Expert commentary
Some people contend that traffic light cameras are money-makers for localgovernments rather than a deterrent for dangerous driving These days, cameras are everywhere, and getting away with petty offences like running traffic lights has got harder. Citizens have got hot under the collar, and some have even gone to court to get rid of the automatic tickets generated by these robotic traffic enforcers. Traffic light camera intersections not conforming to federal traffic stan...
A more strategic approach to corporate security can better align departmentsin an organisation to achieve better results of shared goals The alignment of corporate security with the business strategy of an organisation is a topic that has been on the agenda of many senior security professionals. A corporate security department’s inability to demonstrate a clear thought process of how they arrived at proposing the strategic direction, or failing to make a compelling busin...
More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...
Starlight camera technology is redefining low-light surveillance to new levels Starlight cameras are the latest products security companies are adding to their product line-ups, each camera boasting the most comprehensive ability to make darkness visible. While low-light surveillance capabilities have been around on the market for some time, starlight camera technology is redefining low-light surveillance to new levels. Sourcesecurity.com spoke to manufacturers to discuss this...
Many security manufacturers are working towards ISO 14001, an internationally-recognised standard for the environmental management of businesses How green are security industry manufacturers? As innovation (much of it driven from home video and mobile phones) continues, it’s likely that our sector’s carbon footprint will decrease since compact products use up fewer raw materials. Even casual observers will note that integrators are falling over themselves to gain e...
Sports security combines manned guarding with access control devices, HD surveillance cameras & analytics in a command centre for a comprehensive security presence Providing security for sporting events and venues has long focused on personnel. Protection came in the form of guards and other personnel who controlled access to the venue and to restricted areas. With an increasing need to provide higher levels of protection in an age of terrorism, venues have turned to tradi...
Done right, a good metric programme will help tell the story of the security department Knights of medieval times are known for impossible quests and challenging missions seeking rare religious items. The quest for the Holy Grail is perhaps the most notable. Today’s security professionals are often on their own quest, seeking what sometimes feels like the impossible – the search for perfect security metrics! What are metrics and are they really that hard to find?...
Improved alarm verification standards will help reduce the number of false dispatches of law enforcement officers The verification of alarms continues to progress with more affordable technology as well as an updated industry standard set for release as soon as the end of February 2016. The definition of alarm verification is getting a makeover in the standard, guided by a range of stakeholders including the security industry, law enforcement, associations and other intereste...
A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings created by pop culture Contributing to the problem of understanding is the popular culture. “Popular mo...
Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signalling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programming, de...
Secure payment card technology at the point of sale and a strong authentication are effective defences against data security threats Data security is one of the top concerns to a retailer’s reputation and its customers’ privacy. The fall-out can be catastrophic, and organisations must understand the threat and take all necessary steps to protect their assets and customers. The challenge has become more complex with the explosive growth in mobile device usage throug...
Trump’s border wall proposal reflects a rising demand forgreater border security When GOP presidential candidate Donald Trump proposed building a wall along the length of the U.S.-Mexican border, some ridiculed the idea. Yet, it also struck a nerve among Americans deeply concerned about unchecked illegal immigration. "I would build a great wall, and nobody builds walls better than me, believe me, and I'll build them very inexpensively. I will build a great, great wall o...
Biometric solutions are replacing PINs at physical ATMs and providing a more fool-proof form of identification for banking security Biometrics is seeing especially rapid adoption rates throughout the worldwide banking infrastructure, particularly at the ATM and teller counter, says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. “There are also opportunities for biometrics to improve security by enabling transaction-based authentication for online and mobi...
On event days, representatives of emergency response & security agenciesare together and running sports venues as a unified group In the world of sports security, alliances are bringing together personnel and agencies that once only talked to each other during an emergency. Consider the recently announced agreement between the Security Industry Association (SIA) and the National Center for Spectator Sports Safety and Security (NCS4). This memorandum of understanding (MOU)...
There are between 4 and 6.8 million lone workers in the UK, and many of us arelone workers at some point in our working lives The Suzy Lamplugh Trust was set up to highlight the risk faced by lone workers and to offer information and advice to reduce the risk of violence and aggression for everyone. It was established following the disappearance in 1986 of 25-year-old estate agent, Suzy Lamplugh, after she had gone to meet an unknown client. This article is based on a present...
Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from...
