Application security - Round table discussions
A multi-factor authentication is a layered approach that requires users to provide two or more verification factors, such as credentials, to gain access to data and applications. If one of the credentials is compromised, the thinking goes, an unauthorised user will still be unable to meet the second authentication requirement and will be denied access to a targeted physical space, computing device, network, or database. Cybersecurity applications have long embraced the idea of MFA, which is also...
Like any year, 2022 was full of surprises for the physical security industry. Adapting to supply chain shortages, lightning-fast technology development, and changing occupancy patterns in a shifting labor market were just a few of the factors that kept security professionals guessing in 2022. Wonder what the new year will hold? We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the year ahead (2023)?
For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protecting access to computer systems. Nowadays, newer, more sophisticated forms of user identification and authentication have emerged on the scene. We asked this week’s Expert Panel Roundtable: Is the password on the brink of extinction in physical security? Why or why not?
Since they were invented, video surveillance cameras have been used mostly for security applications. However, the advent of video analytics and artificial intelligence (AI) has paved the way for use of video data in a variety of other applications, from process control to measuring occupancy to analysing customer traffic trends. The ‘data’ aspects of ‘video data’ are feeding many new applications that no longer involve operators looking at video images on a screen. We as...
Connectivity is literally the difference between products operating individually and those combined into a more powerful system. Many of the devices that connect today’s security products reflect mature technologies that have been proven over time. However, innovation is also driving the need for new approaches to connectivity and networking. We asked this week’s Expert Panel Roundtable: What are the new developments in networking and connectivity for security?
Machine learning refers to the evolving ability of computer systems to learn and adapt without following explicit instructions. It essentially involves the use of algorithms and statistical models to analyse and draw conclusions from patterns in data. In the security industry, when it comes to buzzwords, artificial intelligence (AI) has a higher profile than the more specific related term, although machine learning is a better description of tools that are gaining popularity in physical security...
Generally speaking, security becomes a topic of conversation among the general public only after something bad has happened. The context in these situations is: What went wrong? Largely absent from awareness by the public at large is how often things go right; that is, how often security systems work as intended to avoid expensive or even deadly consequences. We asked this week’s Expert Panel Roundtable: How can the industry communicate the value of security to the public?
With fewer employees working in the office, and more of them working from home, it is no longer necessary for each employee to have their ‘own’ desk. Rather, desks may be used by various people at different times, as needed on an ad hoc basis. This arrangement, known as ‘hot desking,’ maximises space efficiency and reduces unneeded office space. We asked this week’s Expert Panel Roundtable: What will be the impact of ‘hot desking’ on the security marketp...
Security is critical in the government sector, as much as any other vertical. Successful systems must promote public safety while also facing onerous requirements when it comes to cybersecurity. From a global perspective, the world seems less safe than ever before, suggesting an even greater role for security technologies. We asked this week’s Expert Panel Roundtable: How can security address the challenges of the government market?
The Metaverse sounds like the plot of the latest summer action movie. In reality, it’s a technology - or, more accurately, a group of technologies - that will likely have a transformational impact on a host of markets. For security, the Metaverse has an extensive list of needs. It also presents some opportunities. We asked this week’s Expert Panel Roundtable: What does the Metaverse mean for security?
The Internet of Things (IoT) is driving innovation in the security marketplace, just as it is in almost every other market. IoT devices, also known as ‘edge devices’, provide sensing, processing ability, software, and other technologies to connect and exchange data. The most common edge devices in the world of IP security are video cameras, which are becoming more intelligent and capable of processing the data they collect. We asked this week’s Expert Panel Roundtable: How are...
Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to ‘the flavour of the month.’ For guidance, we asked our Expert Panel Roundtable: Which new security trend do you think is here to stay?
The price of a security system and the value it provides are two different things. For end users, the objective is to minimise price, while maximising value. A system may both have a higher price and provide greater value, but not always. Because customers want to pay as little as they can, it is necessary to make a case that a system provides the best possible value, whatever the cost. We asked this week’s Expert Panel Roundtable: How can customers go beyond price to maximise the ‘...
The advantages of security systems as forensic and investigative tools are well understood and demonstrated in the market. However, the new trend is toward systems that are useful in real-time and that even predict a security event, before it happens. We asked this week’s Expert Panel Roundtable: Which security systems are becoming more proactive than reactive?
Among the technologies widely used in the world of security, none is more fraught with privacy concerns than biometrics. However, sometimes the privacy concerns are based more on false information than on facts. Privacy must be addressed, of course, but the industry should also promote greater understanding of the technology as a means of combatting misinformation. We asked this week’s Expert Panel Roundtable: What are the biggest misconceptions surrounding biometrics? What is the impact?
The last regularly scheduled spring ISC West trade show was held in 2019. The show returned last year with a rescheduled event in the summer, and attendees were largely pleased with the offerings. However, the ‘real’ ISC West, in the spring in Las Vegas, Nevada, will resume a decades-old tradition in 2022 that has been a major driver of industry market growth and innovation. The show is also an annual reunion of sorts for the security industry, and we are all ready for a reunion! We...
Supply chain issues have plagued the economic recovery during and after the COVID-19 pandemic, and the problems show every indication of persisting for months or even years to come. Supply chain challenges have impacted the security marketplace in many ways, reflecting the breadth and variety of products needed to secure people, facilities, and assets. Wondering about the specifics of that impact, we asked this week’s Expert Panel Roundtable: How does disruption of the global supply chain...
We appreciate the variety of opinionated discussions offered throughout the year by our Expert Panel Roundtable. Looking back at 2021, we found some random and uncategorised Expert Panel responses that were not previously published. We have rescued these responses from our cutting-room floor and present them here in the interest of generating even more discussion.
Environmental concerns and ‘green’ initiatives have been gaining steam recently with increasing attention to issues, such as climate change and the drive to ‘net zero’ emissions. Sustainability has not historically been a big concern in the physical security market, but the times are changing. We asked this week’s Expert Panel Roundtable: How can the security industry be more environmentally friendly and contribute to sustainability?
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police miscondu...
Keeping prisoners safely housed is among the biggest challenges the security industry faces. Correctional applications of security technology are often more extreme and require a specialised mix of technologies. We asked our Expert Panel Roundtable: What are the video security and surveillance needs in prisons, and how well do technologies meet those needs? Are there any ethical qualms about selling to prisons?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the...
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical securi...
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
Security systems are vital to any company. Nowadays, however, they can also provide additional benefits to any enterprise beyond protecting people, assets and facilities. Specifically, systems that were previously focused on security can now be leveraged in new ways to benefit the broader enterprise. When this happens, the security department transitions from a ‘cost centre’ to a repository of data that can benefit the whole company, and even contribute to the bottom line. We asked t...
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies a...
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which securi...
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download