Network / IP security - Expert commentary

Today’s CCTV Systems: Would George Orwell approve?

Orwell’s 1984 depicts a post-apocalyptic dystopia in which camera surveillance is used to oppress the individual The phrase “Big Brother” has been in our vocabulary for eight decades now. Its use is linked exclusively with negative images of a surveillance state (and, of course, a bad reality television show). But would George Orwell, a non-religious democrat, be happy with the way the anti-CCTV lobby has appropriated the phrase? The fact is, Orwell would app...

Access control market working to overcome tradition of proprietary systems

Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition from closed systems to more open integration provides benefits for integrators, and especially for end users looking to maximise their system return on investment. End users want greater flexibility, specifically in terms of hardware choice. As a result, more non-proprietary solutions are coming to market. For the integrator, offering more o...

Remote video monitoring – the smarter way to enhance business security efforts

Remote monitoring offers a multiplying effect on security efforts The growth of IP-based networks has made it possible for security professionals to easily monitor surveillance activity from any internet-enabled PC, smartphone, or tablet anytime, anyplace. More and more, businesses are realising that remote monitoring can have a significant impact on their bottom line. Whether you’re a retail outlet, bank or hotel, remote monitoring offers a multiplying effect on securit...

Dealer/integrator insights: The changing face of managed services

Integrators are embracing the many ways the cloud helps smaller companies succeed Hosted and managed security services aren’t for large enterprises only. SMBs (small-to-medium businesses) are taking advantage of the inherent operational and cost efficiencies of deploying managed services. Web-based or cloud services like access control and video provide convenience, ease of use and lower total cost of ownership. Cloud services are accessed without downloading and main...

Strengthening Loss Prevention with Unified and Cloud-Based Security Solutions

Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organisations is sometimes still viewed as a necessary evil. But at a time when shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximise any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales...

Standardising global security to minimise risks and budget

Security standardisation reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...

How cybersecurity impacts the physical security world

Cybersecurity is a critically important aspect in today’s increasingly IP-driven world of physical security The physical security market tends to dismiss issues of cybersecurity as outside its area of expertise, but cyber-threats are a problem that has been ignored for too long. The fact is, cybersecurity is a critically important aspect of the systems our industry provides in the increasingly IP-driven world of physical security. And the risk isn’t just reserved...

Key trends driving access control growth

Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...

Enhancing video security with physical detector technology

Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by movement in the areas where cameras are located. Event-driven video can be achieved by using intelligent motion detection or video contents analytics (VCA) on the camera, recorder or PC server. Recently, performance of VCA has improved; however, some conditions can still affect detection using the camera image. Tomo Ito, Business Development Man...

Role of health and performance monitoring in preventing security system downtime

If a security or video surveillance / CCTV system isn’t working, who’s to blame? Or more to the point, what’s to blame? Is the problem the malfunction of a specific device on the edge of the IP network, or is it a network or other system failure? How can an end user or dealer / installer know what the problem is? How can a camera manufacturer know if a call to their overworked tech support department is really about the manufacturer’s camera or cau...

Professionalising security management by challenging established notions

Law enforcement and pure problem-solvingskills will play less of a role for the futuresecurity director Much effort has been put down in the professionalisation of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalisation and academisation of security practice as well as a recently updated standard (ANSI/ASIS...

Analysing effectiveness of security operations with security metrics

The ability to measure and analyse the effectiveness of security operations is extremely useful – not only for identifying and addressing an organisation’s vulnerabilities, but also for demonstrating security’s mitigating impact on overall risk levels along with the higher-level value security delivers to a business. Brian McIlravey, Co-CEO at PPM, explains how security metrics can provide a powerful toolset for accomplishing these objectives. By quantifyi...

The impact of the new HDcctv AT 2.0 standard

Editor's Note: HDcctv Alliance has announced that Dahua has opened its patented HDCVI technology to the global video surveillance industry as the basis for HDcctv's AT 2.0 standard. For additional elaboration on what the move means to the growing market for higher-resolution CCTV, we approached Todd Rockoff, chairman and executive director of HDcctv Alliance. SourceSecurity.com: How is HDcctv AT 2.0 superior to HD-SDI or other previous approaches? Todd Rockoff:  When i...

Significance of value management process

In a highly competitive marketplace, where organisations need to ensure they are contracting for the best possible services, value must be visible. This starts with aligning with the right service provider – one that is dedicated to the organisation’s success and has the people and processes to make an impact. Certainly most, if not all, service organisations say that they strive to exceed client expectations and meet the highest standards in their industry &ndash...

Judging quality and performance of video security systems by the (other) numbers

When comparing specifications among a range of similarly featured video surveillance cameras, NVRs or monitors, it can be difficult to ascertain which of the devices truly has the best performance and/or quality. John Grabowski, National Sales and Marketing Manager of JVC Security Division, poses some questions for consideration: Can the human eye actually see a difference in image quality between one camera that offers 700 lines of resolution and another that offers 600...

