Security monitoring system - Expert commentary

Positive economic outlook for security market in 2014

A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...

A long-lasting alliance between system integrators and customers promises to be favourable for both

Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for system integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced c...

Creating a safe and secure workplace environment using a culture of openness

Companies that have developed a culture of openness can provide and receive feedback at all levels The nail that sticks out gets hammered down” is an old Japanese saying that encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Brent O’Bryan, SPHR at AlliedBarton Security Services, explains that a winning formula for both the organisation and an individual is a culture actively exhibiting healthy behaviours and practi...

Security system implementation: "bleeding edge" versus leading edge security technologies

The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge proven technology. In this article, Stephen Malia - Vice President of Engineering Services and Marketing at North A...

Security management system’s usability key to easy adoption

The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems.   Rec...

Application of Public Key Infrastructure (PKI) in physical access control

  The Public Key Infrastructure is beginning to be adopted as a driver in physical access Traditionally associated with logical access and the digital signing of documents, Public Key Infrastructure (PKI) is now also being used to control physical access. Their use in physical access control is likely to be more prevalent with the implementation of the FIPS 201-2 recommendations this year. Derek Scheips of ASSA Abloy Future Lab explores the benefits of this key infr...

Security management with the convergence of IP & physical security

Examining the road to convergence The use of Internet Protocol (IP) in the security industry is increasing but little is known about the relationship between end users and the merger of traditional physical security and IT otherwise referred to as convergence in the security trade press. Markus Lahtinen of the LUSAX project examines the growth of convergence in the security industry and discusses complexities of this relationship. The LUSAX project at Lund Universit...

Interoperability of building security systems: Protocols and standards

   XML, API and web server offer the ability for interoperability between proprietary software Today's facility executive wants to purchase systems and components from various manufacturers and have those components work together as one system. They want "open systems" that allow the manufacturers to offer new features and add value without locking the owner into a single vendor's proprietary protocols. In short, they want Interoperability.Hirsch Electronics...

Metadata in IP video surveillance and monitoring: operational benefits and cost savings

  Metadata saves on resources required to store large amounts of data Yu Kitamura, Product Manager, Network Video Monitoring, Sony Europe explains the facts about metadata, and their benefits.All organisations have to face the costly challenge of the storage and management of their valuable data. In the sphere of security, where visual data is indispensable, any avenues that make the capture, storage and retrieval of that information more efficient will command budget...

Contactless smart cards in health care institutions: Considerations for entering the health care market

   Hospitals need stronger 'in-depth' physical security at different entry points Within the course of any given day, a hospital or health care chief security officer (CSO) faces the task of not only protecting multiple points of access but also doing so in a way that enables movement and activity, is convenient for staff and patients and does not impede the facility's primary function: saving lives. Health care facilities exist in a wide variety of medical focus, adm...

Financial focus for security

When it comes to the application of sophisticated security techniques in the banking environment - to keep assets, staff and customers safe and secure - financial institutions are looking carefully at how they can seamlessly integrate advances, such as High Definition CCTV and the monitoring of their cash machines, into their existing infrastructure.  Pauline Norstrom, Director of Worldwide Marketing at Dedicated Micros, discusses the challenges. A key issue for banks is to ensure that the...