Expert commentary

Edge analytics and cybersecurity key trends in 2016

The past year has seen growth in the deployment and use of edge analytics, plus a significant emphasis placed on robust cybersecurity. The expectation for 2017 is that these two trends will continue to be a driving factor for value-based decision making of large, influential customers. IP camera product lines from reliable and well-regarded brands that include edge analytics and offer a trusted, secure platform will be at an advantage over those that don’t. Looking back at the expectation...

Fast-paced change impacts panoramic and megapixel camera market

2016 was a year of fast-paced changes in the market for video surveillance, especially for higher-resolution and panoramic cameras. We spoke with Scott Schafer, Arecont Vision’s Executive Vice President, for his thoughts on 2016 and the year ahead.   SourceSecurity.com: Did your predictions for 2016 match up with what you thought back at the end of 2015? How has the intervening year changed the thoughts? Scott Schafer: Looking back on our predictions for industry trends...

New trends include searchable video, data fusion and crowd sourcing

There has been a lot of investment in safe city projects around the world in 2016, particularly in India, where Qognify is currently involved in a number of major initiatives, as well as upgrading of security systems at major public transportation hubs and international airports. At Qognify, we have seen a continual trend towards organisations wanting their security systems to deliver operational efficiency and effectiveness to the wider business.   Here are some notable trend...

Access control market sees impressive growth within security industry

The access control industry is now picking up the challenge of embracing new technologies The access control business has, over the last 10 years, completely changed its image from being a rather unattractive slow growth and conservative business to taking up a position as a fast-growing confident business. The access control industry has listened and acted on the needs of the stakeholders in the supply chain and as a result the world market for access control products and so...

Mechanical and electronic security to see further convergence in 2017

New construction has continued to grow as a result of low interest rates in 2016 and that has positively impacted the security marketplace. Yet the limited availability of skilled labour is becoming a large issue as it leads to higher cost of labour. This also creates a challenge in recruiting, training, and retraining a capable staff in building construction and maintenance activities. As a result, there is a continued desire to improve our efficiency in production, commissioning and the manage...

Adaptive transmission systems evolve with advanced communications

The security market in 2016 saw an uptick in the economy, the introduction of new technologies, increased compliance requirements in key verticals, and rising concerns over the need for greater security. Users interested in upgrading or deploying new systems consistently chose networked system platforms. This trend further drove the demand for adaptive transmission solutions as a means of repurposing existing analogue infrastructure to accommodate IP devices on a networked platform. As this mi...

Managing risk with a data-centric business approach

Access control and video management systems provide much more data than originally intended An organisation is a complex environment that is ever changing and continuously growing to include more servers, more buildings, more systems and as a result -- includes more risk, costs and threats. As a Chief Operations Officer looks at the many objectives across an organisation, he needs to evaluate how to increase profits, manage risk, and provide a cost-effective route for improvin...

Cloud video, predictive maintenance & emergency preparedness top security trends for 2017

Three key trends will continue dominating the security industry looking ahead to 2017 – cloud video, predictive maintenance and emergency preparedness.   Cloud video The continued integration of cloud and hosted video into security programmes offers a lot of benefits for customers. The convenience of remotely viewing video footage in real-time or historic footage has been a great benefit to our customers and provides significant business intelligence. It helps with ever...

Coming in 2017: More holistic security… and more lone wolf attacks

There will likely continue to be high numbers of lone wolf and soft target attacks in the year ahead. The drivers behind these tragedies are a confluence of self-radicalisation, social media, violent extremism, and mental illness. They will require our skills as security professionals — observation, investigation, interviewing, due diligence — like never before.   Looming in the background of these physical attacks is the prospect of combined physical and cyberatta...

Video analytics for retail: Bad data in, bad data out

Pressure from online shopping is making it even more critical for brick and mortar stores to maximise the revenue per visit Analytics is trending hot for both video and data. The problem for many security video acquisition products is the old adage:  bad data in, results in bad data output. The acquisition device has to be able to deliver on the promise to the end user and perform in challenging environments. What products, with what capabilities, are changing the video a...

Internet of Things trends boosting the commercial security industry

The single largest group of consumer IoT devices being deployed is for home automation and residential security Business and technology analysts are in unanimous agreement that the number of IoT devices will explode into the many 10’s of billions within the next five years. These billions of new computing devices will produce enormous volumes of data about ourselves, our society, and our physical environment. The security industry is at ground zero of this upheaval. In f...

Holiday season loss prevention plans for retail

The holiday season generates 34% of annual sales for retailers but accounts for 37% of annual losses It is that time a year again, when shoppers and shoplifters converge on our retail outlets looking for that all important deal or steal. Peak shopping season This year, the National Retail Federation estimates holiday spending will rise 3.6% from 2015 to more than $655 billion. While the peak shopping season used to be defined as the time between Thanksgiving and Christmas Ev...

Tackling security market commoditisation with innovation

Innovation is not an end goal but an ongoing process that must be sustained Regardless of market, the challenge of commoditisation is very real for manufacturers as companies producing lower-end products continue to imitate the most advanced technologies. This creates a perception among customers, and the marketplace in general, that even leading-edge products with greater features, functionality, and value are indistinguishable from others on the market. As a result of commod...

