Physical security - Security beat

Intelligent video surveillance and deep learning dominate MIPS 2018 agenda

Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world."    Science fiction becomes reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie Th...

Why security industry companies need to adapt to retain skilled personnel

A downside of our thriving economic times is a shortage of skilled personnel to work in the physical security marketplace. Strong economic growth translates into a low unemployment rate, and greater competition among employers to attract the best talent. The field of cybersecurity, in particular, is seeing a serious talent shortage, but any physical security company can also attest to our own challenges finding and keeping the best talent; not to mention the obvious - that cybersecurity is now...

How Qognify’s Extend uses 'human sensors’ to enhance situational awareness

Qognify’s security management systems compile information from a variety of sensors to provide situational awareness, and now they can leverage the benefit of a different kind of sensor, what the company calls the “human sensor.” Employees see and hear a lot of information during their work day, and some of it has an impact on security. Now that information can become part of an integrated security system, reported by trusted employees through a smart phone app. Qognify&rsquo...

Security professionals avoid costly breaches with encrypted USB drives

A USB drive from Heathrow Airport, found on a London street in late October, contained confidential information about accessing restricted areas at the airport and security measures used to protect the Queen. The drive also contained a timetable for anti-terrorism patrols at the airport and documentation of the ultrasound system used by Heathrow security to check perimeter fences and runways for breaches. The data was not encrypted, and the London resident who found it turned it over to a newspa...

How UL helps security manufacturers comply to cybersecurity standards

Cybersecurity is a growing concern for manufacturers of life safety and security products, and Underwriters Laboratories (UL) wants to help solve the problem. Specifically, UL seeks to work with manufacturers to up their game on cybersecurity and to certify compliance to a minimum level of cybersecurity “hygiene.” UL cybersecurity certification UL is a familiar brand in consumer goods and in the security and life safety markets. UL certification is sought by manufacturers in a ran...

Cybersecurity and artificial intelligence key security themes at ASIS 2017

As the dust settles after ASIS 2017 in Dallas, most agree it was a good show. It was different in some respects from previous shows, but several of the changes seemed to work well. Launching the exhibition on Tuesday instead of Monday was a big hit, and who could fault the idea of happy hour drinks on the show floor? Attendance may not have broken records, but end user VIPs were among the crowd, and foot traffic held up fairly well, even on the final, shortened day. STANLEY Security virtual re...

ASIS 2017 hot topics: Digitising building systems, cybersecurity and cloud services

End users at ASIS 2017 in Dallas may feel overwhelmed by all the new technology on display, but often their integrator partners can offer a helping hand. Traffic continued through much of Day 2 of the ASIS exhibition, but the foot traffic appeared to slow considerably as the day wore on. Convergint seeks closer manufacturer relationship Integrators are prominent at ASIS and play an important role connecting end user customers with manufacturers' products that meet their need. "We are taking t...

HID Global introduces cloud-based card issuance at ASIS 2017

We can add another technology category to those aspects of the physical security market on the verge of being changed by cloud technology. The new category is the printing and encoding of ID cards. HID Global is adapting the benefits of cloud computing to the ID card printing market with the introduction of HID Fargo Connect, a cloud-based personalisation and issuance system for ID cards. The new cloud approach, which will be introduced at the ASIS 2017 show in Dallas, converts standalone card...

How NERC/CIP compliance is boosting US power grid security

Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. Much of the current concern about securing electrical substations in the United States originated in response to a 2013 sniper attack, us...

Deadline looms for companies to comply with EU Data Protection Regulation

The European Union has spelled out specific requirements and safeguards for handling and protecting personal data. In the General Data Protection Regulation (GDPR), the EU makes clear exactly what is expected of those who control and process data. (The United Kingdom has committed to follow the regulation despite the Brexit vote.) Everyone is facing a deadline on May 25th 2018 to comply with the GDPR. What are the exact implications for the physical security market? What do customers need to do...

IFSEC 2017 Day 1: Trade show highlights changing security needs in Europe

Has there ever been a better time for a security trade show in Europe? Shifting threats such as terrorism and a volatile political climate serve as reminders every day of the importance of security in our lives, and even the role of technology. IFSEC opened in London on Tuesday at the ExCeL centre, covering every aspect of security, from access control and video surveillance to home automation and perimeter security. Amid sweltering heat, attendees came to find the latest-and-greatest innovatio...

Diving into AI and deep learning at NVIDIA’s San Jose Conference

A technology poised to transform the physical security market is deep learning, which is a neural network approach to machine learning, differentiated by an ability to train using large data sets for greater accuracy. In effect, the system “learns” by looking at lots of data to achieve artificial intelligence (AI). Phases of deep learning I heard a lot about AI, including how it can transform the physical security marketplace, when I attended NVIDIA’s GPU Technology Conferenc...

ARA’s asymmetric sensor approach adds focus to perimeter security

Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...

CodeLynx adapts Microsoft HoloLens headset for security systems on the go

“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual devices and controls In effect, a s...

NVIDIA Jetson TX2 GPU: Greater intelligence and computing power at the edge

Several of the hot trends in the physical security industry – robots, drones, video analytics – have one thing in common: The need for greater intelligence. More complex physical security systems that incorporate artificial intelligence, deep learning, speech recognition and other sophisticated functions depend on a higher-than-ever level of computing power inside embedded devices at the edge. Graphics processing unit Graphics processing unit (GPU) manufacturer NVIDIA is empowering...

Physical, cyber and network security enable Recovery Point’s business continuity services

What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large,...

