Articles by Larry Anderson
Many companies are considering carefully the possible risks of business travel to the areas most impacted by the Zika virus, and others may have facilities located in affected areas. What is the Zika Scare? Transmitted by mosquito bite, the Zika virus can cause a fever that typically involves minor symptoms. There is an additional risk to pregnant women as Zika fever has been linked to incidences of microcephaly (a neurodevelopmental disorder) in newborn babies through mother-to-child transmi...
A spirit of cooperation pervades this week's 11th annual Milestone Integration Platform Symposium (MIPS) conference, the largest-ever such event with more than 500 attendees at the Talking Stick Resort in Scottsdale, Arizona. MIPS is Milestone’s educational and networking event for its IP video surveillance and integration partners. New approach for security partners "We have reached the defining moment in our ecosystem," said Lars Thinggaard, Milestone President and CEO. "We must seize...
Proving ROI, setting proper customer expectations and training is imperative tothe success of biometric implementation End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “e...
More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...
2016 is shaping up to be the year of the billion-dollar merger in the security market. After last month's mammoth Tyco/Johnson Control merger, a second big merger has rocked the market, this one involving one of the most familiar names in the consumer market – ADT. The home and small business security company, which traces its history back to 1874, has agreed to be acquired by private equity firm Apollo Global Management, and will merge with competitor Protection 1, a subsidiary of Apollo-...
Sports security has always played a crucial role in securing major sporting events around the world. Ensuring the safety of millions of spectators who throng the venues during such events is not an easy task. Apart from the usual surveillance cameras and barricades that are put into place, to prevent overcrowding and stampeding, other security measures are also implemented. The Super Bowl is one of the biggest events of the year in the United States, so no wonder it’s also a huge event fo...
A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings created by pop culture Contributing to the problem of understanding is the popular culture. “Popular mo...
I suspect that many people – especially travellers – associate the idea of “security” with what they see at the airport screening line. If that’s the case, our market’s image suffers from the association. I’m not sure what that is, that happens at airport screening gates, but I don’t think it’s security. Rather than actual security, the practice seems aimed more at making the travelling public feel safer (if that’s possible even as th...
The universe of biometric authentication applications is expanding rapidly invertical markets such as healthcare and retail Once used mostly to secure high-value government facilities, biometrics are now a basic tool used in a variety of vertical markets. This article will look at some of those opportunities. For healthcare organisations, for example, biometric authentication is being used for secure medical dispensing to streamline workflow and control drug diversion, and f...
As industry consolidation continues, we can expect a number of mergers and acquisitions (M&As) in the next several months, but the first M&A story of 2016 is a whopper. This week, Johnson Controls and Tyco have announced their merger into one company with annual revenue of $32 billion. The new Johnson Controls will be almost a direct reflection of one of the industry’s biggest trends – the move toward technology convergence and smart buildings. Johnson Controls has previousl...
Access control and video systems have always yielded a lot of data, although historically much of it has been stored on hard disk drives and later overwritten and/or dumped. A new trend is to compile that data over time, organise it, analyse it and then use it to provide insights into how the enterprise operates. Analysing data from different sources and departments It’s part of a trend called Big Data, but so far its use in the physical security market has been limited. One company tha...
Facial and body behavior analytics can identify people “without interferingwith the pace of life” Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to. SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems ca...
Politics will be dominating current events in 2016 in the United States, building up to the Presidential election in November. Given the Presidential primaries coming up soon, almost everything – including security – is being seen through a political prism. With the recent San Bernardino attacks, the focus has once again shifted to protection of citizens against terrorist attacks. Government surveillance, such as monitoring of suspected terrorists or individuals has always been a con...
We don’t usually report on financial news here, but a recent financial move by up-and-coming industry leader Hikvision warrants attention. Specifically, Hikvision in Hangzhou, China, has secured a $3.1 billion line of credit from the government-owned China Development Bank. Companies use a variety of financing tools to provide the currency they need to fuel growth, so in that regard, Hikvision’s move is to be expected. Given their ambitious growth timeline, both in China and throug...
A major industry player is getting even bigger. FLIR’s acquisition of DVTEL will make FLIR a full-spectrum security systems provider, covering the consumer, SMB, Enterprise and large infrastructure segments of the market. The acquisition of DVTEL strengthens and broadens FLIR’s Enterprise market segment, complementing the existing security product lineup by offering a new set of software-based video surveillance technologies. FLIR already has solutions at either end of the tradition...
Many of the most well-trafficked articles posted at SourceSecurity.com in 2015 were those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2015 that generated the most page views. They are listed in order here with the author’s...
2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing. Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...
For the second year in a row, Canon made the biggest M&A move in the security marketplace in 2015. How could Canon top the industry shockwaves it created in 2014 when the Japanese giant acquired VMS company Milestone Systems? That’s easy: They bought Axis Communications for $2.8 billion in 2015. Although the Canon-Axis deal grabbed the most headlines and was easily the most shocking M&A announcement of 2015, it was certainly not the only big news on the mergers...