Adopting a multi-layered security strategy by extending the benefits of strong authentication

Enterprises have typically focused on securing the network perimeter and relied on static passwords to authenticate users inside the firewall. This is insufficient, given the nature of today’s Advanced Persistent Threats (APTs) and internal risks associated with Bring Your Own Device (BYOD) adoption. Static passwords can be a potential recipe for a security disaster. In this article Julian Lovelock, Vice President of Product Marketing, Identity Assurance HID Global expl...

Tackling the challenge of low-light imaging for megapixel cameras

Low-light imaging has historically been a problem for megapixel cameras. Arecont Vision, like other megapixel camera manufacturers, has struggled to solve the dilemma of low-light images, which are plagued by noise, smearing of video, high bit rates (requiring additional storage) and loss of colour. Arecont Vision says it now has the answer, dubbing it STELLAR technology. The “LL” in the middle of STELLAR stands for “low-light;” the entire acronym sta...

Video management software – the core of security solutions

Traditionally, security systems have been designed with the cameras in mind first then with added consideration for the infrastructure and cabling components. But this is old-school analogue thinking. Milestone Systems CEO Lars Thinggaard states that a security system can be designed for more than just protecting assets by starting with specifications for digital video management software (VMS) at the core of the solution. By thinking 'digital', an IP network video system can...

Ethernet adapters ease the migration to networked platform

PoE has redefined how security professionals design and deploy systems The migration from analogue infrastructure to networked systems continues to gain traction at a rapid pace given all the inherent benefits networked technology provides for video surveillance and security applications. However, there are costs involved and they can be significant, especially if the move to networked infrastructure requires the removal of existing wiring and the installation of new Ethernet...

Optimising Effectiveness and ROI for Physical Identity and Access Management Software

Ideal COTS solutions take cost, customisation and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronised and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...

Pelco Is "Back" with a Focus on IP video surveillance: Hervé Fages

Pelco is making its big comeback with renewed vigour and new lines of surveillance products to set it apart from the rest Working to Regain Momentum in a Changing Market: Most observers agree that Pelco lost momentum in the video surveillance market after the acquisition by Schneider Electric in 2007. Hervé Fages, senior vice president of Schneider Electric's video business, is looking to regain that momentum, guiding the surveillance giant in new directions as the mark...

VMS best practices for IP video surveillance in education

Security is a top priority in schools throughout the United States. The capabilities of IP video surveillance systems, in conjunction with Video Management Software (VMS) systems, make them one of the most popular and effective security tools available. In this article, Gadi Piran, President, OnSSI defines scope and structure of IP video and its advantages in improving school security in a number of ways including: superior image quality, ease of manipulation, integration capabilit...

Seeing success reflected in the marketplace, ONVIF expands its vision beyond video

In China and Russia ONVIF Profile S compliance is becoming mandatory for smaller systems The familiarity and widespread use of ONVIF interfaces in the market are evidence of the success of ONVIF, which was created in 2008 by three manufacturers, Axis, Sony and Bosch. More evidence of success is a growing number of new members and compliant products. All over the world, ONVIF is being embraced – in China and Russia, as examples, ONVIF Profile S compliance is becoming mand...

Genetec plans “continuous integration” approach to manage changes to cloud services

The impact of the IT department on physical security has been a source of discussion for years. Generally, the influence of IT on purchasing and technology decisions related to physical security systems has been seen as increasing with no end in sight. One industry leader thinks otherwise. Pierre Racz, president, CEO and founder of Genetec, sees the clout of the IT department waning in the age of “bring you own device,” cloud services and greater intelligence at...

SourceSecurity.com Technology Report highlights remote business management platform

A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others, the OnVu360 management platform has applications in remote business management and secur...

PPVAR advocates use of video verified alarms to increase arrests and reduce property crime

  In practice, 90 percent or more of burglar alarms are false, and studies have estimated the related arrest rate at about 0.02 percent. No wonder law enforcement responds as a low priority, if at all. In contrast, a video-verified security alarm provides the virtual equivalent of an eye-witness to a crime in progress, and responding to video alarms yields arrest rates in the double digits – 20 percent or higher. That's a thousand times higher than non-video alarms....

H.265 compression set to make a mark on IP Video Surveillance

 H.265/HEVC coding format will bring major benefits to IP video cameras offering a new level of video quality at an economic price The emergence last year of a new format for High Efficiency Video Coding (HEVC) is poised to have a huge impact on IP video surveillance cameras over the next few years. Among the benefits of the new H.265/HEVC coding format over the legacy H.264/MPEG-4 is a 40 percent or more bit rate reduction at the same visual quality. Therefore, a camera...

Positive economic outlook for security market in 2014

A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...

Fault tolerant access control for business continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...

Redefining access control with NFC-enabled smartphones

Comprehensive and robust security programmes and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Fur...

Quick poll
Which AI-powered capability will dominate in the years ahead?