Technology & Trends - Access Control

Finding the right approach – Identity management in the pandemic and beyond

Over the past year, companies have had to deal with the COVID-19 pandemic and how it has affected their operations. From new digital services through to security, the response to more hybrid and remote working showed some of the assumptions that we have made over the years, and it required companies to innovate and fill those gaps. Physical and IT security was no exception to this. In the rush to support home working, many IT security teams realised how much they rely on physical security to he...

Hybrid working and the threat of desk data

The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing s...

Video intercoms for a smarter, safer workspace

Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offi...

How technology can elevate guest services and their security

The return to the workplace is a focal point for many in the built environment but one of the most important elements is easy to overlook. Guest services will be vital in the return to the workplace. Front-of-house teams will be responsible for welcoming building users back and reassuring them as they negotiate shared spaces in the post-Covid era. The workplace will inevitably look different after Covid. We have become more aware of our spaces, how clean they are, and what spaces building users...

Q&A: Bosch Video Systems & Solutions' Michael Seiter and Magnus Ekerot on smart technology, "AIot", and plans for 2021

Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to con...

VSaaS and ACaaS uptake increases due to cloud adoption as a result of COVID

While COVID-19 caused widespread disruption and many challenges for businesses, its sudden arrival prompted some very quick decision-making around how to maintain operations. For some businesses, cloud-based video conferencing solutions provided a welcome alternative to meeting face-to-face. A year on and it seems that this sudden and mass adoption of cloud has accelerated a digital transformation process in other departments. Physical security too is increasingly moving to the cloud in the form...

What to ask yourself before choosing a Critical Event Management solution

What would you do if, tomorrow morning, you opened your work laptop to see a ransomware demand? “Oops: Want Your Files Back? Here’s How to Pay”. It’s a pretty terrifying prospect. In that moment, IT and senior management are rushing to restore previous versions via advanced cybersecurity – or if they can’t, they’re considering paying up. As for the rest of your company’s employees, their online training modules in how to prevent a cyber-attack or...

Digital ethics should be a key performance indicator for all tech leaders

In the 1977 book, The Age of Uncertainty, author John Kenneth Galbraith wrote, “All of the great leaders have had one characteristic in common: it was the willingness to confront unequivocally the major anxiety of their people in their time. This, and not much else, is the essence of leadership.” Fast-forward four decades, and we are facing uncertainty like no other - anxiety levels are high, and fake news has become part of our daily lexicon. With this in mind, what can security an...

We need to talk about intelligent enclosure protection

Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actual...

Will network requirements help you build your business or put you out of business?

Once upon a time, providers had end-to-end control when deploying a physical security platform, which is not the case anymore when we consider the modernisation to IP. When considering the move to IP physical security, the provider needs to ensure the customer has a robust PoE backbone to connect the IP security device back to the application. Network readiness requirements have complicated IP security deployments, making it challenging for current providers while opening the door to new compet...

Will network requirements help you build your business or put you out of business?

Once upon a time, providers had end-to-end control when deploying a physical security platform, which is not the case anymore when we consider the modernisation to IP. When considering the move to IP physical security, the provider needs to ensure the customer has a robust PoE backbone to connect the IP security device back to the application. Network readiness requirements have complicated IP security deployments, making it challenging for current providers while opening the door to new compet...

AI is transforming the security industry

We encounter AI with increasing frequency, both online and in the media. AI has penetrated deep into various aspects of our lives, from TV sets that improve picture quality using AI, or air conditioners with automatic temperature and humidity control, to investment management services that predict return rates. AI technology first appeared in the 1950s and was briefly revived in the 1980s before falling off the radar. In the late 2000s, AI re-emerged and went on to become a key technology and d...