Building integrator/provider partnerships for enhanced VMS solutions

Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...

Download: Dangers of CSN-only smart card readers

This executive brief explores the security risks associated with using CSN instead of reading the data protected by security mechanisms. When contactless smart cards are implemented and deployed properly, they represent one of the most secure identification technologies available. However, some manufacturers, in an attempt to sell a ‘universal’ reader capable of reading almost any contactless smart card technology, actually disable the built-in security...

Best practices for reducing outdoor video nuisance alerts

Thermal cameras see heat rather than light, so they are a perfect “human detector” Safeguarding outdoor assets in a reliable and cost-effective manner often comes down to a single requirement: Accurate intruder alerts and timely information about the unfolding event. While there are many technologies available for outdoor security, smart cameras with video analytics have emerged as the solution of choice for detecting intruders in real time outdoors. Yet the best...

10 benefits of cloud access control solutions

The security and safety industry has seen tremendous advances in cloud-based access control recently as cloud computing has opened up a world of possibilities for security and access control. Whether controlling access for a single door or for an entire enterprise spread out over multiple locations, cloud-based hosted or managed solutions allow security dealers and monitoring companies to provide end users with cost-effective, fully-functional turnkey solutions. The benefits are m...

How to test for network security vulnerability

Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognising this reality, most organisations test their own networks for security weaknesses, whether to meet compli...

7 things you need to know about iris recognition systems

Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but firs...

Smart network audio systems to revolutionise speaker market

Currently some retailers operate two separate speaker systems in their stores: one for broadcasting background music and one for announcements Twenty years ago, IP network cameras launched a revolution in video surveillance. Today, network audio systems are about to do the same for the speaker market. Back in 1996, the predominant video cameras were analogue. They weren’t intelligent. They required an expensive and complex head-end of recording and monitoring systems....

4 trends affecting physical security power solutions

As the trend from analogue to IP continues to progress, more and more security devices are IP-enabled for seamless network integration With rising concerns over organisations’ physical security and potential network vulnerabilities, it has become more important now than ever for security professionals and other decision makers to take actions that will guard against potential problems and help prevent system failures. One specific area of heightened focus is the implemen...

Growing need for open protocols in the security industry

If all the components within a security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities The widespread use of open protocol systems is one of the most important developments in the security and safety sector for decades. With a heavy reliance upon various security softwares (even for physical security), using open systems has gone from being a desirable selling point to a necessity in the security indus...

[Download] Visitor Management: A Guide to Selecting and Employing a New Solution

Visitor management refers to the methods organisations use to admit and track visitors to their facilities. The concept is not new. Many facilities use some form of visitor management, ranging from simple sign-in sheets to high-tech approaches that scan government IDs to capture relevant data. But visitor management is more than a sheet of paper or a technology. It is also a policy that governs the how, why, and who of visitors. Increased security driving VMS upgra...

Fusion and multi-modal biometrics strengthen physical security systems to fight against terror and crime

Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution Global terrorism is on the rise. For many years, the West felt immune to these incidents, often asserting that these were problems felt only in countries with heated conflicts, such as Syria, Iraq, Israel and Nigeria. However, recent terror attacks have taken place in both Europe and the United States: Belgium, France (Paris and Nice), Orlando, various...

Download: Emerging trends in panoramic cameras

Panoramic cameras enable an operator to assess a wide field of view at a glance and to zoom in to view additional detail as needed. Providing this capability are a single camera, a single mounting location, and often using a single cable. Complete 180-degree or 360-degree coverage brings total situational awareness of the area being viewed. Panoramic cameras can also enable you to record everything in the field of view, all the time, and to zoom in for detail, wheth...

Improving security decisions by identifying red flags and operational inefficiencies through advanced analytics

Access levels of individuals based on their roles can be cross compared with their normal access patterns, it is also useful to look for anomalies in device behaviour Threats to an organisation’s physical and logical security are increasing in number and financial impact, according to several recent surveys. To combat this problem, security and IT professionals are fighting back with system upgrades and software solutions including advanced analytics. Using the analytics...

Download: 9 opportunities to upgrade your access control technology

The technologies behind physical access control are constantly evolving. It’s a fast-changing market that can leave end user organisations struggling to keep up. Smart cards still reign supreme, with good reason, but there are also new options today and on the horizon. Customers want to implement the most secure and up-to-date technologies, but constantly adapting their systems to keep up with the pace of change is impractical. Leveraging access control technologies in a way that both m...

Designing an IP/PoE network infrastructure: Factors to consider

If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...

Cloud-based surveillance spearheads growth in security as a service

The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...

Why Hikvision is suddenly front-page news: The company responds to security concerns

Hikvision has been in the news in the United Kingdom recently, including a front page news story in The Times. SourceSecurity.com offered Keen Yao, Vice President at Hikvision’s International Business Centre, a chance to set the record straight regarding concerns expressed about hacking of cameras, the company’s ties to the Chinese state, and its role as the biggest video surveillance equipment manufacturer in the world. Hikvision has come a long way in the past few ye...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems