Biometric Security - Round table discussions
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is alwa...
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our indus...
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most com...
We have been hearing about smart buildings for more than a decade, but the increasing profile of the Internet of Things (IoT) expands the possibilities for intelligent building systems and makes them even more attainable. Security is often among the “smart” functions of a building, and the capabilities of many physical security systems can contribute in new ways to building intelligence. We asked this week’s Expert Panel Roundtable: What is the impact of “smart buildings&...
Industry standards make it possible for systems and technologies to connect and work together. Standards enable today’s integrated systems. But does adherence to standards stifle innovation? Does the necessity to interface using an industry-wide standard slow down the implementation of newer (and possibly not standards-compliant) capabilities? Or do standards eliminate extraneous variables, empower more integration and encourage greater innovation? We asked this week’s Expert Panel R...
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than fo...
Video systems today offer more capabilities than ever. Consequently, the systems can be used in new ways. For a variety of reasons, however, many customers don’t take full advantage of the capabilities of their video systems and therefore are leaving value on the table. Education and training are tools to alleviate the situation, but the first step is to identify the new ways that video can be used. We asked this week’s Expert Panel Roundtable: How do customers under-utilise their vi...
Remarkable changes are happening in the video camera market for surveillance applications, including the emergence of lower-priced products that offer features that previously were only available at a much higher price point. Deflating prices of cameras are sometimes referred to as a “race to the bottom” – foreshadowing a market of low-cost cameras that all provide similar features. We asked this week’s Expert Panel Roundtable to comment on camera pricing trends and how c...
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away w...
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing...
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundt...
The International Organization for Standardization (ISO) describes standards as guidelines or characteristics for activities or for their results, aimed at achieving the optimum degree of order. They might include product standards, test methods, codes of practice, guideline standards, and management systems standards. In the security marketplace, there are many standards currently used, including those from organisations such as ONVIF, PSIA and ASIS International. Might the value of standardisa...
Meeting a customer’s expectations is a key component of success for any business, including the physical security market. However, understanding customers’ expectations is a big challenge, which is made even more difficult because those expectations are a moving target. We asked this week’s Expert Panel Roundtable: How are customer expectations changing in the physical security market? Their wide-ranging answers highlight elements from technology expectations to adaptability to...
Once again, ISC West has come and gone. The show continues to please exhibitors and attendees. Reviews are generally glowing and enthusiastic. For all its successes, however, there is a certain repetition from year to year – a lot of the same players, the same technology trends (not to mention the same venue every year, but who doesn’t like Vegas?) But even among the repetition, there is usually at least one element that is surprising. Perhaps it’s the unexpected elements that...
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly pl...
Some Expert Panel Roundtable topics are more challenging than others. Occasionally a question will “stump” the panel – i.e., no one will choose to answer it. Other times, only one or two panellists will step forward to answer a question. One comment does not a “panel” make. Taken together, however, these varied comments offer their own range of insights into the evolving physical security market. Let’s look at some of these assorted Expert Panel comments over...
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?
How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to...
Cities are increasingly connected using information and communication technologies, a trend often referred to as “smart cities.” In much the same way, “safe cities” initiatives are uniting businesses, city officials, law enforcement and other stakeholders in an effort to maximise the safety of businesses and citizens and to minimise theft and crime. Safe cities programmes seek to leverage a variety of resources, including public-private partnerships, to make urban communi...
Women in Security will be a focus at this year's ISC West in Las Vegas, including targeted conference sessions and the Women in Security Forum Breakfast on Friday, April 12. As a preview of the upcoming events, let's revisit an Expert Panel Roundtable on this subject. We asked: How is the role of women in the physical security market changing and expanding?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-w...
Healthcare organisations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organisations? What technologies are being embraced to increase security?
Historically, biometrics applications have often been thought of as specialised, high-tech and used predominantly in governmental markets. Everyday systems have tended toward card readers and keypads, while biometrics have been associated with high-security applications. Today, however, biometrics are much more mainstream. Fingerprint readers, in particular, are as near as our smart phones. Many other biometric applications are also becoming more common in a wide variety of markets. We asked thi...
People using computers to surf the Internet is "so 20th century". Today, the big trend involves machines using the Internet to communicate, exchange and analyse data in what has widely become known of as the Internet of Things. Various security devices are among the IoT components, and how devices connect effectively using the Internet – even devices not related to security – will constitute a large part of the future business of security integrators and installers, whether in the re...
An eruption of violence at a church in Charleston, S.C., this June has increased awareness of the potential for such incidents at our houses of worship. On June 17 at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston, a 21-year-old attacker wielding a Glock 41 .45-caliber handgun took the lives of nine people. But it was far from the first security breach at a house of worship. In fact, since 1999, more than 500 people have died a violent death on church or faith-based prop...
Violence in our schools and colleges often makes headlines, suggesting a growing and scary trend. A consequence of high-profile school shootings and other reports of violence is to increase awareness of the need to ensure safety and security of students, faculty and staff. The events have prompted more than one educational institution to take a second look at their security policies and infrastructure, with an eye toward improvement. But to what effect? Has greater awareness of violence in educa...
As we unpack our bags – literally and figuratively - from the recent ISC West in Las Vegas, it seems an appropriate time to reflect on the busy show. Specifically, it’s a good time to consider how the exhibition could be improved to be more valuable for attendees and/or exhibitors. We asked our panellists for their opinions, and we’re also interested in any other post-show commentary – please share in the comments section.
We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximise the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilising existing technology capabilities are a waste of money, aren’t they?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download