Security devices - Round table discussions
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in...
The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?
Some products may become obsolete faster than others, while some may have a longer life span due to ongoing innovation and demand. Technology and security threats are continuously evolving, and older security systems may no longer be effective in protecting against the latest threats. Additionally, older systems may have outdated technology, making them more vulnerable. We asked this week’s Expert Panel Roundtable: Given rapid technology development, are the lifecycles of security sy...
The economic outlook for the year ahead is uncertain at best. Multiple lingering issues are in play, such as inflation, supply chain challenges, global instability, and a changing workforce. But to what extent does a shaky economy equate to a slowdown in the security market? We asked this week’s Expert Panel Roundtable: How does the wider economic climate impact the market for security products and services?
Some systems and assets are so vital that their incapacity or destruction would have a debilitating impact on security, economic security, public health or safety, or any combination of those factors. This so-called critical infrastructure has historically faced many complex threats. In 2023, we can add growing concerns about cybersecurity to the mix. We asked this week’s Expert Panel Roundtable: What is the largest risk to critical infrastructure in 2023? How can we address it?
There’s always more to talk about in our Expert Panel Roundtable discussions, and we appreciate the variety of opinionated responses offered throughout the year. Looking back at 2022, we found several random and uncategorised Expert Panel responses that were not previously published. We have rescued these responses from our cutting-room floor and present them here in the interest of generating even more discussion.
A multi-factor authentication is a layered approach that requires users to provide two or more verification factors, such as credentials, to gain access to data and applications. If one of the credentials is compromised, the thinking goes, an unauthorised user will still be unable to meet the second authentication requirement and will be denied access to a targeted physical space, computing device, network, or database. Cybersecurity applications have long embraced the idea of MFA, which is also...
With 2023 well underway, it’s a good time to look back on what we learned in the tumultuous previous year. In the security marketplace, there was no shortage of technology developments and a few challenges that kept 2022 interesting, to say the least. But what can we learn from the past? We asked this week’s Expert Panel Roundtable: What changes had the biggest impact on the security marketplace in 2022?
Some trends in the security marketplace continue for several years, while others come and go quickly and are soon forgotten. Scrutinising a trend’s expected lifespan can help predict its impact on the marketplace. Trends that evaporate seemingly overnight are not useful for the greater good, and they can also distract customers from more enduring subjects. Unfortunately, sometimes hype is just hype. We asked this week’s Expert Panel Roundtable: Which new security trend do you think w...
From lodging to food service to event planning to tourism, the hospitality market faces a large and growing range of security threats and challenges. Given the competitiveness of the market and the heightened flow of information about customer satisfaction via social media, there is more at stake than ever as hospitality professionals seek to ensure the safety and security of guests. We asked this week's Expert Panel Roundtable: What security challenges are impacting the hospitality market of to...
For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protecting access to computer systems. Nowadays, newer, more sophisticated forms of user identification and authentication have emerged on the scene. We asked this week’s Expert Panel Roundtable: Is the password on the brink of extinction in physical security? Why or why not?
Since they were invented, video surveillance cameras have been used mostly for security applications. However, the advent of video analytics and artificial intelligence (AI) has paved the way for use of video data in a variety of other applications, from process control to measuring occupancy to analysing customer traffic trends. The ‘data’ aspects of ‘video data’ are feeding many new applications that no longer involve operators looking at video images on a screen. We as...
The holiday season is marked by festive spirit and family celebrations, but it is also the busiest time of year for retailers. Busy shoppers willing to spend money are an upside to the holiday shopping season, and many businesses depend on the holiday rush as a critical element to having a successful year. A downside of a busy holiday season is an increase in retail security threats including shoplifting. We asked this week’s Expert Panel Roundtable: How can technology address loss prevent...
Connectivity is literally the difference between products operating individually and those combined into a more powerful system. Many of the devices that connect today’s security products reflect mature technologies that have been proven over time. However, innovation is also driving the need for new approaches to connectivity and networking. We asked this week’s Expert Panel Roundtable: What are the new developments in networking and connectivity for security?
Machine learning refers to the evolving ability of computer systems to learn and adapt without following explicit instructions. It essentially involves the use of algorithms and statistical models to analyse and draw conclusions from patterns in data. In the security industry, when it comes to buzzwords, artificial intelligence (AI) has a higher profile than the more specific related term, although machine learning is a better description of tools that are gaining popularity in physical security...
How has the security end user’s ‘buying journey’ changed in the age of the Internet? If nothing else, the online age has simplified access to information about various security products and systems. However, easily accessible information could enable a customer to delay contacting a manufacturer or systems integrator until further along the decision-making process. We asked this week’s Expert Panel Roundtable: What role should the Internet play when customers are research...
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry...
Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than done, and mobile credentialing, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in various vertical markets. We asked this week’s Expert Panel Roundtable: What are the latest developments in mobile acce...
Generally speaking, security becomes a topic of conversation among the general public only after something bad has happened. The context in these situations is: What went wrong? Largely absent from awareness by the public at large is how often things go right; that is, how often security systems work as intended to avoid expensive or even deadly consequences. We asked this week’s Expert Panel Roundtable: How can the industry communicate the value of security to the public?
Robots have been used in security patrol applications for decades, although developments in artificial intelligence (AI), video analytics, sensors and communications are expanding robot capabilities to new heights. Suddenly, robots are the latest thing in security. In addition, drones have become ubiquitous for numerous applications, including security. We wondered how well the security industry is embracing these newer technologies. We asked this week’s Expert Panel Roundtable: What impac...
The security trade show season is resuming this fall with the GSX show in the United States and Security Essen in Germany, among other upcoming industry events. The return of trade shows is gathering momentum following the COVID lockdowns and cancellations with plenty more shows coming soon. But how useful is attending industry trade shows? We asked this week’s Expert Panel Roundtable: What do you accomplish by attending a security industry show?
PropTech (property technology) is a term that describes electronic tools used in the real estate industry. It’s a buzzword that has made its way into the physical security industry, often in connection with access control. For the latest insights on the trends of security in PropTech, we asked this week’s Expert Panel Roundtable: What is the role of security as property technology (PropTech) transforms the real estate market?
With the worst of the COVID pandemic’s impact behind us, most would agree that the security industry was transformed by the interlude, as were most other elements in our society. But what will be the lasting impact on the security market – positive or negative? We asked this week’s Expert Panel Roundtable: Is post-pandemic security more effective than pre-pandemic security? How?
Security is critical in the government sector, as much as any other vertical. Successful systems must promote public safety while also facing onerous requirements when it comes to cybersecurity. From a global perspective, the world seems less safe than ever before, suggesting an even greater role for security technologies. We asked this week’s Expert Panel Roundtable: How can security address the challenges of the government market?
Six months can go by in the blink of an eye. In 2022, it almost seems as if it has. Here we are already at mid-year after what has been an eventful six months for the security marketplace. There is still a lot ahead in 2022 for the industry, and our Expert Panel Roundtable has been considering what the coming months might hold in terms of technology change. We asked this week’s panelists: What will likely be the most important technology development in the security marketplace in the secon...
The Metaverse sounds like the plot of the latest summer action movie. In reality, it’s a technology - or, more accurately, a group of technologies - that will likely have a transformational impact on a host of markets. For security, the Metaverse has an extensive list of needs. It also presents some opportunities. We asked this week’s Expert Panel Roundtable: What does the Metaverse mean for security?
The Internet of Things (IoT) is driving innovation in the security marketplace, just as it is in almost every other market. IoT devices, also known as ‘edge devices’, provide sensing, processing ability, software, and other technologies to connect and exchange data. The most common edge devices in the world of IP security are video cameras, which are becoming more intelligent and capable of processing the data they collect. We asked this week’s Expert Panel Roundtable: How are...
The buzzwords in security provide a decent parallel to the technology advancements in our industry. Over the years, our language has evolved to encompass new concepts that have transformed our business. Buzzwords can sometimes be dismissed as overblown compared to the current state of the technology, or even as marketing hype. But the language we use to describe the industry’s technologies often reflect our changing marketplace. Sometimes the challenge is keeping up with the latest buzz. W...
The price of a security system and the value it provides are two different things. For end users, the objective is to minimise price, while maximising value. A system may both have a higher price and provide greater value, but not always. Because customers want to pay as little as they can, it is necessary to make a case that a system provides the best possible value, whatever the cost. We asked this week’s Expert Panel Roundtable: How can customers go beyond price to maximise the ‘...
The advantages of security systems as forensic and investigative tools are well understood and demonstrated in the market. However, the new trend is toward systems that are useful in real-time and that even predict a security event, before it happens. We asked this week’s Expert Panel Roundtable: Which security systems are becoming more proactive than reactive?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download