SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Ensign InfoSecurity joins MITRE CTID for cybersecurity
    • Sectigo joins Pax8 Marketplace with CLM solution
    • Alibi and MyDoorView partner for video intercom tech
    • G2E Asia highlights: Gaming & innovation trends
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Is audio underused in physical security? What are the obstacles?
    • How is AI transforming physical security?
    • ISC West update: New SoCs inside cameras drive intelligence at the edge
    • How should security adapt to the unique aspects of the corrections market?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    MOD Pizza upgrades with Hanwha Vision surveillance

    MOD Pizza upgrades with Hanwha Vision surveillance

    Sunprime & Dahua: Advanced security for solar plants

    Sunprime & Dahua: Advanced security for solar plants

    Hanwha Vision enhances security at Naval Park, New York

    Hanwha Vision enhances security at Naval Park, New York

    Verkada Enhances security for Salvation Army operations

    Verkada Enhances security for Salvation Army operations

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    46th IEEE Symposium on Security and Privacy

    46th IEEE Symposium on Security and Privacy

    Gartner Data & Analytics Summit London 2025

    Gartner Data & Analytics Summit London 2025

    Libya Build Tripoli 2025

    Libya Build Tripoli 2025

    Imagine 2025

    Imagine 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    The ultimate guide to mastering key control

    The ultimate guide to mastering key control

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    A modern guide to data loss prevention

    A modern guide to data loss prevention

    2025 Trends in video surveillance

    2025 Trends in video surveillance

About us Advertise
  • Ultimate key control guide
  • How is AI transforming security?
  • Design vs systems
  • Women in security
  • 6
Thermal imaging
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
  • More
    Thermal imaging

    Thermal imaging - Round table discussions

    What are the security challenges of protecting critical infrastructure?
    What are the security challenges of protecting critical infrastructure?

    Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this we...

    What are the security challenges of public events?
    What are the security challenges of public events?

    Large public events were out of the question during the depths of the pandemic. However, public events are likely to experience a resurgence along with a more optimistic outlook in the coming months. In addition, there will likely be pent-up enthusiasm for these events among individuals weary from months of isolation. We asked this week’s Expert Panel Roundtable: What are the security challenges of public events planners in 2021?

    Which security technologies will be useful in a post-pandemic world?
    Which security technologies will be useful in a post-pandemic world?

    In the past few weeks, the light at the end of the COVID-19 tunnel has brightened, providing new levels of hope that the worst of the pandemic is behind us. Dare we now consider what life will be like after the pandemic is over? Considering the possible impact on our industry, we asked this week’s Expert Panel Roundtable: Which security technologies will be most useful in a post-pandemic world?

    Which security technologies are becoming outdated or obsolete?
    Which security technologies are becoming outdated or obsolete?

    When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which securi...

    How can thermal cameras be used effectively for fever detection?
    How can thermal cameras be used effectively for fever detection?

    The COVID-19 global pandemic continues, and more and more companies are looking for ways to continue (or resume) operations while minimising the coronavirus’s negative impact on their workforce, or potentially contributing to disease spread among the wider population. Thermal cameras have been proposed as a solution to screen individuals for elevated body temperature since the beginning of the pandemic. However, the technology has its detractors, and there are regulatory questions. We aske...

    Which technologies will disrupt the security industry in the second half of 2020?
    Which technologies will disrupt the security industry in the second half of 2020?

    The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue t...

    Which security technology is most misunderstood, and why?
    Which security technology is most misunderstood, and why?

    The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misundersto...

    What are the mainstream uses for thermal cameras?
    What are the mainstream uses for thermal cameras?

    The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?

    What are the challenges and opportunities of integrating security and fire systems?
    What are the challenges and opportunities of integrating security and fire systems?

    Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?

    What was the big news at ISC West 2019?
    What was the big news at ISC West 2019?

    ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?

    Roundtable roundup: home automation, thermal cameras, alarms and more
    Roundtable roundup: home automation, thermal cameras, alarms and more

    Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!

    What’s new “on the edge” of security and video surveillance systems?
    What’s new “on the edge” of security and video surveillance systems?

    By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...

    Has the gap closed between security fiction and security reality?
    Has the gap closed between security fiction and security reality?

    Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our indus...

    Why should a customer continue to buy “premium” surveillance cameras?
    Why should a customer continue to buy “premium” surveillance cameras?

    Remarkable changes are happening in the video camera market for surveillance applications, including the emergence of lower-priced products that offer features that previously were only available at a much higher price point. Deflating prices of cameras are sometimes referred to as a “race to the bottom” – foreshadowing a market of low-cost cameras that all provide similar features. We asked this week’s Expert Panel Roundtable to comment on camera pricing trends and how c...

    What technology will have the greatest impact in the second half of 2017?
    What technology will have the greatest impact in the second half of 2017?

    Technology is changing at a break-neck pace, and the security marketplace is currently being bombarded by a wealth of new capabilities and innovations. But what will be the impact? Which of the currently-hyped new innovations will have a major impact, and which will fade over time? And even acknowledging the long-term significance of various technologies, what can we expect to be the more immediate effect? We asked this week’s Expert Panel Roundtable: What new security technology is poised...

    When do video systems yield information other than images?
    When do video systems yield information other than images?

    A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?

    How can governments and other relevant authoritative bodies manage privacy objections from the public when installing new surveillance cameras?
    How can governments and other relevant authoritative bodies manage privacy objections from the public when installing new surveillance cameras?

    Video surveillance, or CCTV, is becoming increasingly common in cities and other public places all over the world. The benefits of video surveillance cameras to prevent crime and aid police investigations have been well documented, and there have been several high-profile cases in which video was instrumental in solving a crime. Still, whenever video surveillance is proposed in a public place, there can be opposition, based on privacy concerns, from various interest groups and the general public...

    Related white papers
    How security systems ensure healthy workplaces during COVID and after

    How security systems ensure healthy workplaces during COVID and after

    Download
    Delivering a smart, secure and healthy workplace with cloud

    Delivering a smart, secure and healthy workplace with cloud

    Download
    Building a safe ecosystem for visitors post COVID-19

    Building a safe ecosystem for visitors post COVID-19

    Download
    Related articles
    Thermal cameras and smart cities: Preventing COVID-19 in public places

    Thermal cameras and smart cities: Preventing COVID-19 in public places

    Elevated temperature screening is paving the way to Britain’s reopening

    Elevated temperature screening is paving the way to Britain’s reopening

    What are some unusual applications of surveillance cameras you have seen recently?

    What are some unusual applications of surveillance cameras you have seen recently?

    Follow us

    Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos
    Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
    About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
    1. Home
    2. Topics
    3. Thermal imaging
    4. Round table discussions
    About this page

    See an extensive list of insightful discussions related to Thermal imaging, providing in-depth opinions and analysis on product, technology and industry trends on Thermal imaging from industry thought leaders and experts.

    See this on SecurityInformed.com

    Subscribe to our Newsletter

    Stay updated with the latest trends and technologies in the security industry
    Sign Up

    DMA

    SourceSecurity.com - Making the world a safer place
    Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

    Our other sites:
    SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

    Subscribe to our Newsletter


    SourceSecurity.com
    SecurityInformed.com

    Browsing from the Americas? Looking for our US Edition?

    View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

    US Edition International Edition
    Sign up now for full access to SourceSecurity.com content
    Download Datasheet
    Download PDF Version
    Download SourceSecurity.com product tech spec