SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Ensign InfoSecurity joins MITRE CTID for cybersecurity
    • Sectigo joins Pax8 Marketplace with CLM solution
    • Alibi and MyDoorView partner for video intercom tech
    • G2E Asia highlights: Gaming & innovation trends
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Is audio underused in physical security? What are the obstacles?
    • How is AI transforming physical security?
    • ISC West update: New SoCs inside cameras drive intelligence at the edge
    • How should security adapt to the unique aspects of the corrections market?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    MOD Pizza upgrades with Hanwha Vision surveillance

    MOD Pizza upgrades with Hanwha Vision surveillance

    Sunprime & Dahua: Advanced security for solar plants

    Sunprime & Dahua: Advanced security for solar plants

    Hanwha Vision enhances security at Naval Park, New York

    Hanwha Vision enhances security at Naval Park, New York

    Verkada Enhances security for Salvation Army operations

    Verkada Enhances security for Salvation Army operations

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    IoT Solutions World Congress 2025

    IoT Solutions World Congress 2025

    World Police Summit 2025

    World Police Summit 2025

    Imagine 2025

    Imagine 2025

    Global Supply Chain Forum 2025

    Global Supply Chain Forum 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    The ultimate guide to mastering key control

    The ultimate guide to mastering key control

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    A modern guide to data loss prevention

    A modern guide to data loss prevention

    2025 Trends in video surveillance

    2025 Trends in video surveillance

About us Advertise
  • Ultimate key control guide
  • How is AI transforming security?
  • Design vs systems
  • Women in security
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos
  • More
    Cloud security

    Cloud security - Round table discussions

    Ensuring building design and physical security systems align
    Ensuring building design and physical security systems align

    In many cases, architectural design and layout dictate optimal placement of security devices like cameras, access control readers, and sensors. Poor design can lead to blind spots, reduced coverage, and ineffective surveillance. However, planning that involves all the various stakeholders can maximise both security and design elements. We asked this week’s Expert Panel Roundtable: When are building design and physical security systems complementary? When are they at odds?

    What are the most promising new technologies in security?
    What are the most promising new technologies in security?

    New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel...

    How does security innovation impact the skillsets operators need?
    How does security innovation impact the skillsets operators need?

    Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact...

    How can manufacturers and integrators mitigate the risks of port forwarding?
    How can manufacturers and integrators mitigate the risks of port forwarding?

    Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are t...

    How can technology address the security challenges of the hospitality market?
    How can technology address the security challenges of the hospitality market?

    The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenge...

    What’s new in command-and-control systems for security?
    What’s new in command-and-control systems for security?

    A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unifie...

    How are wearable technologies impacting the security market?
    How are wearable technologies impacting the security market?

    The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security m...

    What is the most overlooked factor when installing physical security?
    What is the most overlooked factor when installing physical security?

    While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: Wha...

    The impact of the cloud on physical security: Net-positive or net-negative?
    The impact of the cloud on physical security: Net-positive or net-negative?

    Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost management, and a skills gap can make adopting the Cloud seem onerous. But the benefits are there, aren't they? We asked this week's Expert Panel Roundtable: Will the impact of the Cloud on physical security integrators be net-positive or net-negative?

    How can the security industry contribute to protecting the environment?
    How can the security industry contribute to protecting the environment?

    When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are als...

    Four years later, what is the lingering impact of COVID-19 on security?
    Four years later, what is the lingering impact of COVID-19 on security?

    The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long CO...

    How do new security technologies transform retail and loss prevention?
    How do new security technologies transform retail and loss prevention?

    When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and...

    What are the biggest ethical considerations of security technology?
    What are the biggest ethical considerations of security technology?

    Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical s...

    What will be the big news at ISC West 2024?
    What will be the big news at ISC West 2024?

    There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news...

    What trends are driving growth in security in 2024?
    What trends are driving growth in security in 2024?

    By all reports we have heard, 2024 is rushing by at a rapid pace. Many of us are just now catching our breaths after the busy holiday season, even though spring is practically here. Having had a healthy taste of 2024 already, our Expert Panel Roundtable is eager to weigh in on what lies ahead for the rest of the year to come. We asked this week’s panel: What large trends are driving growth in the physical security industry in the year ahead? 

    What are the latest developments for edge devices?
    What are the latest developments for edge devices?

    Edge devices play an important role in the Internet of Things (IoT) by enabling real-time data analysis, faster decision-making, and improved operational efficiency across various industries. In the physical security industry, applying artificial intelligence (AI) capabilities to edge devices expands the possibilities, and edge devices offer complementary functionality to support movement to the cloud. We asked this week’s Expert Panel Roundtable: What are the latest developments for edge...

    What factors had the biggest impact on security in 2023?
    What factors had the biggest impact on security in 2023?

    With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical security marketplace. We asked this week’s Expert Panel Roundtable: What factors had the biggest impact on the security marketplace in 2023? 

    How can physical security systems contribute to productivity?
    How can physical security systems contribute to productivity?

    There is a complex and interdependent relationship between security and productivity. Good security is needed to make productivity possible, but security measures could, in some instances, hinder workplace efficiency. New technologies are enabling security systems to have a more profound and positive impact on productivity by yielding better intelligence to guide the improvement of workplace practices. Multiple systems that work together, rather than separately, improve the productivity of secur...

    What current technology is a game changer for security?
    What current technology is a game changer for security?

    Ideally, every new product or technology serves a need in the market, but not all new products are created equal. The impact of some new technologies is so profound that they make us rethink our preconceptions and may create a total transition in the broader market. These are the technologies we call “game changers” because they prompt a significant shift in the current manner of doing or thinking about security. We asked this week’s Expert Panel Roundtable: What current techno...

    How can security systems maximise ROI?
    How can security systems maximise ROI?

    Security systems are often seen as an investment, but usually not one that pays dividends. However, newer technologies are enabling end users to extend their efforts to cost-justify a security system beyond the mirage of “measuring what didn’t happen.” Nowadays, security systems provide quantifiable benefits that yield a return on customers’ investments. We asked this week’s Expert Panel Roundtable: How can security systems maximize return on investment (ROI)? 

    How are data analytics changing the course of security?
    How are data analytics changing the course of security?

    For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations...

    What is the continuing role of the VMS in an age of VSaaS?
    What is the continuing role of the VMS in an age of VSaaS?

    Cloud implementations enable organisations to slash IT costs, boost performance, increase efficiency, and provide flexibility in a variety of applications. Cloud computing is a great way to store and access data from anywhere in the world, as long as you have an internet connection. In the case of video management, Video Surveillance as a Service (VSaaS) systems are becoming more popular, both as a means of managing costs and to deliver expectations of accessing video from any device anywhere in...

    The job of security director is expanding: How does it impact technology?
    The job of security director is expanding: How does it impact technology?

    An organisation’s security director manages a staff of security personnel, implements and enforces security policies and procedures, and generally ensures the safety of personnel and visitors to the organisation’s premises. Over the years, the role of security director has expanded to include new disciplines such as cybersecurity. More and more, security directors are also taking a “seat at the table” as integral and critical members of a company’s management team....

    How can security technologies protect lone workers?
    How can security technologies protect lone workers?

    There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this we...

    Are schools safer because of physical security systems?
    Are schools safer because of physical security systems?

    Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not? 

    What missing skills among security integrators can cause problems?
    What missing skills among security integrators can cause problems?

    As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers? 

    What’s new in smart homes and residential security systems?
    What’s new in smart homes and residential security systems?

    Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?

    How can security systems be more proactive?
    How can security systems be more proactive?

    Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roun...

    How is the role of the security installer/integrator changing?
    How is the role of the security installer/integrator changing?

    The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked th...

    How the Internet of Things (IoT) is increasing security effectiveness
    How the Internet of Things (IoT) is increasing security effectiveness

    Deployed across a wide range of devices, the Internet of Things (IoT) collects data to help business owners make decisions on a macro scale as well as at a granular level. The IoT is a network of physical devices embedded with sensors, software, and network connectivity that allows them to collect and share data. We called on this week's Expert Panel Roundtable to comment on the intersection of the IoT and physical security. We asked: How is the Internet of Things (IoT) increasing the effectiven...

    View more
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • »
    Related white papers
    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    Download
    A modern guide to data loss prevention

    A modern guide to data loss prevention

    Download
    2025 Trends in video surveillance

    2025 Trends in video surveillance

    Download
    Related articles
    Looking back at 2020: Cloud systems expand in shadow of COVID

    Looking back at 2020: Cloud systems expand in shadow of COVID

    What is the cloud? (Can we all agree?)

    What is the cloud? (Can we all agree?)

    Which security markets are likely to embrace the cloud?

    Which security markets are likely to embrace the cloud?

    Follow us

    Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos
    Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
    About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
    1. Home
    2. Topics
    3. Cloud security
    4. Round table discussions
    About this page

    See an extensive list of insightful discussions related to Cloud security, providing in-depth opinions and analysis on product, technology and industry trends on Cloud security from industry thought leaders and experts.

    See this on SecurityInformed.com

    Subscribe to our Newsletter

    Stay updated with the latest trends and technologies in the security industry
    Sign Up

    DMA

    SourceSecurity.com - Making the world a safer place
    Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

    Our other sites:
    SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

    Subscribe to our Newsletter


    SourceSecurity.com
    SecurityInformed.com

    Browsing from the Americas? Looking for our US Edition?

    View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

    US Edition International Edition
    Sign up now for full access to SourceSecurity.com content
    Download Datasheet
    Download PDF Version
    Download SourceSecurity.com product tech spec