Expert commentary

Identity management with virtual credentials - adding a new dimension to the access control industry

 Use of virtual credentials to manage identity is opening the access control industry to new solutionsToday's mobile phones are so much more than communication devices - they have become an indispensable consumer appliance for numerous personal, professional and entertainment applications. With the advent of Near Field Communications (NFC) technology, these mobile phones can now also be used to hold your identity keys and used to carry out numerous secure transactions, Dr. Tam Hulusi,...

Choosing the right power supplies for security installations

 Selecting the optimum power supply for a system is critical to an installation  When it comes to selecting power supplies, knowledge is power. Determining the power requirements of every systems product, taking into account their integration with one another is critical to ensure that you are selecting and installing the power solutions most appropriate for your installation. Such information will enable you to select the power supplies that will be required to keep your security sys...

Improving airport security effectiveness - key solutions

 Dealing with rising airport security threats  demand more innovative solutions   With the rise in large security threats since the commencement of this century, security of airports has become paramount. Looking into this issue Ashley Smith, BSIA (British Security industry Association) Civil Aviation Security Section Chairman, explains how a mix of properly interfaced security systems working in conjunction with monitoring and response staff offers a cost...

Design tips to migrate from analogue to high definition surveillance

 Migrating from analogue to HD surveillance solutions  Globally, the video surveillance market has been slow to move beyond its analogue origins. Many analogue technologies or first generation network video management systems installed in the last decade are now aging, becoming less reliable and unable to deliver the quality and coverage most security professionals demand. Increasing video quality using these older solutions requires an unmanageably large number of...

Understanding transform, quantisation and entropy encoding in H.264 video compression

Understanding the complexities of the transform matrix In the concluding part of this 3-part review of the H.264 video compression standard, Kate Huber, Peter de Konink and Piet Nieuwets of Siqura discuss the transform, quantisation and entropy encoding - various block-encoding steps following motion estimation. Describing data in the transform matrix In contrast to the motion estimation step, the transform phase in the encoding process is relatively similar in H.2...

Access control with mobile phones: the future with Near Field Communications

  Keys could be a thing of the past as Near Field Communication technology enables mobile phones to be used as keys Near Field Communications (NFC) technology is a catalyst that will hasten the use of mobile phones as mobile electronic keys for access control. Though the technology already exists, the necessary infrastructure and supporting devices still have some way to go. In this article, Rachel Sa of ASSA Abloy Future Labs evaluates the benefits an...

Best practices in using video analytics for outdoor security

Video analytics enables security teams to take action as soon as incidents occur  Video analytics can boost security efforts by automatically alerting personnel to take action when a security event occurs. Intelligent sensors never tire, can cover large distances and “see” what the eye would miss, even in absolute darkness. Based on such intelligent analytics, people can make smart decisions when actual violations happen. John Romanowich, CEO of SightLogix believes...

Using smart card authentication and logical access for robust access control solutions

  Using card-based access control solutions alongside IT password management provides an additional layer of security A mandatory part of any organisation's relationship with its employees is the requirement to set up a secure password, which allows access to important documents needed to ensure fluid day-to-day processes of the business. Ken Scotland, Sales Director at ADT Fire & Security, discusses the best ways to build a more secure modern day enterprise by co...

IP security: a case for switching over

  Migration to IP-based systems is a necessary way to future-proof an organisation To say that IP security offers myriad benefits will merely be stating the obvious. The value proposition of IP is strong, as can be seen from its growing adoption. However, navigating the road to IP requires careful consideration of many factors, from network infrastructure to physical security needs. Jeremy Kimber of Honeywell analyses the true benefits of IP and provides some insights on c...

Benefits of video security systems in the mining industry

Video surveillance systems can be used in a variety of ways within the mining industry The development of specialised, integrated video security systems for specific environments has vastly increased the benefits they deliver to users. However, the mining industry has considerable scope for exploiting the more sophisticated functions provided by integrated systems with data mining techniques which have added significant value in other business environments. In this article Jan de Be...

Benefits of migrating to an all-IP video surveillance solution

  Migrate to a better system by adopting an all-IP video surveillance solution With declining prices for IP cameras and advancements in video compression technology such as the latest H.264 compression standard, IP video surveillance is increasingly becoming the preferred security solution. The convergence of voice, video and data in the world of surveillance has truly  arrived, a fact amply highlighted by the projected growth of the network video market to over $2.6...

Motion estimation in H.264 video compression

Image quality of objects in motion is greater with H.264 technology In the first part of this three part series, the authors described the H.264 video compression standard including its history. In part two, the authors discuss motion estimation, the phase during which H.264 really distinguishes itself from other MPEG standards. Differentiating from other MPEG standards: Adapting raster block sizes for more detailed images H.264 distinguishes itself from the other MPEG s...

Application of Public Key Infrastructure (PKI) in physical access control

  The Public Key Infrastructure is beginning to be adopted as a driver in physical access Traditionally associated with logical access and the digital signing of documents, Public Key Infrastructure (PKI) is now also being used to control physical access. Their use in physical access control is likely to be more prevalent with the implementation of the FIPS 201-2 recommendations this year. Derek Scheips of ASSA Abloy Future Lab explores the benefits of this key infr...

Benefits of using infrared (IR) illumination in modern surveillance environments

  Night-time surveillance has various challenges to overcome in terms of capturing high quality images There is a simple rule which determines the effectiveness of any CCTV installation - without light there can be no picture. In this article, Ian Crosby (EMEA Product Marketing Manager - Illumination of Bosch Security Systems) looks into the effects of infrared (IR) illumination on bandwidth and how the use of IR lighting can contribute to reduced cost of storage in a...

IP network camera buyer’s guide: do’s and don’ts

  Taking time to evaluate some do's and don'ts before buying an IP network camera IP network-based surveillance cameras offer enticing possibilities. However, you need to evaluate several factors before deciding on the type of IP camera installation you'd like to go for.  For example, do you want full or partial IP? How much bandwidth? Simon Nash, Senior Marketing Manager at Sony Europe explains the entire process. Transition to IP surveillance Network cameras f...

Wireless security systems: time to get serious

More attention needs to be given to wireless security technology Despite major developments in radio technology and increased demand in the market for new solutions, wireless systems are still not fully embraced by the security industry. Tony Makosinski of Honeywell Security Group asks why, and explores what the future holds for wireless technology. Although wireless technology -specifically radio - has been used in the security industry since the 1980s, penetration rates in...

H.264 video compression standard for video compression: Improvement or buzzword?

 H.264 has become the compression standard of choice in the security industry The rising popularity of the H.264 video compression standard has established H.264 as ‘the buzzword' within the video surveillance industry. With all this talk of the possible enhancements brought to the fore by H.264, Kate Huber, Peter de konik and Piet Nieuwets of Optelecom-NKF present the true benefits and shortcomings of this popular standard in the first of a three-part review.H.264...

Making video surveillance greener and leaner

Environmental implications are important considerations in surveillance system designs Rising energy costs are compelling many organisations to optimise their computing environments. In fact, energy costs have quickly become the fastest growing operating cost, propelling many corporations to embark on new conservation and "green" initiatives. Marc Holtenhoff, CEO of Aimetis, explores ways to reduce energy consumption within video surveillance applications, that could pave the...

Video analytics comes of age

   Are we about to see the first truebreakthrough for video analytics? Daniel Wan, Channel Marketing Leader UK at Honeywell Security Group, assesses the development of video analytics from a perceived premium add-on to a cost-effective and key component in video surveillance and several other security applications. Its proven benefits in perimeter protection, increasing the efficiency of manned guarding services and the ROI it delivers, particularly in preventive...

Wireless video surveillance: Opening the door to the endless possibilities

  Bridging the gaps in wired infrastructure with wireless broadband Today, public and urban business organisations have sophisticated geographically dispersed infrastructures, which require centralised supervision and the deployment of global security and surveillance networks. As the necessity for public and personal safety increases, the market and demand for multisite surveillance solutions with rigorous, video-based security standards is growing. One of the most recent...

