Security communication - Expert commentary

Mobile and cloud technologies sharpen organisations’ emergency response strategies

There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...

How can digitally creating a building help your video surveillance project?

Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understan...

Why security customers should buy products and services from SMBs

In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're like...

Five cyber security threats your enterprise must address

By now your organisation should know the drill. To keep your enterprise safe from unauthorised access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vu...

Five best practices for protecting video surveillance systems against cyber threats

There’s no denying that cyber-crime is one of the biggest threats facing any organisation with the devastating results they can cause painfully explicit. Highly publicised cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organisations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organisation a fine of up to four...

How to optimise mobile access control authentication with smart devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...

Highlighting the importance of security integrations and alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organisations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emergi...

Physical and cyber security precautions when travelling

Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity thr...

The benefits and challenges of in-camera audio analytics for surveillance solutions

Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many state...

School security benefits from advanced communication technology

With the recent tragic events in Florida, it’s evident that schools require more tools to help ensure their students’ safety. With that, school and municipal officials all over the country are looking for more advanced ways to combat gun violence. While there is no perfect solution for the myriad of threats and emergencies with which our schools are confronted, many have looked to technology to help improve communications before, during and after incidents. For schools across the...

How artificial intelligence is aiding first responders in natural disaster relief

The year 2017 saw some of the worst natural disasters in North America, with Hurricanes Harvey and Irma wreaking havoc on Houston, Texas, and the Caribbean with force of which we haven’t seen before. While many people chose to evacuate these areas, many were left to deal with the devastation and first responders had the difficult job of assessing the damage, rescuing trapped victims and delivering food and supplies. AI-enabled drones and robotics to assess damage In addition, more than 1...

Safeguarding enterprises against cybersecurity threats is essential for the future

In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organisations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global ente...

How to prevent autonomous vehicles from being used by terrorists

In recent news, trucks, lorries and vans have been the weapon used in terror attacks around the globe, and other sources suggest that autonomous vehicles, particularly self-driving trucks and lorries, could be a reality sooner than we think. It poses the question: How can we prevent autonomous vehicles from being used as weapons in terror attacks? Accessories for terror attacks We already have ‘self-driving’ technologies in the cars which are on our roads today, from lane-departur...

Drone terror: How to protect facilities and people

The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirel...

How to predict events with intelligent fire and security systems

The security industry as we all understand it today is due for a much-needed paradigm shift. The solutions that security dealers and integrators are installing and deploying today have advanced considerably and for many, those systems do an excellent job safeguarding the homes and small businesses of their customers. However, all of those installed solutions have one inherent flaw: traditional fire alarms and security systems are only reactive in nature. By reactive, we mean that although today...

Leveraging IP network technology in the security intercom market

The transition from analogue to IP technologies has had a large impact on the ways intercoms are used in the security industry. The analogue-to-IP transition has generated a lot of attention in the camera market, and the transition is also taking place for intercoms. Twenty years ago, Axis Communications (2N’s parent company) led the industry in converting from analogue cameras and video to IP. Integrated IP system The conversion took 15 years to achieve, but the same conversion in inter...

Ergonomic standards increase control room productivity

  Ergonomics are a critical, but often misunderstood aspect of designing control rooms for security. Ergonomics have a deep impact on the integrity of an operation, and the issue goes beyond the control room furniture. Matko Papic, Chief Technology Officer of Evans Consoles, divides ergonomics into three areas: physical (reach zones, touch points, monitors); cognitive (the individual’s ability to process information without overlooking a critical element) and organisation...

Integrating security management into broader building systems

Security solutions should be about integration not isolation. Many organisations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. Gert Rohrmann, Technical Manager for the solutions division of Siemens Building Technologies UK, examines how by drawing data from a number of different sources...

Key critical thinking skills for security professionals

Successful critical thinkers are judged by results that almost always involve deliberation and intuition, logic and creativity Security and safety practitioners responding to evolving threats make decisions every day based on uncertainty, insufficient information, and too few resources for textbook solutions. Unsurprisingly, Chief Security Officers report that critical thinking, decision making, and communications skills are key characteristics for job success. But do we reall...

Top strategies for security sales representatives to boost customer engagement

  Winning full engagement from your prospects is tougher today than ever before thanks to the Internet   For months, maybe years, you’ve worked to secure an appointment with a prospective customer.  You’ve utilised your network, and shown persistence. You’ve consulted with your boss, brainstormed with your peers, and even asked for advice from your friends. You’ve given it every ounce of energy you have, and finally… finally, the...

Machine learning security systems address the limitations of traditional threat detection

The need for security convergence and shared threat intelligence is markedly increasing “Converged security” has been a buzz phrase for more than a decade, but the industry is just now starting to reap the rewards. Converged security recognises that truly comprehensive organisational risk management involves the integration of two distinct security functions that have largely been siloed in the past: information security (network operations centre or NOC) and physi...

Location-based alerting technologies to secure employees in emergency situations

Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situat...

Open standards simplify integration and enhance performance of cloud-based access control systems

The rate of adoption of mobile credentials will progress quickly, because of its exciting value proposition Cloud computing has been around for some time now, starting with the formal public Internet in 1990. But the nature of it has changed and evolved quickly and dramatically. Now, the cloud is becoming foundational to many emerging security applications, including mobile credentialing involving Near Field and Bluetooth communications, with the Internet of Things (loT) poise...

Security lapses and hooliganism dampening Euro 2016 – How will France re-structure security focus and ensure fan security?

No matter how strong the security planning, it will take only one small failure tocreate an opportunity for unimaginable events(Photo credit: Marco Iacobucci EPP / Shutterstock.com) Successful security at UEFA Euro 2016 may well depend on the ability of the French to bring cohesiveness to disparate technologies. Given the scale of the threats, a variety of security solutions are being used visibly and behind the scenes – in addition to the presence of 90,000 police, gend...

Frank Cannon to educate IFSEC attendees on employee security awareness programme

Organisations have a duty of care to protect their employees wherever they work. But in the increasingly complex world that we all live in, the ability to deliver a risk-commensurate and cost-efficient security programme that adds real value to a business is extremely challenging, according to IFSEC International 2016 speaker Frank Cannon. He will be speaking on developing an employee security awareness programme in the Security Management Theatre at IFSEC International in London o...

How adopting wireless surveillance solutions improves finance and flexibility

Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analogue cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as p...

Wireless technology attracts security installers’ attention for its reliability and cost-effectiveness

Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signalling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programming, de...

Stadium security protocols tighten amid terrorism; enhanced physical security standards improve public safety

Sports stadiums and leagues are constantly pushing for higher security standards & best practices to strengthen venues that may be perceived as "soft targets" Terrorism threats have focused the attention of sports security professionals like Paul Turner, Director of Event Operations & Security for AT&T Stadium in Arlington, Texas, on how to more effectively screen guests and ensure that fans and athletes are kept safe. It has made the sobering reality that stad...

Siklu’s millimetre wave wireless technology supports video surveillance networks with improved capacity

Siklu further expanded its presence in the video surveillance market in 2015. The company released the world’s smallest outdoor Gbps radio to address the issue of densified coverage, which results in the need for high capacity connectivity in surveillance networks – a trend that has snowballed in past years.  Growing video surveillance networks demand greater bandwidth capacity Developments in video analytics and resolutions, requiring high-quality video at the surveillance ne...

Enterprise command software integrates data sources to analyse security, business and risk profiles

The role of today’s security leader continues to evolve as they are faced with an ever-expanding risk environment that includes active shooters, crime, natural disasters, liabilities and cyber threats. Most recently, the terrorist attacks in Paris and the active shooter violence in California once again served as reminders of the threats organisations face on a daily basis.   Intelligent technologies for proactive security management Over the past year, the increased fo...

Quick poll
Which AI-powered capability will dominate in the years ahead?