Expert commentary

2016 promises more widespread video analytics and easier installation for the security industry

As 2015 comes to a close, it’s a good time to look back at how our industry has changed this year and what we can expect for 2016. Specifically in the area of video surveillance, the trend toward higher resolutions continued this year. Whereas a few years ago, 720p was the most popular resolution for HD cameras, 1080p has now become the standard choice, and even higher resolutions, such as 4K ultra HD cameras, are seeing increased sales. Integrators are also using a broader mix of cameras...

Value and quality to drive security market growth in 2016; Axis expansion plans

The security industry continued to grow in 2015, although it was a bit slower than expected. Most noticeably, we saw a lot of M&A activity throughout the industry, including our own new ownership under Canon. Business continues as usual, and we have and will maintain our separate brand. The industry also experienced more price pressure on hardware than in previous years. Axis U.S. expansion plans 2016, IP video, IoT The discussion of price versus value will be a common one in 2016. There...

How security plans with reliable policies and procedures deliver improved operational effectiveness

Automated procedures reduce manual errors & help meet regulatory requirements End user demands are growing exponentially every day. Whether it is managing who has access to buildings or areas and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, the list goes on and on as to what end users must manage to keep their buildings, assets and people safe. Physical security equipment and an effective securi...

The role of security integrators in preventing tailgating

Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorised person follows an authorised personnel through a controlled entrance. More than 50 percent...

Paris attacks shift focus on securing soft targets against external threats

Soft targets are civilian-centric places suchas churches and retail centres, where securityis not as fortified The terror attack on Paris on Nov. 13 lasted just 23 minutes. The bombers and gunmen split up and attacked seven sites: the soccer stadium where it all began, four restaurants, a bar and a concert venue. All told, they killed 130 people and injured 368 in the time it takes for a coffee break. This situation has raised questions about the security management for conce...

Implementing security market technologies to help highway authorities deal with wrong-way drivers

Technology can safeguard other motorists, and help highway authorities to communicate with wayward drivers to avoid accidents There has been a spate of accidents worldwide in which cars have been driven either knowingly or unwittingly against the flow of traffic and into oncoming vehicles. Existing and imminent technology from the security sector can prevent such occurrences, alerting responsive drivers to their error and safeguarding other motorists. I write this shortly af...

How Windows 10 enhances ATM security by protecting against cyber attacks

Speaking at ATM Security 2015 in London, Pat Telford, principal consultant at Microsoft Canada, summarised the software threats to ATMs and the features to combat them when migrating to Windows 10. ATM security is compromised by physical attacks on the cash, physical attacks on the card, replacement of the ATM computer (black box), and malware attack (where normally a person visits the ATM and adds malware). According to Telford, there are certain immutable laws of ATM Sec...

Risk based security solutions – a holistic and balanced approach to security management

Risk, in a security context, is the product of threat, vulnerability, and consequence Security as a discipline has been an important feature of society since cavemen started using the environment around them to protect themselves and their families.  As a discipline, security has developed exponentially and that trend is continuing; however, somewhere along the way key elements of physical security design have been forgotten. All too often solutions are deployed in a pre...

How to protect the Internet of Things' vulnerabilities from hackers

Hackers probably take more interest in your home computer and information about your identity stored there As the Internet of Things (IoT) grows, so does the hackable universe. Equipment designers need to start thinking about security in the first steps of manufacturing products, and companies and individuals need to start implementing secure coding practices to avoid hacking incidents. Last July, for instance, two security researchers hacked the computer in a Chrysler Jeep a...

How to achieve high quality video with lowest bandwidth and storage needs

A lower bitrate reduces bandwidth andstorage requirements High definition and megapixel cameras provide more detailed images with more useful information, but this can come at a cost. The volume of data being transported and stored rises significantly. The bandwidth demand that this places on the network and the increase in required storage capacity adds significantly to the total IP system costs. The best place to reduce these costs is at the source – in the camera &nda...

Dortronics’ customised door control solutions enhance business opportunities for specialty applications

Dortronics continues to focus on custom solutions in addition to its line of standard devices Security installers have new ways to add value to their specifications with switches and door controls that can be deployed in a wide range of applications to meet emerging needs of end-users. John FitzPatrick, president of Dortronics Systems Inc., Sag Harbor, New York, says the company continues to work closely with security integrators and their end-user customers to provide co...

The impact of smart video surveillance technology and analytics on home automation systems

Modern home security systems have come of age with innovative technologies that enable homeowners to have complete control over every aspect of the system. MOBOTIX’s Keith Jernigan Sr. and Hunter Fort explore the immense capabilities smart video surveillance technology to make a huge impact on the home automation systems by driving down energy costs as well as storing massive amounts of data. Home automation is not as new as most people would imagine. It has been around for several decade...

Role of advanced security technologies in enhancing exhibits and visitor experience in museums

With every technological advance that canbenefit museum management comes anotherthat may assist thieves  When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as m...

Lessons for security sector from the Paris attacks: The value of sharing data and vigilant guarding

The Eiffel tower illuminated with colours of the French national flag on November 16 Let’s say it up front: The physical security sector has limited solutions to address events like those in Paris on the 13th November. The series of coordinated terrorist attacks consisted of mass shootings, suicide bombings, and hostage-taking in which 129 people died. Among the dead were 89 people at the Bataclan theatre where American band Eagles of Death Metal was playing at the t...

Rising interest in drone detection and tracking due to lack of regulations

  Williams Meredith recently stepped out of his Kentucky home to see a drone hovering over his porch, videotaping his young daughters by the family pool. It wasn’t the first time one of these small flying devices had wandered over to take a look, but it had never gotten so close. So he did what any red-blooded American would do when confronted with a home invader – he blew it from the sky with a single shotgun blast. The confrontation is another example o...