Iris recognition systems for access control and identity management gain popularity

The use of retinal scans for security applications is increasing The eyes have it. The use of iris recognition technology is expanding around the globe and it is being utilised in a vast array of commercial and government applications ranging from access control to time management. ASSA ABLOY Future Lab examines  how this biometric technology is breaking new ground in identity management and other security applications. Retinal vs. iris scans Often confused w...

The case for thermal network cameras in video surveillance

Thermal surveillance cameras have numerous security benefits All network cameras have a basic physical limitation: they need light to work. Phil Doyle, Regional Director, Northern Europe at Axis Communications examines the key benefits of thermal imaging cameras in surveillance.  Some network cameras have night and day vision capability that allows them to operate in very poor lighting conditions, down to fractions of a lux. And of course, if natural light is not availab...

Designing IP CCTV systems

  Going back to the blueprint - assessing the challenges of designing an IP CCTV The world of IP CCTV design is continuously progressing. Security system designers and installers have to frequently evaluate customers' needs when running an IP-surveillance system on a company's network. It is up to the CCTV sales manager to eradicate any concerns regarding IP-based CCTV systems and look at the requirements of each customer, subsequently offering bespoke networks to suit the...

Tips to reduce false security alarms with proper installation, education and training

  False security alarms can be reduced with simple business practices In today's security conscious environment, repeated false alarms can be costly to a business, and not just in financial terms. A false alarm is simply the activation of one's security alarm system for no apparent reason. With the introduction of European standards and the UK implementation of PD6662 (scheme for the application of European Standards for intruder and hold-up alarm systems) and DD243 (code...

Body field communication – new technologies for access control systems

RedTacton technology makes it possible to transfer data by a simple touchCan you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and the other on your laptop? It may sound like science fiction but is actually a very real possibility thanks to a new close-range communication technology called RedTacton. ASSA ABLOY Future Lab explores the implications of this new technology. First developed by Japanese NTT...

The security camera zoom debate: is 36x really better than 18x?

Image quality is affected by more than just zoom Surveillance cameras are only as useful as the quality of images they produce.  Therefore when selecting cameras for a security system, it is imperative to select one with features that will provide the best results possible.  It is often thought that the higher the zoom, the better the quality of the images produced.  However, this is not always necessarily the case. Phil Doyle, Regional Director, Northern Europe...

Blending physical security systems with environmental design for optimised crime prevention solutions

  Poorly maintained environments send messages that undesirable behaviour will be tolerated Crime prevention is not solely the job of locks on doors or security cameras scanning entranceways. The makeup of a physical environment can influence where crimes are committed. That's why Crime Prevention Through Environmental Design (CPTED) should be an essential component to the crime prevention strategy of any building or area.  In this article ASSA ABLOY Future Labs ...

Protecting financial organisations from emerging security risks with integrated solutions

  Globalisation and new technologies have led to increased threats for financial organisations The banking and financial sector needs to be constantly prepared to manage an increasing range of security risks, from fraud and anti-social behaviour to data mismanagement. Organisations must anticipate such potential risks and have well-established plans in place to address them.  Honeywell, with more than 50 years of experience in the security industry, is helpin...

Security planning and management tips for small businesses

  Cutting costs on security investments puts small businesses at the risk of criminal activity During tough economic times, many small businesses can be found guilty of neglecting investment in their on-going security protection.  Naturally, this can prove to be problematic as the impact of break-ins and criminal activity greatly affect the accounts and day-to-day running of the business. Luke Martyn, SMB specialist at ADT Fire and Security provides practical, cost-ef...

Growth of High Definition technology in video surveillance market

High Definition technology - leading the way for new video security innovations With new technological developments and innovations constantly being made, consumers are able to enjoy the benefits of higher quality products. Better technology means better gadgets and appliances for entertainment such as televisions but more importantly, it also means better security.  Simon Nash, Senior European Marketing Manager, Video Security for Sony Professional presents the case for...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems