Dan Berg
Dan Berg
Senior Product Manager for Integrations, Salient SystemsDan Berg has 30 years of experience and expertise in physical security, computers and networks, wireless communications and data, and software development. Starting as a shipping clerk, Dan quickly advanced and has filled many roles throughout his career – desktop publisher, web designer, creative designer, A/R manager, IT director, technical support, inventory manager, sales engineer, and more. Self-taught, Dan acquired his skills in response to the ever-changing challenges and new technologies in the security industry.
Round table contributions
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department tran...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical securit...
Ideally, every new product or technology serves a need in the market, but not all new products are created equal. The impact of some new technologies is so profound that they make us rethink our preco...
Deployed across a wide range of devices, the Internet of Things (IoT) collects data to help business owners make decisions on a macro scale as well as at a granular level. The IoT is a network of phys...
Risk is a core concept in the practice of physical security. However, the risk is not always assessed effectively. Ideally, an organisation's appetite for risk guides its security strategy and actio...
A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in r...
Integration of access control and video has been a reality for decades. The combination of our industry’s dominant technologies provides a one-two punch when it comes to maximising the security...
Robots have been used in security patrol applications for decades, although developments in artificial intelligence (AI), video analytics, sensors and communications are expanding robot capabilities t...
With fewer employees working in the office, and more of them working from home, it is no longer necessary for each employee to have their ‘own’ desk. Rather, desks may be used by various p...
The Internet of Things (IoT) is driving innovation in the security marketplace, just as it is in almost every other market. IoT devices, also known as ‘edge devices’, provide sensing, proc...
Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to ‘the flavour of the month.’...
Any marketplace tends to emphasise the newest technologies and products. Confirming the trend is the perpetual rush to buy the latest iPhone. But some legacy products are so good and perform the requi...
It’s a debate almost as old as the security industry itself: open systems versus end-to-end solutions. The argument goes that end-to-end solutions from a single manufacturer tend to “lock...
News mentions
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department tran...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical securit...
Ideally, every new product or technology serves a need in the market, but not all new products are created equal. The impact of some new technologies is so profound that they make us rethink our preco...
Deployed across a wide range of devices, the Internet of Things (IoT) collects data to help business owners make decisions on a macro scale as well as at a granular level. The IoT is a network of phys...
Risk is a core concept in the practice of physical security. However, the risk is not always assessed effectively. Ideally, an organisation's appetite for risk guides its security strategy and actio...
A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in r...
Integration of access control and video has been a reality for decades. The combination of our industry’s dominant technologies provides a one-two punch when it comes to maximising the security...
Robots have been used in security patrol applications for decades, although developments in artificial intelligence (AI), video analytics, sensors and communications are expanding robot capabilities t...
With fewer employees working in the office, and more of them working from home, it is no longer necessary for each employee to have their ‘own’ desk. Rather, desks may be used by various p...
Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to ‘the flavour of the month.’...
Any marketplace tends to emphasise the newest technologies and products. Confirming the trend is the perpetual rush to buy the latest iPhone. But some legacy products are so good and perform the requi...
It’s a debate almost as old as the security industry itself: open systems versus end-to-end solutions. The argument goes that end-to-end solutions from a single manufacturer tend to “lock...
Key people from Salient Systems
Security experts
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download