integrations "The industry...
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large,...
Veracity, the Scottish company specialising in IP video transmission, storage and display, has made a small but significant acquisition that has the potential to impact its business profoundly, according to the company. Known for its COLDSTORE surveillance storage system and other video products, Veracity is expanding its scope with the acquisition of I-Comply Ltd. (icomply), a provider of command-and-control software whose UK customer base includes universities, hospitals, cities and power and...
Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they want their smart home systems to perform. We have heard the Internet of Things (IoT) buzzword in our market, and it is also a major force in the changing consumer electronics arena. Because consumer electronics are increasingly tied in with security, many in our industry keep a close eye on developments at the huge Consumer Electronics Show...
Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The so-called “just walk out” experience depends on “the world’s most advanced shopping technology.” Customers simply enter a retail store, choose the goods they want, and leave. The checkout process is automated: The selected goods are charged to the customer’s account automatically. Solving shoplifting Most of...
The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly common facial recognition technology It’s a...
SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions. The very most-clicked-on Roundtable discussion in 2016 was about how to choose between a cloud-based system and a server-based system. Other hot topics that made the Top-10 list of Roundtable discussions included edge-based video storage, the challenges of commoditisation, and mistakes customers make when buying and installing security systems. Here is...
Again in 2016, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2016 that generated the most page views. They are listed in order here with the author&r...
Merger and acquisition activity has become a familiar topic in the physical security market. In 2016, SourceSecurity.com covered M&A news involving some of the industry’s largest companies, including high-profile names such as Tyco, Honeywell, Hikvision, ADT, and Ingram Micro. Here’s a look at the top 10 M&A stories in 2016, as covered by SourceSecurity.com: 1. Johnson Control and Tyco merge Johnson Controls and Tyco announced their merger into one comp...
If you want more security, you have to give up some privacy. The familiar trade-off will be tested to new extremes in the United Kingdom in 2017 when the recently ratified Investigatory Powers Bill, a.k.a., the “Snooper’s Charter,” takes effect. Based on the levels of high-tech government surveillance of UK citizens ushered in by the bill, Britons should be very secure indeed. Britain’s new law is the latest reflection of the struggle to balance intelligence agencies&rs...
Long-predicted consolidation in the video surveillance market seems to have slowed somewhat lately – no big mergers or acquisitions have been announced. However, the announced “partnership” between industry giants Bosch and Sony this week presents a new variation on the theme. No companies changed hands, but the result is one fewer player selling video equipment into the market. In the latest deal, Bosch will handle the sales and marketing globally for all of Sony’s vide...
Arecont Vision created the category of multi-sensor panoramic cameras back in 2006. Now the market is taking off, and many manufacturers now offer panoramic cameras. I recently spoke with Jeff Whitney, Arecont Vision’s Director of Marketing, on the current market for panoramic cameras, and also about some other hot topics – from cybersecurity to making the installer’s job easier. SourceSecurity.com: Where do you see the category of multi-sensor panoramic cameras going from he...
ONVIF will be eight years old in the next several weeks. It has been interesting to watch the open industry forum’s impact on physical security since it began in 2008 with a goal to develop a global standard for the interface of IP-based physical security products. ONVIF’s influence has accelerated just in the last year, with the number of ONVIF-conformant products in the market growing from about 5,000 a year ago to more than 7,000 today – more than a 40 percent increase. ON...
A big cyberattack on Friday impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cyber security attacks later in the day were more global in nature. But Oct. 21, 2016, will also be remembered as the day our physical security industry’s legacy of apathy toward cybersecurity came back to haunt us. Denial of service attack The cyberattack last week was carried out by a botnet, a network of bots, which are software applications (in...
You may also be interested in
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download- Global regulations of AI: the role and impact on the physical security industry
- Mind the gap: Addressing cybersecurity at every phase of technology management
- When choosing an access solution, make total cost of ownership a key part of the calculation
- How Californian cities are improving surveillance and security - key developments from 2022 to 2024