Radio frequency Identification - Round table discussions
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages of AI and machine learning (ML) also include automating repetitive tasks, analysing vast amounts of data, and minimising human error. But how do these benefits apply to the physical security industry, and is there a downside? We asked this week’s Expert Panel Roundtable: What are the benefits,...
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biom...
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security...
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roun...
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked th...
Deployed across a wide range of devices, the Internet of Things (IoT) collects data to help business owners make decisions on a macro scale as well as at a granular level. The IoT is a network of physical devices embedded with sensors, software, and network connectivity that allows them to collect and share data. We called on this week's Expert Panel Roundtable to comment on the intersection of the IoT and physical security. We asked: How is the Internet of Things (IoT) increasing the effectiven...
Analogue video cameras are still used in a variety of applications, primarily because yesterday’s robust and flexible technology is still functioning today, although it has been years, or even decades, since the initial installation. In many cases, this past generation of security cameras is still reliable and effective. Embracing an installed base of analogue cameras is often the most cost-effective approach when updating or expanding a surveillance system. But what about the futur...
Sharing data between security and building management devices can provide a route to maximise building usage and minimise costs. In today's Internet of Things (IoT) environment, tying together a variety of systems is easier than ever. For an update, we asked this week's Expert Panel Roundtable: What are the benefits of integrating security technology with building management systems (BMS)?
Time flies in the busy world of security, so it’s no surprise that the midpoint of 2023 comes before know it. Let’s pause after the first half of the year to look ahead at what can expect during the second half (Hint: It’s all about AI). We asked this week’s Expert Panel Roundtable: What will likely be the most important technology development in the security marketplace in the second half of 2023?
Risk is a core concept in the practice of physical security. However, the risk is not always assessed effectively. Ideally, an organisation's appetite for risk guides its security strategy and action planning to the minutest detail, including buying decisions for security equipment and systems. We asked this week's Expert Panel Roundtable: How does the concept of risk influence buying decisions in the security market?
A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in recent years as manufacturers have stepped up to meet the cybersecurity challenges and awareness of the issue has become much higher. We asked this week’s Expert Panel Roundtable: What's new in cybersecurity for physical security systems?
Environmental, social, and corporate governance (ESG) standards in the broader marketplace reflect a growing recognition that business needs to lead the way in addressing a range of environmental and social issues. Environmental concerns, especially as they impact climate change, are a familiar facet of business life. In addition, social concerns include human rights and equity; basically, an organisation's relationships with people. Governance refers to the structure of rules, practices, and pr...
Every security system is unique, of course. Specific to each installation are the problems the customer and the integrator may experience along their journey. However, given the installation of hundreds of physical security systems, there are commonalities that occur. We asked this week’s Expert Panel Roundtable: What are the major pain points when installing a physical security system?
The return of trade shows has been an invigorating development for the security market. The morning-after reviews of this year's shows could not have been more positive. Everyone in the industry seemed to revel in the excitement and momentum as the shows decisively proclaimed: 'We're back.' Continuing that momentum into the future will depend on how well the shows adapt to changing industry trends and repeatedly reinvent themselves to be better every year. Adding feedback from GSX to our earlier...
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video sy...
Challenges of the global supply chain have reverberated into the physical security marketplace in a big way in recent years. Dealers who historically could count on timely delivery of equipment have instead faced extended delays that in some cases have jeopardised their businesses. By most accounts, the situation is improving, so we turned to our Expert Panel Roundtable for an update. Our question this week: What is the current state of the physical security supply chain?
The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?
Some systems and assets are so vital that their incapacity or destruction would have a debilitating impact on security, economic security, public health or safety, or any combination of those factors. This so-called critical infrastructure has historically faced many complex threats. In 2023, we can add growing concerns about cybersecurity to the mix. We asked this week’s Expert Panel Roundtable: What is the largest risk to critical infrastructure in 2023? How can we address it?
A multi-factor authentication is a layered approach that requires users to provide two or more verification factors, such as credentials, to gain access to data and applications. If one of the credentials is compromised, the thinking goes, an unauthorised user will still be unable to meet the second authentication requirement and will be denied access to a targeted physical space, computing device, network, or database. Cybersecurity applications have long embraced the idea of MFA, which is also...
Since they were invented, video surveillance cameras have been used mostly for security applications. However, the advent of video analytics and artificial intelligence (AI) has paved the way for use of video data in a variety of other applications, from process control to measuring occupancy to analysing customer traffic trends. The ‘data’ aspects of ‘video data’ are feeding many new applications that no longer involve operators looking at video images on a screen. We as...
The holiday season is marked by festive spirit and family celebrations, but it is also the busiest time of year for retailers. Busy shoppers willing to spend money are an upside to the holiday shopping season, and many businesses depend on the holiday rush as a critical element to having a successful year. A downside of a busy holiday season is an increase in retail security threats including shoplifting. We asked this week’s Expert Panel Roundtable: How can technology address loss prevent...
Obtaining needed funding for security technology improvements often requires going to senior management with a hat in hand. But requests for more security funding from the C-suite may fall on deaf ears unless a security professional can make a compelling case for the needed expenditures. It starts with learning to speak in terms that resonate with upper management and also involves carefully analysing the benefits of security investments to the broader enterprise. We asked this week’s Expe...
Integration of access control and video has been a reality for decades. The combination of our industry’s dominant technologies provides a one-two punch when it comes to maximising the security benefits of a system. Access control tracks ‘events,’ while video provides visibility into those events. But the benefits of integrating video and access control are far from static. Rather, today’s systems are becoming even more valuable as they incorporate elements such as artifi...
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry...
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than done, and mobile credentialing, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in various vertical markets. We asked this week’s Expert Panel Roundtable: What are the latest developments in mobile acce...
The security trade show season is resuming this fall with the GSX show in the United States and Security Essen in Germany, among other upcoming industry events. The return of trade shows is gathering momentum following the COVID lockdowns and cancellations with plenty more shows coming soon. But how useful is attending industry trade shows? We asked this week’s Expert Panel Roundtable: What do you accomplish by attending a security industry show?
With fewer employees working in the office, and more of them working from home, it is no longer necessary for each employee to have their ‘own’ desk. Rather, desks may be used by various people at different times, as needed on an ad hoc basis. This arrangement, known as ‘hot desking,’ maximises space efficiency and reduces unneeded office space. We asked this week’s Expert Panel Roundtable: What will be the impact of ‘hot desking’ on the security marketp...
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download