Security monitoring system - Expert commentary

Protecting cultural and hospitality venues from terrorist attacks

Cultural and hospitality venues are attractive targets for terrorists due to their public accessibility Over the past 40 years there have been numerous attacks carried out against cultural and hospitality venues in the furtherance of religious, ideological, criminal or political beliefs. By default, cultural and hospitality venues are attractive targets for terrorists due to their public accessibility, the volumes of visitors and guests or because of what the venue represents;...

Innovation and Internet of Things to influence 2017 security market

Continued consolidation and price pressures were factors in 2016 in the security market, which grew as expected.However, there is still interesting innovation being developed to further the market, such as the industry’s first PTZ with laser focus, says Fredrik Nilsson, VP, Americas, for Axis Communications. “While the video surveillance market is getting close to being 100% converged over to IP, there are many other IoT markets that are early in the cycle of convergence, such as int...

Edge analytics and cybersecurity key trends in 2016

The past year has seen growth in the deployment and use of edge analytics, plus a significant emphasis placed on robust cybersecurity. The expectation for 2017 is that these two trends will continue to be a driving factor for value-based decision making of large, influential customers. IP camera product lines from reliable and well-regarded brands that include edge analytics and offer a trusted, secure platform will be at an advantage over those that don’t. Looking back at the expectation...

Improving security decisions by identifying red flags and operational inefficiencies through advanced analytics

Access levels of individuals based on their roles can be cross compared with their normal access patterns, it is also useful to look for anomalies in device behaviour Threats to an organisation’s physical and logical security are increasing in number and financial impact, according to several recent surveys. To combat this problem, security and IT professionals are fighting back with system upgrades and software solutions including advanced analytics. Using the analytics...

Extenders convert media for longer video distance runs

IP/PoE systems eliminate the need for local power, thus saving installation costs Cost considerations are an important reason to use existing installed cable as part of a new system infrastructure. Extenders in the form of media converters can help. For almost three decades, video surveillance systems existed in the form of analogue systems. Video coaxial cable was the primary method of transmission with a limited distance of about 750 feet. Analogue systems required separate...

Central stations: The key to DIY security systems for small dealers

DIY—the fastest-growing segment of the residential alarm market—has evolved from a niche trend into a major event in which the big dealers are “in” but the small dealers are not. But the good news is that new partnership programmes emerging from central stations are levelling the field so that even the smallest dealers can get themselves an “in.” Why board the DIY train in the first place? It’s become clear the DIY craze is here to stay, with capital in...

How adopting wireless surveillance solutions improves finance and flexibility

Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analogue cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as p...

Benefits and challenges of omnidirectional cameras in video surveillance market

As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...

ISE emphasise need for improved hospital security programme to avoid attacks on specific targets

ISE’s research shows that healthcare facilities & hospitals security programmesto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security programme can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see...

New technologies empower visitor management systems to improve physical security efficiency and cost-effectiveness

Access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical sec...

ISC West 2016: Physical security industry focuses on incorporating audio, video and other safeguards in an integrated approach

Access control now includes a strong focus on the data integration side ofthe business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...

Adopting smart security operational methods for greener businesses

Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...

Merit LILIN highlights Middle East focus and innovative upcoming products in the Year of the Monkey

According to Merit LILIN, the UAE will be a thriving new and potential market in 2016since Europe’s economy is still sluggish The global Chinese community recently welcomed the year of the Fire Monkey with a two-week celebration, concluding with the lantern festival at the end of February. According to Chinese astrology, we are now in the year of the Fire Monkey. What’s in store for businesses around the world?  Global economic growth is predicted for the ye...

The rise of specialist distributors and smart strategies disrupting the traditional security distribution market

The established security distribution channel is being disrupted by a new trend towardsspecialist distributors – who offer more a more focused range of products andsupport services In the last 10 years a lot has changed within UK security distribution, but on the surface everything would appear to be the same. The top two distributors remain the same, despite creditors at one and talk of a looming sale at another. However, they’re operating with a slightly reduced...

Regulator highlights public safety risks due to lack of security officers' training in Australia

Poor quality training, poor literacy and numeracy skills and inadequatesupervision were some of the areas for concern highlighted by ASQA A lack of consistency in licensing, poor training and variable standards of teaching safe restraint techniques among Australian security officers are putting members of the public at risk, according to a report by the national training regulator in Australia. The report reflects officer training and licensing challenges that are common w...

Proactive PASS security guidelines address school security challenges and lessen potential for shooting incidents

The PASS guidelines don’t just point to specific technologies; they address security issues and help guide school administrators to make their schools safer and more secure From K-12 to college campuses, schools need integrated solutions and proactive measures to lessen the potential of active shooters while targeting general loss prevention and security. The good news is that technology is available to address nearly every threat and challenge, and systems integrato...

Food Safety Modernisation Act Final Rule to enforce tighter facility assessments to reduce intentional food contamination

The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Secur...