Second guessing is to be expected in the wake of terrorist attacks like the recent tragedy in Paris. After such attacks, security and intelligence professionals are prone to soul-searching – and to speaking out on the public airwaves –to address important questions: Could we have prevented it? What should we have done? There tend to be two categories of second-guessing. The first centres on the idea that the intelligence community should have known about the planned attack and...
Are smart phones poised to replace all biometrics hardware in the next several years? That’s the bold prediction of Hector Hoyos, CEO of Hoyos Labs, one of the pioneers of biometrics technology who owns 59 patents (pending and issued) related to the field. The advent of the smart phone, which amounts to everyone carrying a computer in the palm of their hand, provides all the ability anyone needs to capture biometric information to use for verification, he says. Breakthrough in technolo...
Discussions in our industry about cyber-threats to physical security systems, including IP video, often centre around hypotheticals. How might a hacker gain access to a video camera feed? How might he or she enter the larger enterprise system through a software vulnerability related to physical security? We all know assessing threats often involves considering the hypothetical, of course, but we should also seek to learn from actual events in the past. In relation to vulnerabilities of video su...
We all know that security video cameras are becoming smarter. The IP cameras at the edge of today’s video surveillance systems contain computer chips that can potentially change how cameras are used. However, despite the changing technology and greater intelligence at the edge, today’s systems mostly use video cameras for one thing – to provide video. In some cases, the cameras provide hours and hours of video that no one will ever watch. Re-examining the role of video...
NVRs make it easy to benefit from HD solutions and integrations to access control, alarm systems, intercoms and other technologies Developments in the IP video camera market have a direct impact on the other components in a system. With the emergence of higher definition cameras – whether 4K cameras or 8K or even higher – the market now needs back-end devices that can perform the decoding work. Also, more intelligence is needed, including smart functions such as pe...
NVRs come preinstalled with latest software releases to minimise setup time Looking for a perfect marriage of hardware and software for a video management system application? A preconfigured network video recorder (NVR) appliance may fit the bill. Consider these advantages of going the NVR appliance route, as suggested by vendor companies contacted by SourceSecurity.com. 1. Greater freedom of deployment NVRs provide more application flexibility – because the recorders...
Hikvision USA’s ascension from virtual obscurity to the upper tier of manufacturers in the U.S. market is being built on the Chinese company’s huge manufacturing capacity – they turn out 50,000 to 60,000 surveillance cameras every day from factories in China. The large capacity enables Hikvision to achieve economies of scale. In effect, they can make high quality video surveillance products at a lower price, a capability that will continue to serve them well as they begin compe...
Foot traffic improved a little on the second day of ASIS International in Anaheim, California. Furthermore, the high quality of meetings at the big industry show tended to overshadow complaints about attendance. There is plenty to talk about in Anaheim. “The conversations have been much more substantial than you usually have at a trade show,” says Charles Hunger, Product Marketing Director, Anviz Global Inc. “They’re not general conversations, they’re ‘How ca...
NVR appliances ease analogue to IP transition by providing end users with a hybrid-ready product There should be a palatable migration path from a large installed base of analogue to the latest IP technology. The biggest missed opportunity related to network video recorder (NVR) NVR appliances in the video surveillance marketplace is effectively using existing analogue camera investments while transitioning to the network. For example, IP encoders can be utilised as a brid...
Product innovation may have slowed in the security market in the second half of the year. On the first day of the ASIS International Show in Anaheim, California, new product introductions seemed few and far between. In fact, most manufacturers were touting small improvements to the products they announced in the spring. Some emphasised that the products unveiled (or “previewed”) in the spring are now fully ready to be shipped. ASIS has historically been more an end user show than an...
NVRs of the past may have been expensive & complicated to use, but today NVRs have user-friendly functionality How much do you know – or think you know – about network video recorder (NVR) appliances? Manufacturers in the sector say there is a lot of misinformation in the market about these workhorse system components. We asked several manufacturers to help us set the record straight. A common misconception among end users is that NVRs lack features and reliab...
NVR appliances are increasingly importantfor businesses incorporating a well-roundedphysical security plan A major, oft-mentioned advantage of network video recorder (NVR) appliances is their ease of installation and use. These machines come pre-installed with software and are as close to plug-and-play as you can get in the IP video surveillance world. NVRs are also being designed to support 4K technology as well withstand a variety of applications and uses. W...
You may also be interested in
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download- Global regulations of AI: the role and impact on the physical security industry
- Mind the gap: Addressing cybersecurity at every phase of technology management
- When choosing an access solution, make total cost of ownership a key part of the calculation
- How Californian cities are improving surveillance and security - key developments from 2022 to 2024