Physical security - Expert commentary

Impact of the UK’s ‘Brexit’ EU referendum on European border control and other security measures

UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks o...

Why employing a software system is a smart way to enhance data accuracy and business profitability

Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labour costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...

Vehicle barrier certification sets new standards for vendors with stringent testing measures

Barriers certified by the US Department of State can be trusted to withstand specified weights and speeds This time of year, in the early spring, there pops up a plethora of trade shows in which security vendors can present their newest marvels to potential customers. Not to be outdone are the barriers manufacturers. Their products will range from a large metal planter to be placed in an area where no traffic is allowed to movable barriers which lower to let a car drive over...

Formulating background check strategies to minimise insider and post-hire threats

Employers are increasingly concerned about the risks associated with employees, temporary workers, independent contractors, and others who have the ability to wreak havoc on an organisation from the inside. This is often referred to as “insider threat.” There are numerous types of insider and post-hire threats that range from embezzlement, theft of trade secrets, workplace violence or active shooters, and everything else in between. Potential insider threats are...

Biometric solutions bridge the gap between physical and logical access control

A biometrics-embedded tablet can tag a guard upon entering the building & feed videoof what’s happening beyond secure doors as he/she moves through the facility The best way to make the case for biometrics is to consider a physical and logical access control scenario, according to biometrics vendor SRI Identity, a program from SRI International, one biometrics company. With advances in security technology, access control systems have come to play a bigger role in org...

E-passport technologies address border security crisis and ease tourism

Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-growing border security challenges “More than one bil...

Security & emergency agencies' cooperation addresses unique sports and stadium security challenges

On event days, representatives of emergency response & security agenciesare together and running sports venues as a unified group In the world of sports security, alliances are bringing together personnel and agencies that once only talked to each other during an emergency. Consider the recently announced agreement between the Security Industry Association (SIA) and the National Center for Spectator Sports Safety and Security (NCS4). This memorandum of understanding (MOU)...

Sophisticated analytics of high-definition video security systems set to drive growth in surveillance market

Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from...

Biometrics’ greater convenience and cost-effectiveness expands its applications to markets beyond security

The universe of biometric authentication applications is expanding rapidly invertical markets such as healthcare and retail Once used mostly to secure high-value government facilities, biometrics are now a basic tool used in a variety of vertical markets. This article will look at some of those opportunities. For healthcare organisations, for example, biometric authentication is being used for secure medical dispensing to streamline workflow and control drug diversion, and f...

Stadium security protocols tighten amid terrorism; enhanced physical security standards improve public safety

Sports stadiums and leagues are constantly pushing for higher security standards & best practices to strengthen venues that may be perceived as "soft targets" Terrorism threats have focused the attention of sports security professionals like Paul Turner, Director of Event Operations & Security for AT&T Stadium in Arlington, Texas, on how to more effectively screen guests and ensure that fans and athletes are kept safe. It has made the sobering reality that stad...

Physical security industry tips and best practices for recruiting and retaining top security officers

As the security industry continues to grow, recruiting must have more sophisticatedscreening and hiring processes, and a commitment to hiring quality personnel The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator correspondent, in an exclusive Q&A with Brent O’Bryan, Vice President of Training and Development for AlliedBarton Security Services, discuss the challenges that secur...

Electronic access control adoption rises as demands for mobile connectivity and building integration increase

Strong electronic access control (EAC) investments by the healthcare and education verticals were a highlight of a very strong 2015 for Allegion. The company saw double-digit growth in multiple categories for its electronics as well as continued strong growth in commercial markets, with further expansion of software provider integration of Allegion-connected devices.   Mobile connectivity & system integration nurture positive trends Demand for mobile connectivity and inte...

How are biometrics companies expanding system functionalities for better security and identification?

Facial and body behavior analytics can identify people “without interferingwith the pace of life” Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to. SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems ca...

Stratus Technologies’ everRun solution prevents downtime and data loss for critical physical security applications

Stratus Technologies is a provider of “always-on” technology, which helps to ensurethe running of mission-critical access control and video surveillance applications Building security – especially high-security installations – requires technology that is reliable and minimises downtime. In some physical security installations, access control and video surveillance solutions are required to function uninterruptedly to ensure business continuity and maint...

Security integrators push connectivity with IoT technology and global customer service in 2016

In today’s connected world, our customers are focused on streamlining operations and garnering actionable insights to help drive success across the business. Modern security systems enable security integrators to offer remote access capabilities which in turn helps businesses to improve their performance. For example, security integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, secu...

Affordable cloud-based cybersecurity subscription adds value with email alerts and 24/7 service for resellers and SMB customers

SIPcurity is a new breed of security product that is a key element of anyAdvanced Threat Protection (ATP) framework As cyber threats continue, there’s no business or market immune from malicious takeover and data compromise. Now, systems integrators have a new, cloud-based weapon in their arsenal designed specifically as an affordable monthly subscription service to prevent telecommunications attacks and takeovers directed at small to medium businesses (SMBs).  Acc...

Falling prices and open security systems see increased competition amongst security providers

Ups and downs tested the staying power of security system providers in 2015, which was a dynamic year for the security market. A key development in the security industry has been the acquisition of VMS leader Seetec by OnSSI, which has enabled it to serve customers globally. The security market in 2015 also witnessed a growing trend towards supporting diverse security systems from different manufacturers. Falling prices and increased competition On the bright side, while the economy has not ye...

Security and video opportunities to bloom amidst global threats and migrant crisis

As the world faces new threats and challenges at the end of 2015, the security market looks more and more attractive for companies and employees around the world. Digital technology increasingly is replacing a traditional physical security approach, upgrading old-school analogue alarms and CCTV. Attractive security projects From AxxonSoft’s point of view, security projects seem very attractive because they normally can bring up to 30% profit for a standard security system installation....

5 basics for implementing effective physical security

Deadly terrorist attacks on buildings have highlighted the need of a well-designedand well implemented physical security programme What constitutes a well-designed physical security programme? Deadly terrorist attacks on buildings such as the San Bernardino Administrative Centre, Riverside Countyin California., have highlight the need of a well-designed and well implemented physical security programme. S.Steven Oplinger, Chair of the ASIS Physical Security Council, outlines 5...

Terrorism drives global demand for crash-resistant barriers, barricades and bollards at embassies and consulates

As terrorism continues to rear its ugly head, we at Delta Scientific have been upgrading high-profile embassy and consulate facilities for several major counties around the world. 2015 was a strong year for us. We saw an increase in manufacturing output on our complete line of vehicle barricades and guard booths. 2016 shows no signs of slowing down.    Increased global security measures for explosive-laden vehicles  The Middle East is a particular hotbed for increas...

Security and IT convergence accelerates technology advancement and innovation

We in the industry have talked about IT’s growing influence in security technology decision-making for a number of years. This year, we have seen the trend accelerate rapidly. Significant changes are occurring in data centre infrastructure technology, creating major disruption to the large enterprise server and storage providers. This is fundamentally changing the way the security industry thinks about IT. 2015 trend – emergence of hyper-converged infrastructure (HCI) One of the bi...

ONVIF on Profile Q and A 2016 developments and promoting interoperability in the security industry

In the past year, ONVIF prepared the release of two new profiles, Profiles Q and A, which are currently in Release Candidate status, being fine-tuned by developers from member organisations. They are ONVIF’s fourth and fifth profiles, with Profile Q addressing easy set-up and advanced security features and Profile A encompassing daily tasks for access control. ONVIF also hit major milestones in 2015, reaching the 5,000-conformant product mark and maintaining a membership of more than 500 m...

Reactive to proactive - central command centres transform security capabilities for organisations

Command centres allow physical and IT security to collaborate for greatersituational awareness and responsiveness Conventional command centres focus on video and access control system monitoring. When something happens at a door, the video system reports the event to one monitor in the command centre, while the access control system reports to another monitor. It is up to the operator to imagine the possibilities, draw the right conclusions, decide on a response and, if necess...

650 ATM attacks annually in Italy call for physical security solutions that anticipate and curb heists

The proportion of failed ATM attacks is more than 50%, but the collateraldamage is high and growing ATM security providers and products can take various countermeasures to mitigate attacks on ATMs. The key is to detect an attack in its preparation phase. Speaking at ATM Security 2015 in London, Claudio Ferioli, head of physical security at Italian bank Intesa Sanpaolo, provided an overview of the current state of physical attacks on ATMs in Italy. As the largest bank in the...

Increased adoption of fingerprint based solutions, two-factor authentication to touch new high in 2016

The extraordinary global adoption of fingerprint based solutions, from mobile devices to credentials, will continue to expand and touch new markets in 2016. The trend to move away from passwords and PINs is really building momentum in logical and physical access. Widespread use of biometric security The security industry in 2015 continued to improve, along with the overall economy. Regulatory agencies are taking the lead as two-factor authentication is becoming a more mainstream concept. From...

The new face of modern security: Situational awareness through citizen engagement and social media

The nature of risk has changed, and there is a blurring of lines between cyber, physical and online security. These changes are spurring organisational changes as well. Most recently, the unexpected attacks against Paris have escalated the importance of security worldwide – and there’s an even greater focus on leveraging even more sources of information in an effort to gain greater situational awareness to react faster, more efficiently and effectively.   Changing...

Open, software-based security system crucial for dealing with changing security demands

Many security solutions available today have the problem of being insufficiently open, offering very limited flexibility. Integrating third-party products is practically impossible. Customers therefore very often have to make a long-term bet on just one vendor. Upgrading or expanding security systems is often complex, expensive and time-consuming. But the industry is changing. Initiatives like open standards and cooperation between suppliers are emerging to help companies react faster to changin...

SourceSecurity.com 2015 Review and 2016 Forecast

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.   Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...

Security industry’s top 10 mergers & acquisitions of 2015

For the second year in a row, Canon made the biggest M&A move in the security marketplace in 2015. How could Canon top the industry shockwaves it created in 2014 when the Japanese giant acquired VMS company Milestone Systems? That’s easy: They bought Axis Communications for $2.8 billion in 2015.   Although the Canon-Axis deal grabbed the most headlines and was easily the most shocking M&A announcement of 2015, it was certainly not the only big news on the mergers...

Hardening perimeter security by integrating more access control technology at entrances

At 2015 year-end, we are continuing to see a trend toward hardening the perimeter for buildings and property. I believe we are approaching a tipping point with respect to C-suite awareness of the perils of unauthorised entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organisations to take action. Role of trusted consult...

Quick poll
What's the primary benefit of integrating access control with video surveillance?