Articles by Larry Anderson

Is the password on the brink of extinction?

For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protecting access to computer systems. Nowadays, newer, more sophisticated forms of user identification and authentication have emerged on the scene. We asked this week’s Expert Panel Roundtable: Is the password on the brink of extinction in physical security? Why or why not?

Beyond security: Leveraging video data in the enterprise environment

Since they were invented, video surveillance cameras have been used mostly for security applications. However, the advent of video analytics and artificial intelligence (AI) has paved the way for use of video data in a variety of other applications, from process control to measuring occupancy to analysing customer traffic trends. The ‘data’ aspects of ‘video data’ are feeding many new applications that no longer involve operators looking at video images on a screen. We as...

Using technology to address loss prevention during the holidays

The holiday season is marked by festive spirit and family celebrations, but it is also the busiest time of year for retailers. Busy shoppers willing to spend money are an upside to the holiday shopping season, and many businesses depend on the holiday rush as a critical element to having a successful year. A downside of a busy holiday season is an increase in retail security threats including shoplifting. We asked this week’s Expert Panel Roundtable: How can technology address loss prevent...

Combining technologies at the entrance to improve the customer experience

Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control.  “The more manufacturers collaborate with each other, the more benefits fo...

What are the new developments in networking and connectivity for security?

Connectivity is literally the difference between products operating individually and those combined into a more powerful system. Many of the devices that connect today’s security products reflect mature technologies that have been proven over time. However, innovation is also driving the need for new approaches to connectivity and networking. We asked this week’s Expert Panel Roundtable: What are the new developments in networking and connectivity for security?

Transit security challenges include crime and the lingering impact of COVID

Clean, safe mass transit systems benefit everyone. Today’s transit operators face tremendous challenges, including declining revenue due to work-from-home policies, concerns about disease prevention, and high crime environments. Among these concerns, difficulty recruiting and retaining police resources has been exacerbated by the ongoing mental health crisis that disproportionately impacts public transportation networks. Mass transit systems Safe cities require an operational environme...

The impact of Machine Learning (ML) on the security market

Machine learning refers to the evolving ability of computer systems to learn and adapt without following explicit instructions. It essentially involves the use of algorithms and statistical models to analyse and draw conclusions from patterns in data. In the security industry, when it comes to buzzwords, artificial intelligence (AI) has a higher profile than the more specific related term, although machine learning is a better description of tools that are gaining popularity in physical security...

Milestone partner summit pledges rapid growth and responsible technology

Milestone Systems wants to double its revenue in the next five years while also setting a new standard of how technology companies behave, spotlighting more responsible use of technology. In short, the open platform video management system (VMS) company seeks to revolutionise the industry, deploying data-driven video software in security and beyond. Milestone is also shifting the approach from tech-centric to emphasising business outcomes; that is, focusing on solving problems that keep their...

Selling security technology to upper management: Here’s how

Obtaining needed funding for security technology improvements often requires going to senior management with a hat in hand. But requests for more security funding from the C-suite may fall on deaf ears unless a security professional can make a compelling case for the needed expenditures. It starts with learning to speak in terms that resonate with upper management and also involves carefully analysing the benefits of security investments to the broader enterprise. We asked this week’s Expe...

What’s new in the integration of video and access control?

Integration of access control and video has been a reality for decades. The combination of our industry’s dominant technologies provides a one-two punch when it comes to maximising the security benefits of a system. Access control tracks ‘events,’ while video provides visibility into those events. But the benefits of integrating video and access control are far from static. Rather, today’s systems are becoming even more valuable as they incorporate elements such as artifi...

What is the Internet’s role in researching security equipment?

How has the security end user’s ‘buying journey’ changed in the age of the Internet? If nothing else, the online age has simplified access to information about various security products and systems. However, easily accessible information could enable a customer to delay contacting a manufacturer or systems integrator until further along the decision-making process. We asked this week’s Expert Panel Roundtable: What role should the Internet play when customers are research...

Managing the cybersecurity risks of operational technology in transportation

Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” t...

How can the industry address cybersecurity concerns of cloud systems?

Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry...

Vibrant GSX 2022 includes new products, new approaches to security

The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several m...

What are the latest developments in mobile access control?

Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than done, and mobile credentialing, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in various vertical markets. We asked this week’s Expert Panel Roundtable: What are the latest developments in mobile acce...

Communicating the value of security to the public

Generally speaking, security becomes a topic of conversation among the general public only after something bad has happened. The context in these situations is: What went wrong? Largely absent from awareness by the public at large is how often things go right; that is, how often security systems work as intended to avoid expensive or even deadly consequences. We asked this week’s Expert Panel Roundtable: How can the industry communicate the value of security to the public?

GSX 2022 reflects changing technologies and evolving role for security

GSX 2022 this week in Atlanta highlights the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge sha...

Prosegur policy promotes responsible use of artificial intelligence (AI)

As new technologies incorporate artificial intelligence (AI) and overall uses of AI continue to expand, what protections are in place to prevent its misuse? Artificial intelligence, like any technology or security measure, is not inherently bad. It can, however, be used for nefarious purposes and in ways that were never intended or thought of. ‘Responsible AI Policy’ to protect users Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threa...

What impact are robots and/or drones having on the security industry?

Robots have been used in security patrol applications for decades, although developments in artificial intelligence (AI), video analytics, sensors and communications are expanding robot capabilities to new heights. Suddenly, robots are the latest thing in security. In addition, drones have become ubiquitous for numerous applications, including security. We wondered how well the security industry is embracing these newer technologies. We asked this week’s Expert Panel Roundtable: What impac...

What do you accomplish by attending a security trade show?

The security trade show season is resuming this fall with the GSX show in the United States and Security Essen in Germany, among other upcoming industry events. The return of trade shows is gathering momentum following the COVID lockdowns and cancellations with plenty more shows coming soon. But how useful is attending industry trade shows? We asked this week’s Expert Panel Roundtable: What do you accomplish by attending a security industry show?

What will be the impact of 'hot desking' on the security marketplace?

With fewer employees working in the office, and more of them working from home, it is no longer necessary for each employee to have their ‘own’ desk. Rather, desks may be used by various people at different times, as needed on an ad hoc basis. This arrangement, known as ‘hot desking,’ maximises space efficiency and reduces unneeded office space. We asked this week’s Expert Panel Roundtable: What will be the impact of ‘hot desking’ on the security marketp...

What is the role of security in PropTech?

PropTech (property technology) is a term that describes electronic tools used in the real estate industry. It’s a buzzword that has made its way into the physical security industry, often in connection with access control. For the latest insights on the trends of security in PropTech, we asked this week’s Expert Panel Roundtable: What is the role of security as property technology (PropTech) transforms the real estate market?

Is post-pandemic security more effective than pre-pandemic security?

With the worst of the COVID pandemic’s impact behind us, most would agree that the security industry was transformed by the interlude, as were most other elements in our society. But what will be the lasting impact on the security market – positive or negative? We asked this week’s Expert Panel Roundtable: Is post-pandemic security more effective than pre-pandemic security? How?

How can security address challenges in the government market?

Security is critical in the government sector, as much as any other vertical. Successful systems must promote public safety while also facing onerous requirements when it comes to cybersecurity. From a global perspective, the world seems less safe than ever before, suggesting an even greater role for security technologies. We asked this week’s Expert Panel Roundtable: How can security address the challenges of the government market?

What will be important technology developments in the second half of 2022?

Six months can go by in the blink of an eye. In 2022, it almost seems as if it has. Here we are already at mid-year after what has been an eventful six months for the security marketplace. There is still a lot ahead in 2022 for the industry, and our Expert Panel Roundtable has been considering what the coming months might hold in terms of technology change. We asked this week’s panelists: What will likely be the most important technology development in the security marketplace in the secon...

Shoplifting today is more sophisticated, and so are the tools to fight it

Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Sometimes, retail crimes are strategic and expertly choreographed. Every step is carefully thought out — from the brand to the location to the items that are taken. Shoplifting, a major safety concern Also, the violence that accompanies these events is rising. Shoppers are rightly concerned about their safety while shopping, and...

What does the Metaverse mean for security?

The Metaverse sounds like the plot of the latest summer action movie. In reality, it’s a technology - or, more accurately, a group of technologies - that will likely have a transformational impact on a host of markets. For security, the Metaverse has an extensive list of needs. It also presents some opportunities. We asked this week’s Expert Panel Roundtable: What does the Metaverse mean for security?

How are edge devices transforming security?

The Internet of Things (IoT) is driving innovation in the security marketplace, just as it is in almost every other market. IoT devices, also known as ‘edge devices’, provide sensing, processing ability, software, and other technologies to connect and exchange data. The most common edge devices in the world of IP security are video cameras, which are becoming more intelligent and capable of processing the data they collect. We asked this week’s Expert Panel Roundtable: How are...

The future is here: ADT’s innovation lab evaluating robots and indoor drones

New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the new technologies’ value to customers and some typical use cases. The Innovation Lab has been in place for just under a year and just moved into a 2,000-square-foot facility that is staffed with four dedicated ADT Commercial employees and teams from various commercial innovation partners. The idea of the lab is to close the gap bet...

What’s the new buzzword and how does it reflect the security market?

The buzzwords in security provide a decent parallel to the technology advancements in our industry. Over the years, our language has evolved to encompass new concepts that have transformed our business. Buzzwords can sometimes be dismissed as overblown compared to the current state of the technology, or even as marketing hype. But the language we use to describe the industry’s technologies often reflect our changing marketplace. Sometimes the challenge is keeping up with the latest buzz. W...

Quick poll
Which trend do you think will define physical security in the next 5 years?