Security monitoring system - Expert commentary
The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge proven technology. In this article, Stephen Malia - Vice President of Engineering Services and Marketing at North A...
The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems. Rec...
The Public Key Infrastructure is beginning to be adopted as a driver in physical access Traditionally associated with logical access and the digital signing of documents, Public Key Infrastructure (PKI) is now also being used to control physical access. Their use in physical access control is likely to be more prevalent with the implementation of the FIPS 201-2 recommendations this year. Derek Scheips of ASSA Abloy Future Lab explores the benefits of this key infr...
Examining the road to convergence The use of Internet Protocol (IP) in the security industry is increasing but little is known about the relationship between end users and the merger of traditional physical security and IT otherwise referred to as convergence in the security trade press. Markus Lahtinen of the LUSAX project examines the growth of convergence in the security industry and discusses complexities of this relationship. The LUSAX project at Lund Universit...
XML, API and web server offer the ability for interoperability between proprietary software Today's facility executive wants to purchase systems and components from various manufacturers and have those components work together as one system. They want "open systems" that allow the manufacturers to offer new features and add value without locking the owner into a single vendor's proprietary protocols. In short, they want Interoperability.Hirsch Electronics...
Metadata saves on resources required to store large amounts of data Yu Kitamura, Product Manager, Network Video Monitoring, Sony Europe explains the facts about metadata, and their benefits.All organisations have to face the costly challenge of the storage and management of their valuable data. In the sphere of security, where visual data is indispensable, any avenues that make the capture, storage and retrieval of that information more efficient will command budget...
Hospitals need stronger 'in-depth' physical security at different entry points Within the course of any given day, a hospital or health care chief security officer (CSO) faces the task of not only protecting multiple points of access but also doing so in a way that enables movement and activity, is convenient for staff and patients and does not impede the facility's primary function: saving lives. Health care facilities exist in a wide variety of medical focus, adm...
When it comes to the application of sophisticated security techniques in the banking environment - to keep assets, staff and customers safe and secure - financial institutions are looking carefully at how they can seamlessly integrate advances, such as High Definition CCTV and the monitoring of their cash machines, into their existing infrastructure. Pauline Norstrom, Director of Worldwide Marketing at Dedicated Micros, discusses the challenges. A key issue for banks is to ensure that the...
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download