Physical security - Expert commentary
Uncoupling software from hardware allows manufacturers to respond faster to changes Nedap Security Management 2014/2015 Review and Forecast:Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. External factors such as these do provoke change in physic...
With a growing threat from home-grown terrorists, there will be a greater need to protect soft targets as well as to use portable barriers Delta Scientific 2014/2015 Review & Forecast:In 2014, hard targets, such as government facilities, airports, refineries and similar installations continued to boost sales for Delta Scientific by protecting themselves from car- and truck bombers using crash-rated vehicle access control equipment including bollards, barriers, barricades a...
Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilise the organisation’s full IT infrastructure, which...
Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillanceas it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...
A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base of legacy systems presents opportunities and obstacles for providers of newer access control systems. Most end users would prefer not to do a full rip-and-replace upgrade. Therefore, integrators (and manufacturers) have to find a smooth transition path. Access control customers eager to embrace the newest capabilities on the market are ofte...
Security standardisation reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...
Cybersecurity is a critically important aspect in today’s increasingly IP-driven world of physical security The physical security market tends to dismiss issues of cybersecurity as outside its area of expertise, but cyber-threats are a problem that has been ignored for too long. The fact is, cybersecurity is a critically important aspect of the systems our industry provides in the increasingly IP-driven world of physical security. And the risk isn’t just reserved...
If a security or video surveillance / CCTV system isn’t working, who’s to blame? Or more to the point, what’s to blame? Is the problem the malfunction of a specific device on the edge of the IP network, or is it a network or other system failure? How can an end user or dealer / installer know what the problem is? How can a camera manufacturer know if a call to their overworked tech support department is really about the manufacturer’s camera or cau...
Law enforcement and pure problem-solvingskills will play less of a role for the futuresecurity director Much effort has been put down in the professionalisation of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalisation and academisation of security practice as well as a recently updated standard (ANSI/ASIS...
In the digital world, people own personal information just like they own physical assets such as cash, keys and clothes in the real world. But because personal information is intangible, its value has been overlooked by many for a very long time. With the increase in cyber crimes on personal data and the infamous Snowden affair, this issue has become more prominent. Fei Liu from Nedap Security Management Research & Development informs that to improve the transparency of data collection and p...
Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go about their business with relative ease. In this article, Ajay Jain, President and CE...
On April 16, 2013, snipers fired for 19 minutes on PG&E Corp.'s Metcalf electric power transmission station near San Diego, California, knocking out 17 giant transformers that supply electricity to Silicon Valley. At least 100 rounds were fired from at least one high-powered rifle. The power grid was rerouted to avoid a blackout, but it took 27 days to make repairs and get the substation back up and running. The incident got the attention of regulators and security prof...
Ideal COTS solutions take cost, customisation and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronised and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...
In China and Russia ONVIF Profile S compliance is becoming mandatory for smaller systems The familiarity and widespread use of ONVIF interfaces in the market are evidence of the success of ONVIF, which was created in 2008 by three manufacturers, Axis, Sony and Bosch. More evidence of success is a growing number of new members and compliant products. All over the world, ONVIF is being embraced – in China and Russia, as examples, ONVIF Profile S compliance is becoming mand...
IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world,...
The requirements of a physical security solution for a multi-building campus are quite different from those for the security of a single building. Gadi Piran, President of OnSSi, lists the immense potential and benefits of implementing an integrated security solution and the key characteristics of an effective solution. Multi-building campuses such as universities, research facilities, convention centers and hospitals face unique problems in implementing a total physical security s...
An integrated security system needs to fulfil user's security objectives and needs To meet a user’s specific needs, a truly integrated security solution must include video surveillance and other security systems on a single platform. Although this is a high criteria for any system designer to meet, it is now becoming increasingly possible. Integration solutions require a commitment and expertise on the part of systems integrators as well as security product manufacturers...
An automated key control system bridges the gap between mechanical and electronic access control systems The vast array of doors, entrances and restricted areas securing semi-public locales are increasingly demanding the need for effective and easy access control management. In this article, Fernando Pires, VP Sales and Marketing at Morse Watchmans, highlights the effectiveness and convenience offered by automated key control systems that have narrowed the gap...
Video analytics enables security teams to take action as soon as incidents occur Video analytics can boost security efforts by automatically alerting personnel to take action when a security event occurs. Intelligent sensors never tire, can cover large distances and “see” what the eye would miss, even in absolute darkness. Based on such intelligent analytics, people can make smart decisions when actual violations happen. John Romanowich, CEO of SightLogix believes...
Poorly maintained environments send messages that undesirable behaviour will be tolerated Crime prevention is not solely the job of locks on doors or security cameras scanning entranceways. The makeup of a physical environment can influence where crimes are committed. That's why Crime Prevention Through Environmental Design (CPTED) should be an essential component to the crime prevention strategy of any building or area. In this article ASSA ABLOY Future Labs ...
Examining the road to convergence The use of Internet Protocol (IP) in the security industry is increasing but little is known about the relationship between end users and the merger of traditional physical security and IT otherwise referred to as convergence in the security trade press. Markus Lahtinen of the LUSAX project examines the growth of convergence in the security industry and discusses complexities of this relationship. The LUSAX project at Lund Universit...
In this article, Mike Bluestone considers the challenges facing internal auditors in light of the recent scourges of terrorism, binge drinking and drug use, and proposes eight principles of security. Internal auditors are inevitably engaged in an ongoing challenge to uncover intellectual wrongdoing of varying kinds. The 'fail-safe' measures practised and implemented by them frequently reveal failings and intentional wrong doing - by employees and others - in both the public...
Steve Hunt, President of 4A International, discusses some of the challenges associated with integrating physical security and IT and offers some practical solutions. A chief financial officer recently told 4A International that in one month he received two purchase order requests that he could not approve. One came from the security department for an €1 million upgrade to the access control infrastructure to manage people and their privileges to corporate assets....
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download