Ethernet switches – Powering IP surveillance systems the smarter and more economical way

Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...

IoT intelligent building systems expose security threats and challenges

The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...

Combating ATM security risks with innovative security technology reduces costs

Recycling ATMs, which can reuse deposited cash to supply withdrawals, are another way in which ATM-associated crime can be reduced With some 3 million automated teller machines (ATMs) around the world, they are bound to be seen as attractive targets by some criminals. Banks need to ensure customers do not fall prey to skimming and other malicious attacks from criminals, by having an effective ATM security in place. The advent of contactless technology has eliminated the need...

OEM and R&D focus for Chinese manufacturer Safer Science and Technology at CPSE 2015

Safer has built a reputation of notcompromising on quality for a low price,leading to increases in overseas sales in 2015 Unfazed by the number of companies following the footsteps of Hikvision and Dahua and launching their own branded product lines, one Chinese company insists on carving out its name in the manufacturing sector. Established in 2002, Shenzhen Safer Science and Technology, or Safer as the company is commonly known, acknowledges that it cannot c...

Smart cities revolution incomplete without safety and security of public and infrastructure

The city of the future needs smart, secure and resilient infrastructure solutions According to the United Nations, the world population will reach almost 8.5 billion by 2030. As populations grow, so do cities. Even now more than half of the world’s inhabitants live in urban areas, and more than one million move from the country to the city every week. This trend places enormous demands on people and infrastructures. Because only when communication, energy, safety, s...

CPSE 2015 insights: Chinese security companies explain domestic and international strategies

CPSE Shenzhen showcased security productsacross 11 halls. The show is arguably thelargest and most influential in Asia  China is the largest security market in the world. This makes the annual China Public Security Expo (CPSE) a force to be reckoned with and a place to be seen for every security company. Boasting 11 halls over an area of 110,000 m2 and more than 6,000 booths, CPSE is listed as one of the largest and, certainly, one of the most influential s...

Benefits of CertAlarm testing and certification for fire and security products makers in the EU

The CertAlarm scheme is today the only European certification scheme that has been endorsed by the EA Today, manufacturers who plan to sell their fire and security products in different European countries are faced with uncertainty regarding the standards against which their products should be developed, tested and certified. There are no harmonised EU-wide standards or certification schemes for security equipment, instead there is a suite of EN standards plus a variety of co...

Parking facility security offers new opportunities for system integrators

Security cameras provide live, real-time videoto assist security personnel in spottingpotential or real problems Efficient security systems for parking structures deter criminal activities and anti-social elements from destroying property. Over the years, security companies have responded to this need and developed a range of security systems for parking facilities, such as audio intercoms, access cards and video analytic solutions. Systems integrators who want to add new ser...

How security professionals elicit information from people in interview situations

Observers suggest asking open-ended questions and focusing in on specific details as the conversation moves ahead If a trained interviewer has ever questioned you, you may have started out by promising yourself to keep certain information secret. Then during the interview, you spilled it all. Police detectives, officers and savvy security professionals have learned how to talk to people in ways that will elicit information that subjects prefer to conceal. How do they do th...

H&S Protection Systems uses social media to increase brand awareness and sales

Social media channels have active and consistent users and may constitute a promising audience for security integrator’s marketing efforts  If you have any lingering doubts about the impact of social media, consider this: Worldwide, there are over 1.44 billion monthly active Facebook users, which is a 13 percent increase year over year, according to the social media giant. In addition, 936 million people log onto Facebook daily (as of March 2015), whi...

Enterprise Security and Risk Management (ESRM) requires more comprehensive skill sets from security staff

(Click to see larger image) The ASIS Foundation & the University of Phoenix College of Security and Justice's Enterprise Security Competency model Are you competent in your security job or profession? How do you know? According to research carried out by the ASIS Foundation, security has begun to evolve beyond guarding doors, checking IDs and screening briefcases and purses. Today, something called Enterprise Security Risk Management (ESRM) is subsuming the...

How museums employ security measures to counteract art thefts

Major art heists often feature audacity that defeats even the most thorough security protocols  Museum security, like art, is ever-changing. Traditional security practices like manned guarding alone are not sufficient to keep thieves at bay. Modern security technologies such as video surveillance, motions detectors, intruder alarms and other physical security devices also play an equally important role in securing museums and its art work. Regrettably, having all the...

Growing demand for qualified security guards throws spotlight on security industry transitions

Conley’s security officers must study for and acquire a Certified Protection Officer (CPO) certification After nearly 40 years of a sustained and concentrated effort to transition the security industry to the security profession, Tom Conley is still beating his “security profession drum” at full volume. He still hopes that the security industry-to-profession movement will one day be a reality. He sees himself as an eternal optimist embarking on a feat of...

IP video surveillance market – revealing the ‘industry standards’ myth

The IP surveillance market is taking anunusually long time to reach maturity, partiallydue to lack of industry standards  Video surveillance has been a growth industry ever since the release of the first IP security camera in the mid-1990s. Generally, high-growth industries are immature, meaning they have not yet reached a state of equilibrium. This is particularly true in the IP video surveillance market where many new companies enter the market takin...

Synology CEO interview: IP storage solutions and analysing security trends

Derren Lu, CEO of Synology Inc and Scott Lee,Senior Manager of Software DevelopmentGroup for Surveillance Synology – a company founded by two former Microsoft employees – began as a storage solution provider and grew to include surveillance in its product offerings. While many security companies in Taiwan are voicing their concerns over falling sales, Synology is seeing its products grabbing shares in the security market and the sales figures are continuing to grow...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems