Physical security - Security beat
As my trip to London for IFSEC International ends, I can look back on three days jam-packed with new approaches, new technologies, and the best the global security market has to offer. I met people from all over the world who share an interest in physical security technology -- and how it can be used to make the world a safer place. I heard several exhibitors mention that business was slow in Europe in the early part of 2015. However, the show highlighted that R&D investment has continued t...
Time flies, and I’m sure it’s been 10 or 15 years since the term PSIM (meaning physical security information management) came into favour in our market. It was a variation on the term SIM (security information management), which in the realm of information security refers to a collection of data into a central repository for trend analysis. The idea was to apply the same concept to physical security equipment in the form of an over-arching software system that takes information from...
We’re seeing a market trend toward manufacturers seeking to provide “total solutions” rather than components. The trend is reflected clearly in recent industry consolidation, for example. When companies that manufacture various components become part of a single corporate owner, it’s not a stretch to expect the new owners to combine those components into a single end-to-end solution – sooner or later. Manufacturers are also leveraging OEM agreements and other partne...
Cybersecurity has been getting much more attention lately in the physical security market. One company ready to address cybersecurity of IP video products is DVTEL. The Israeli company’s roots in IT and networking make it a logical choice to take a lead in cyber-defence of IP video systems. DVTEL’s core research and development (R&D) in Israel includes cyber-defence expertise. DVTEL’s cyber-defence plan In fact, DVTEL is moving fast to implement its cyber-defence plan &nd...
If you’re heading to ISC West in Las Vegas this year, it’s helpful to acknowledge immediately that there’s no way you can experience all aspects of the show. Just not enough time and too many options. Once you give up on seeing everything, you can immediately lower stress. But you also raise the stakes in terms of picking and choosing exactly what you have time for – or want to make time for. Hoping to help out as we all set our ISC West priorities, here are some Ways to...
For attendees at ISC West in Las Vegas, the show each year brings together elements that are comfortably familiar with elements that are brand new, even unexpected. The U.S. security marketplace’s largest yearly gathering is an unrivalled forum for new product introductions, and the exhibition sets the stage for much that happens in the market throughout the rest of the year. The ISC West exhibit hall at the Sands Expo in Las Vegas will be open April 15-17, and education sessions will be...
Sometimes companies want to buy their physical security software separate from the servers it runs on. Other times, companies prefer to buy an “appliance” – a purpose-built machine that is perfectly matched with the software it is running. The latter category is especially popular among small- and medium-sized business customers. For example, preconfigured video management appliances contribute an element of simplicity. That’s why you see video software companies –...
Especially for younger individuals, sharing on social media is almost an automatic reflex. Bystanders at any event are likely to constantly be tweeting and/or posting real-time words, pictures and video using their smart phones. Accessing a culmination of that data can provide real-time intelligence of what’s happening on the ground at any event or location before emergency responders or police even get on the scene. There are multiple ways security can benefit from an affordable so...
Are attendees at the ASIS trade show becoming more business-savvy? Have they mastered the technology basics and moved on to more complex issues of how various products can be used to help their businesses? One exhibitor at ASIS 2014 in Atlanta says they have, and the change is impacting how the company displays its products. “Boon Edam has been exhibiting at ASIS for 15 years, and we have observed a new trend in how our customers approach us today versus just a few years ago,” says...
In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability Alliance (PSIA) is looking ahead to some new possibilities in its long-term roadmap. David Bunzel, PSIA executive director, shared with me some of the active discussions among alliance members about where the next wave of interoperability initiatives may lead. Integration of wireless locks is at the top of the list, a response to the growing and...
When Apple makes a new product announcement, the whole technology world takes note. Such was the case last week when the tech giant introduced its sleek and shiny new iPhone 6 and iPhone 6 Plus. Almost as an encore, the company also unveiled the stylish and versatile Apple Watch, which will be available in early 2015. We have all seen the impact of mobile devices on systems and technologies used in physical security, so any new smart phone products have the potential to impact our market. In th...
We don’t usually write about cybersecurity on this site, but it’s obviously part of the bigger picture. Always looking to learn more, last week I logged onto the GovDefenders Cybersecurity Virtual Event, sponsored by DLT Solutions, a technology reseller to the public sector. There were several interesting “sessions” during the day – I managed to “tune in” a couple of times off and on. Listening to one session in particular reminded me of how much the ph...
From being a buzzword today, Big Data is poised to have a large impact on the physical security market with numerous practical applications in preventing and fighting crime. I’ve been hearing a lot about "Big Data" and its impact on the physical security market. Wikipedia tells us that Big Data involves using larger and larger sets of data points to find correlations that can “spot business trends, determine quality of research, prevent diseases, link legal citations, combat crime,...
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download