The universe of biometric authentication applications is expanding rapidly invertical markets such as healthcare and retail Once used mostly to secure high-value government facilities, biometrics are now a basic tool used in a variety of vertical markets. This article will look at some of those opportunities. For healthcare organisations, for example, biometric authentication is being used for secure medical dispensing to streamline workflow and control drug diversion, and f...
Sports stadiums and leagues are constantly pushing for higher security standards & best practices to strengthen venues that may be perceived as "soft targets" Terrorism threats have focused the attention of sports security professionals like Paul Turner, Director of Event Operations & Security for AT&T Stadium in Arlington, Texas, on how to more effectively screen guests and ensure that fans and athletes are kept safe. It has made the sobering reality that stad...
Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally known public safety consultant, studies this premise in his 2013 book: Mass Shootings: Six Steps to Survival. “To survive, you have to be mentally prepared,” Matthews says. “You have to know what to do the minute the first shots ring out.” For his book, Matthews researched 60 mass shootings that occurred between 1980 and...
NCS4’s research has mainly been on professional sports venues, but they alsodevelop best practices for all levels of sports – including high schools and colleges Some of the most profound changes in the way sporting events are secured have come about since the terrorist attacks on Sept. 11, 2001. A realisation that stadiums could be a target for terrorists has transformed sports security into a highly sophisticated profession that works closely with local and n...
Key control technology and guard tour systems provide a ready-made solution for healthcare organisations to enhance their security & asset management protocols Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key control systems, asset lockers and guard tour systems. The shift from manpower resources to technology as a main line of defence is having a significant impact on...
Security is becoming increasingly business-like, with corporate security departments having to justify their budgets and support business operations Persistent crime — both physical and logical — and the rise of terrorism around the world have led more and more corporations to expand their focus on security. In that effort, C-suite executives have added significantly to the responsibilities of corporate security departments. Security functions have grown far b...
As we face 2016, identity management has become more critical to successful security operations. Recent acts of terrorism, border security issues, and the refugee crisis are just a few examples that remind us of the potential risks we face today. As a result, identity management is now firmly cemented into prospective security models across the public and private sectors. In recent years, organisations and government bodies worldwide have begun to rely increasingly on biomet...
As the security industry continues to grow, recruiting must have more sophisticatedscreening and hiring processes, and a commitment to hiring quality personnel The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator correspondent, in an exclusive Q&A with Brent O’Bryan, Vice President of Training and Development for AlliedBarton Security Services, discuss the challenges that secur...
Determining how the cloud can best support your business depends on fivefactors: Bandwidth, storage, cost, security and accessibility Until about a decade ago, most enterprises used their video surveillance systems primarily to view live video or review security incidents after the fact. Today, many are taking advantage of intelligent video solutions to reduce losses from theft and fraud, monitor and improve customer service, track commercial conversion rates and performance t...
Strong electronic access control (EAC) investments by the healthcare and education verticals were a highlight of a very strong 2015 for Allegion. The company saw double-digit growth in multiple categories for its electronics as well as continued strong growth in commercial markets, with further expansion of software provider integration of Allegion-connected devices. Mobile connectivity & system integration nurture positive trends Demand for mobile connectivity and inte...
Facial and body behavior analytics can identify people “without interferingwith the pace of life” Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to. SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems ca...
With increased demand for high-security door locks in all the vertical markets we serve, the last year has been very good for Securitech. Looking forward, we expect this across-the-board growth to continue, as we continue to listen and respond to customer demands and closely monitor industry trends. In recent years, the security industry has witnessed a growing trend towards development of user-friendly access control solutions that enable customers to have complete control...
Stratus Technologies is a provider of “always-on” technology, which helps to ensurethe running of mission-critical access control and video surveillance applications Building security – especially high-security installations – requires technology that is reliable and minimises downtime. In some physical security installations, access control and video surveillance solutions are required to function uninterruptedly to ensure business continuity and maint...
An improving economy has resulted in additional spending on new and existing security initiatives in 2015, a solid year for the security industry. In addition, industry consolidation continued with the announcement of a few important mergers and acquisitions, which is further evidence of a vibrant and exciting time for our industry. As we move into 2016, we expect to see increased momentum for megapixel and 4K security products. The benefits of 4K are being realised by end users in outdoor cit...
Browse expert commentaries
Expert Section
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Security beat
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
