Industrial security systems - Expert commentary

Convenience and cost savings make cloud managed video surveillance a popular choice for many businesses

Cloud-based technology can reduce IT costs, streamline application management and make infrastructure more flexible and scalable. So, it’s no surprise that cloud video surveillance solutions (also known as video surveillance as a service or VSaaS) are gaining momentum in a big way. In fact, according to recent reports, the VSaaS market is forecasted to increase at a compound annual growth rate of 10.4% by 2025. But some company owners may wonder – what services does a cloud model de...

Open Supervised Device Protocol (OSDP) – what you need to know about modern and future proof access control security?

Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organisations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing. Most organisations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue...

Travel and the pandemic: Analysing the security and risk landscape

Travel and tourism are a colossus of a global industry. From backpackers to private jets, people from all backgrounds can explore the world in a variety of different ways for several different purposes. Many may associate the mention of travel with leisure – holidays, cruises, or other pastimes. However, a significant proportion of the industry is driven by travel for business-related means. According to the World Travel & Tourism Council (WTTC), business travel expenditure exceeded...

Strengthening the physical and cyber barriers around critical infrastructure

It has long been recognised that no one is safe from cyber-attacks, but some sectors face a much higher level of threat than others. Critical infrastructure sectors such as utilities, energy and industrial manufacturing are some of those that face an intense level of interest from cyber criminals and nation-state groups across the globe. The impacts of a successful attack can have detrimental consequences, for both the cyber and physical side of the business, in terms of business disruption, ec...

What you need to know about open source intelligence (OSINT) for emergency preparedness

Have you ever stopped to consider the volume of new data created daily on social media? It’s staggering. Take Twitter, for instance. Approximately 500 million tweets are published every day, adding up to more than 200 billion posts per year. On Facebook, users upload an additional 350 million photos per day, and on YouTube, nearly 720,000 hours of new video content is added every 24 hours. While this overwhelming volume of information may be of no concern to your average social media user...

Securing a sustainable future

The UK Government has set out an ambitious ten-point plan, known as the green industrial revolution, with an aim “to forge ahead with eradicating its contribution to climate change by 2050.” This makes our government the first major economy to embrace such a legal obligation. Green recovery Acknowledging climate change and meeting net-zero is a demanding challenge especially for those affected by the pandemic. But the UK Government, with the launch of its aspiring strategy, is inve...

Impact of challenges in the component supply chain on security manufacturers

Prices and delivery times for essential components in CCTV systems are being driven up as demand soars from other industries. Secure Logiq’s Robin Hughes explains the current state of the market. Challenges Component shortages and supply chain challenges are a hot topic in just about every industry based on semi-conductors and silicon chips right now, and security is no exception. It’s common knowledge that the global Covid lockdown caused a shutdown in the mining of silicon and s...

The benefits of installing high security doors

Whenever you say the word “security” in today’s world of digitalisation and technology, minds immediately jump to online security. Encryption, passwords, and website security are all common areas of concern for today’s security teams – so much so that we often pass over physical security installations entirely. But we shouldn’t, because contrary to popular belief, security doors aren’t just for banks and safes. High-security doors are deployed and used...

Secure access control is helping to shape the post-pandemic world

With the continued rolling back of COVID restrictions in the UK, there is a palpable sense of relief. A mixture of mass vaccinations, widespread testing, and track and tracing of the infection is helping to enable a healthy bounce back for businesses – with secure access control taking an important role in facilitating this. However, rather than just being a reaction to the wake of the pandemic, there is every sign that the economy, and consequently the security sector as well, are both r...

Government steps in to promote the protection of public venues

COVID restrictions across the UK are slowly easing and many public venues, including stadiums, are beginning to reopen following a year of closures and uncertainty. According to recent ONS figures, criminal offences – excluding fraud and computer misuse – dropped significantly during the lockdown periods of 2020. In fact, 25% less crime was reported in April 2020 compared to the same month in 2019. However, as lockdown measures eased each time, crime levels quickly crept up, sadly e...

Tackling the challenge of the growing cybersecurity gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and centre on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation...

