From facial recognition to LiDAR, explore the innovations redefining gaming surveillance
Check out our special report on casino security
Post Canon acquisition, Axis still committed to open security systems
People mentioned in this article
- Related companies
- Axis Communications
- Canon Europe Ltd
- Related categories
- CCTV cameras
- IP cameras
- IP Dome cameras
- Dome cameras
- View all news from
- Axis Communications
- Canon Europe Ltd
Articles by Larry Anderson
Drones are poised to fill long-standing gaps in physical security. Fixed cameras leave blind spots, and human guards cannot quickly cover large or complex properties during high-risk moments. Drones f...
Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving large numbers of peo...
Installing physical security systems requires integrating diverse technologies (e.g., cameras, access control, alarms) that often use different protocols and must be adapted to a building's unique phy...
The healthcare industry faces unique and significant security challenges. Healthcare security professionals must balance an open, welcoming environment for patients and visitors with the need to prote...
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better busin...
There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way...
The cloud fundamentally changes how organisations acquire and use technology, offering a powerful mix of financial, operational, and strategic advantages that traditional on-premises infrastructure ca...
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, dig...
Data overload is real. Sometimes it seems we are bombarded by the sheer volume, velocity, and variety of data available in our personal lives, and in our work lives. The solution is to figure out how...
Ibrahim Kassem, Everon’s new Chief Technology Officer (CTO), has been in the security industry since 1998 in various IT leadership roles. Most recently, he was Chief Information Officer for a vi...
Students deserve a safe and positive environment where they can learn and thrive. Teachers and administrators should be able to focus on their primary role of educating students because they feel supp...
The speed, scale and sophistication of today's safety threats can outpace human capacity to keep up. The implementation of artificial intelligence (AI) is essential to keep people safer and must be de...
Physical security and cybersecurity are deeply intertwined in today’s systems. A weakness in one realm can quickly lead to a breach in the other, and vice versa. However, given the symbiotic rel...
Ethics can impact a company's reputation, profitability, and overall sustainability. Ethics extend beyond the law to encompass doing the "right thing" even when it is not legally mandated. As technolo...
A system's lifecycle is the journey it takes from planning and design through to decommissioning. Considering the entire lifecycle of a system can encourage integrators and end users to embrace higher...
The Internet of Things (IoT) is having a profound impact on businesses across various industries, including security. In physical security as in other business environments, the IoT is changing how sy...
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the...
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall...
In the past, security installers and integrators were used almost exclusively to install hardware. However, the role is changing and expanding along with the technologies used in the physical security...
The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Soun...
Related videos
In case you missed it
Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...
Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...
Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...
Expert commentary
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