Dismissal of lawsuit against traffic light camera programme in New York highlights divided public opinion

Some people contend that traffic light cameras are money-makers for localgovernments rather than a deterrent for dangerous driving These days, cameras are everywhere, and getting away with petty offences like running traffic lights has got harder. Citizens have got hot under the collar, and some have even gone to court to get rid of the automatic tickets generated by these robotic traffic enforcers. Traffic light camera intersections not conforming to federal traffic stan...

Optical fingerprint sensors in smart phones paving way for biometrics comeback?

More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...

Understanding starlight camera technology and low-light applications in the security industry

Starlight camera technology is redefining low-light surveillance to new levels Starlight cameras are the latest products security companies are adding to their product line-ups, each camera boasting the most comprehensive ability to make darkness visible. While low-light surveillance capabilities have been around on the market for some time, starlight camera technology is redefining low-light surveillance to new levels. Sourcesecurity.com spoke to manufacturers to discuss this...

Access control manufacturers address biometric myths & end user misconceptions

A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings created by pop culture Contributing to the problem of understanding is the popular culture. “Popular mo...

Border security technologies "Trump" Presidential candidate Donald Trump's proposed U.S.-Mexican border wall

Trump’s border wall proposal reflects a rising demand forgreater border security When GOP presidential candidate Donald Trump proposed building a wall along the length of the U.S.-Mexican border, some ridiculed the idea. Yet, it also struck a nerve among Americans deeply concerned about unchecked illegal immigration. "I would build a great wall, and nobody builds walls better than me, believe me, and I'll build them very inexpensively. I will build a great, great wall o...

Security & emergency agencies' cooperation addresses unique sports and stadium security challenges

On event days, representatives of emergency response & security agenciesare together and running sports venues as a unified group In the world of sports security, alliances are bringing together personnel and agencies that once only talked to each other during an emergency. Consider the recently announced agreement between the Security Industry Association (SIA) and the National Center for Spectator Sports Safety and Security (NCS4). This memorandum of understanding (MOU)...

NCS4 supports sports and stadium security with training, research and academic programmes

NCS4’s research has mainly been on professional sports venues, but they alsodevelop best practices for all levels of sports – including high schools and colleges Some of the most profound changes in the way sporting events are secured have come about since the terrorist attacks on Sept. 11, 2001. A realisation that stadiums could be a target for terrorists has transformed sports security into a highly sophisticated profession that works closely with local and n...

Growing demand for mobile phone door locks and custom user-friendly access control solutions

With increased demand for high-security door locks in all the vertical markets we serve, the last year has been very good for Securitech. Looking forward, we expect this across-the-board growth to continue, as we continue to listen and respond to customer demands and closely monitor industry trends.   In recent years, the security industry has witnessed a growing trend towards development of user-friendly access control solutions that enable customers to have complete control...

Video analytics and 4K cameras for outdoor city surveillance present opportunities for manufacturers, security resellers and integrators

An improving economy has resulted in additional spending on new and existing security initiatives in 2015, a solid year for the security industry. In addition, industry consolidation continued with the announcement of a few important mergers and acquisitions, which is further evidence of a vibrant and exciting time for our industry. As we move into 2016, we expect to see increased momentum for megapixel and 4K security products. The benefits of 4K are being realised by end users in outdoor cit...

Key and asset management are vital parts of security strategy, but more integration is needed

2015 has been a huge success for key and asset management company Traka. The manufacturer is predicting growth between 20 and 30 percent. It attributes a large part of its success to the extensive work completed in previous years in the U.S. markets, as the foundations set are now coming to fruition.   However, Traka has also encountered a real culture shift within the industry. Where previously key management systems and intelligent lockers for asset management were seen as a...

Security goes mobile: Identity and access management solutions on devices to improve user experience

HID Global is looking forward to a long term investment in a complete range of secure identity solutions. Also, focusing on its global partnership program will be on the agenda. An increasingly global market for identity and access management is undergoing very rapid development due to technological advances, particularly in communications, where digital mobile solutions are experiencing strong demand. The year 2015 was a good one for HID Global, which has a strong global position and is invest...

Concerns over card security systems raise customer interest in long-range and durable contactless access control readers

Farpointe Data started 2015 in newly relocated offices featuring a larger, more proficient layout that added new manufacturing equipment and increased its production and inventory capabilities. Shortly into the year, Farpointe introduced new WRR-22 and WRR-44 433 MHz receivers that use either 2-button or 4-button transmitters to open two or four different doors from ranges up to 200 feet (61 m). Each button outputs transmitter data over separate Wiegand outputs, yet the receiver installs just...

Enterprise command software integrates data sources to analyse security, business and risk profiles

The role of today’s security leader continues to evolve as they are faced with an ever-expanding risk environment that includes active shooters, crime, natural disasters, liabilities and cyber threats. Most recently, the terrorist attacks in Paris and the active shooter violence in California once again served as reminders of the threats organisations face on a daily basis.   Intelligent technologies for proactive security management Over the past year, the increased fo...

Quick poll
What is the most significant challenge facing smart building security today?