CES 2017: Will consumer electronics transform the physical security industry?

Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they want their smart home systems to perform. We have heard the Internet of Things (IoT) buzzword in our market, and it is also a major force in the changing consumer electronics arena. Because consumer electronics are increasingly tied in with security, many in our industry keep a close eye on developments at the huge Consumer Electronics Show...

ASIS 2016 Day 2 highlights: New product releases, technology innovations & data

The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is plenty of technology to see at this year's show, and many exhibitors now say the products they were talking about last spring are now ready to ship. On Day Two of the show, it seems a lot of the attendees are ready, too. Video camera technology The technologies of video cameras march on, and Hanwha Techwin America has embraced the new H.265 cod...

User experience: How well does physical security measure up?

I’ve been hearing a lot of talk lately about the “user experience” or UX. UX is a techy term that refers broadly to how a customer uses a product, including both how the product operates and hundreds of other factors that can enhance – or conversely, can detract from – how a customer perceives and experiences a product. In SourceSecurity.com’s world of digital publishing, an optimum user experience is the Holy Grail. How a user experiences digital media, h...

IFSEC day 2: Integration and total security solutions stand out

Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasi...

AMAG focuses on "operationalising" security technology and good customer outcomes to re-invent themselves beyond access control

It seems every company is seeking to re-invent itself in our changing market. A case in point is AMAG, which has long been associated with access control. Today, AMAG’s proposition to the market is much broader than that, now also encompassing Symmetry CONNECT, a policy-based platform providing safety, security and risk management capabilities enabling organisations to manage their enterprise security functions. This spring, AMAG is introducing Symmetry GUEST, a new identity management sys...

ISC West day 1 sees large crowds exploring product releases, cybersecurity and security technology education

ISC West was hopping on its first day, with crowded aisles, packed booths and plenty of news to share. Much of the news consists of product announcements resulting from the rapid pace of technology development in the physical security market. It was enough to cause sensory overload. Educating integrators and end users about security technology Technology is moving so fast that it’s understandable integrators, not to mention end users, might struggle to digest it all and apply it to their...

ISC West 2016 to centre around big data, IoT, social media, and integration

ISC West is on the immediate horizon, and I asked several industry players what they expect new and different at the industry’s big show. The answers included buzz-worthy topics from Big Data to the Internet of Things, but also mention of a perennial industry theme – integration. Video embracing social media? Tom Chamard, Executive Vice President of Sales, Salient Systems, expects social media to emerge as a larger topic of interest at ISC West, especially considering how social...

Big Data in the physical security market – an overlooked opportunity for end users

Access control and video systems have always yielded a lot of data, although historically much of it has been stored on hard disk drives and later overwritten and/or dumped. A new trend is to compile that data over time, organise it, analyse it and then use it to provide insights into how the enterprise operates. Analysing data from different sources and departments It’s part of a trend called Big Data, but so far its use in the physical security market has been limited. One company tha...

Aftermath of the Paris attacks highlights required tradeoff of privacy in counter-terrorism

Second guessing is to be expected in the wake of terrorist attacks like the recent tragedy in Paris. After such attacks, security and intelligence professionals are prone to soul-searching – and to speaking out on the public airwaves –to address important questions: Could we have prevented it? What should we have done?  There tend to be two categories of second-guessing. The first centres on the idea that the intelligence community should have known about the planned attack and...

Cyber-vulnerability of physical security systems: Lessons from 2008 Turkish pipeline explosion

Discussions in our industry about cyber-threats to physical security systems, including IP video, often centre around hypotheticals. How might a hacker gain access to a video camera feed? How might he or she enter the larger enterprise system through a software vulnerability related to physical security? We all know assessing threats often involves considering the hypothetical, of course, but we should also seek to learn from actual events in the past. In relation to vulnerabilities of video su...

School crisis management times reduced by Sielox Lockdown Status System

In a school security lockdown, teachers typically display red or green cards on the doors or in the windows of their classrooms. The manual procedure uses red cards to alert to a crisis condition; green cards designate that everything is safe inside the classroom or office. Colour-coded crisis management system Physical security company Sielox has adapted the idea of using a colour scheme to characterise an emergency situation into its electronic security system. CLASS [Crisis Lockdown Alert S...

Realising the impact of Internet of Things (IoT) through a futurist’s gaze

As a “futurist” for lock manufacturer Allegion, Robert C. Martens says he is “part strategist, part predictor” – looking at megatrends, current events, technology changes, and how those changes impact Allegion’s business customers and partners. Spanning both the commercial and residential businesses, Martens considers various scenarios for business leaders and partners, specifically regarding where technologies and electronics are going. Today, he spends a lo...

Viscount Freedom access control system disrupting physical security market

Viscount Systems’ Freedom access control now secures the U.S. Department of Homeland Security, which uses the physical security system in dozens of field offices of Citizenship and Immigration Services (USCIS), the department’s largest agency. (Tentative plans by President Obama call for the number of USCIS sites to increase ten-fold.) For many access control companies, government business is difficult to win and may even prove elusive. It’s ironic, then, that Viscount’s...

Role of security integrators in the Internet of Things era

Where do traditional security dealer/integrators fit in the new era defined by the Internet of Things (IoT)? According to Robert C. Martens, Allegion's Futurist and Director of Connectivity Platforms, there is no need to worry. In fact, there is potentially a huge role for traditional security integrators to play in the IoT age. His explanation suggests a successful future for security integrators, but there are caveats. Networking IoT devices may seem like an information technology (IT) funct...

Quick poll
What is the most significant challenge facing smart building security today?