Physical security and the cloud: why one can’t work without the other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is s...

Q&A: Bosch Video Systems & Solutions' Michael Seiter and Magnus Ekerot on smart technology, "AIot", and plans for 2021

Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to con...

Remote Monitoring technology: Tackling South Africa’s cable theft problem

For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown,...

How businesses can prepare their communications infrastructure and critical event management plans for the next chapter of the pandemic

The global pandemic has created a working environment filled with uncertainty and, at times, fear, as COVID-19 cases surge yet again and businesses continue to navigate a complex web of infectious disease mitigation protocols and managing the distribution of a potential vaccine. Organisations are operating in an environment where a critical event, posing significant risk to its employees and daily operations, could occur at any moment. Even with a vaccine showing light at the end of a very dark...

Retail security in 2021 and beyond

This year has brought about changes in virtually every sector. As with other frontline industries, the security sector has been tested more than those able to move entirely to remote working. While the promise of a vaccine means an end is in sight, the post-COVID era will not bring with it a return to the ‘normal’ we knew before the pandemic. Organisations have adapted, becoming more resilient and agile and this will have lasting effects. The coming months will continue to be testi...

3 reasons why you haven’t adopted AI into your surveillance operation and why you can now

The explosion of artificial intelligence used to enhance business processes, propel innovative products, and further automation has touched essentially every industry to date. The security sector, notable for its maturity and complexity, is not exempt from the AI tidal wave. In fact, quite the opposite, the security sector and more specifically the domain of video surveillance have seen an emergence of AI-powered solutions both hardware and software. The widespread adoption of IP cameras, clou...

A veteran’s point of view: physical security sector is a natural fit for the military

Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military c...

Large security installations and what you should expect from your vendor

When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of the...

A brief report on happenings at ISC East 2018

Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminar...

Integration of surveillance and video management solutions for safer cities

A deep native integration of Bosch cameras with software from ISS proactively catalyses the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS Secu...

How to enhance IoT applications with network video surveillance

Remember the old adage “The whole is greater than the sum of its parts?” Nowhere is that truism more evident than when you add network video to the current generation of Internet of Things (IoT) solutions. Whether we’re talking about industrial IoT applications, “Smart – X” (city, building, parking etc.) or retail operations, integrating network video into the solution provides value far beyond simple situational awareness. Optimising sophisticated video tec...

Download: High-security electromechanical locking solutions for critical infrastructure

Protecting the world’s critical infrastructure is a complex mission. Managing security for these facilities involves addressing a broad range of possible threats and vulnerabilities, from the intentional contamination of water supplies to the theft of equipment vital to electricity distribution.Vandalism, theft or deliberate sabotage — by terrorists or other criminals — are ever-present threats. The consequences of any security breach can be dire,...

Electric grid security: A closer look at CIP-014-1 standard

The FERC standard CIP-014-1 became effective, according to the Federal Register, on January 26, 2015 The electric power industry works with several federal agencies, including the Federal Energy Regulatory Commission (FERC), the Department of Homeland Security (DHS), and the Department of Energy (DOE) to improve sector-wide resilience for cyber threats. The industry also collaborates with the National Institute of Standards and Technology (NIST), the North American Electric Re...

Cybersecurity - Hackers target SCADA embedded systems

Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber Emergency Response Team, which is part of the U.S. Department of Homeland Security, reports responding to 198 cyber incidents in fiscal year 2012 across all critical infrastructure sectors. Forty-one percent of these incidents involved the energy sector, particularly electricity, according to a February 2014 report. Considering the enormity of the...

Positive economic outlook for security market in 2014

A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...

CFATS – latest standard in vogue amongst US chemical facilities

As per DHS, Tier 1 facilities will go through a preliminary round of site inspections called pre-authorisation inspections (PAI) In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law in the US. Section 550 of the Act ordered the Department of Homeland Security (DHS) to “...issue interim final regulations establishing risk-based performance standards for security of chemical facilities and requiring security vulnerability assessments a...

Quick poll
What is the most significant challenge facing smart building security today?