Technology & Trends - Access Control
2015 was a year of consolidations: The spring of 2015 recorded the highest acquisition rate for a six-month period in 10 years. There were single-digit market growth rates reported in video surveillance due to price erosion affecting revenues. Video solution providers are expanding into access control, and both are slowly but steadily moving into the cloud. Users want the efficiency benefits of converging access control with video verification and unified operation. There are more cloud offering...
The year 2015 has been notable in several ways. Industry changes include a rise in Chinese manufacturers in the mid- to low-end market, more mobile devices providing video surveillance, and the rise of omnidirectional and higher-megapixel cameras. Unexpectedly, the industry also saw an increase in popularity of do-it-yourself security systems and the speed with which Chinese companies saturated the marketplace with “good enough” products. Omni-directional cameras Oncam welcomes th...
Rapid expansion of access control into new roles has been fuelled by panel-less architecture Our world has changed and our industry has changed with it. Data now rules, and the network is king. The Internet of Things has driven customer expectations in how data is received and can be acted upon. Advances in panel-less pure IP technologies have allowed our customers to redefine the applications of access control. These two colliding forces have put us all in the business...
Throughout 2015 the security industry saw the appearance of numerous mobile credential offerings, signalling the “beginning of the end” of card-based identity, and strengthening of mobile offerings in general. Overall, the security industry enjoyed healthy growth throughout 2015, as reflected in the better-than-index performance of most publicly traded security company stocks. Cloud companies, in particular, saw the market turning their way, as a number of security vendors ha...
The security industry continued to grow in 2015, although it was a bit slower than expected. Most noticeably, we saw a lot of M&A activity throughout the industry, including our own new ownership under Canon. Business continues as usual, and we have and will maintain our separate brand. The industry also experienced more price pressure on hardware than in previous years. Axis U.S. expansion plans 2016, IP video, IoT The discussion of price versus value will be a common one in 2016. There...
Automated procedures reduce manual errors & help meet regulatory requirements End user demands are growing exponentially every day. Whether it is managing who has access to buildings or areas and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, the list goes on and on as to what end users must manage to keep their buildings, assets and people safe. Physical security equipment and an effective securi...
Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorised person follows an authorised personnel through a controlled entrance. More than 50 percent...
Soft targets are civilian-centric places suchas churches and retail centres, where securityis not as fortified The terror attack on Paris on Nov. 13 lasted just 23 minutes. The bombers and gunmen split up and attacked seven sites: the soccer stadium where it all began, four restaurants, a bar and a concert venue. All told, they killed 130 people and injured 368 in the time it takes for a coffee break. This situation has raised questions about the security management for conce...
Speaking at ATM Security 2015 in London, Pat Telford, principal consultant at Microsoft Canada, summarised the software threats to ATMs and the features to combat them when migrating to Windows 10. ATM security is compromised by physical attacks on the cash, physical attacks on the card, replacement of the ATM computer (black box), and malware attack (where normally a person visits the ATM and adds malware). According to Telford, there are certain immutable laws of ATM Sec...
Risk, in a security context, is the product of threat, vulnerability, and consequence Security as a discipline has been an important feature of society since cavemen started using the environment around them to protect themselves and their families. As a discipline, security has developed exponentially and that trend is continuing; however, somewhere along the way key elements of physical security design have been forgotten. All too often solutions are deployed in a pre...
Dortronics continues to focus on custom solutions in addition to its line of standard devices Security installers have new ways to add value to their specifications with switches and door controls that can be deployed in a wide range of applications to meet emerging needs of end-users. John FitzPatrick, president of Dortronics Systems Inc., Sag Harbor, New York, says the company continues to work closely with security integrators and their end-user customers to provide co...
Modern home security systems have come of age with innovative technologies that enable homeowners to have complete control over every aspect of the system. MOBOTIX’s Keith Jernigan Sr. and Hunter Fort explore the immense capabilities smart video surveillance technology to make a huge impact on the home automation systems by driving down energy costs as well as storing massive amounts of data. Home automation is not as new as most people would imagine. It has been around for several decade...
With every technological advance that canbenefit museum management comes anotherthat may assist thieves When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as m...
The Eiffel tower illuminated with colours of the French national flag on November 16 Let’s say it up front: The physical security sector has limited solutions to address events like those in Paris on the 13th November. The series of coordinated terrorist attacks consisted of mass shootings, suicide bombings, and hostage-taking in which 129 people died. Among the dead were 89 people at the Bataclan theatre where American band Eagles of Death Metal was playing at the t...
Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...
The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...
Recycling ATMs, which can reuse deposited cash to supply withdrawals, are another way in which ATM-associated crime can be reduced With some 3 million automated teller machines (ATMs) around the world, they are bound to be seen as attractive targets by some criminals. Banks need to ensure customers do not fall prey to skimming and other malicious attacks from criminals, by having an effective ATM security in place. The advent of contactless technology has eliminated the need...
Security cameras provide live, real-time videoto assist security personnel in spottingpotential or real problems Efficient security systems for parking structures deter criminal activities and anti-social elements from destroying property. Over the years, security companies have responded to this need and developed a range of security systems for parking facilities, such as audio intercoms, access cards and video analytic solutions. Systems integrators who want to add new ser...
Social media channels have active and consistent users and may constitute a promising audience for security integrator’s marketing efforts If you have any lingering doubts about the impact of social media, consider this: Worldwide, there are over 1.44 billion monthly active Facebook users, which is a 13 percent increase year over year, according to the social media giant. In addition, 936 million people log onto Facebook daily (as of March 2015), whi...
(Click to see larger image) The ASIS Foundation & the University of Phoenix College of Security and Justice's Enterprise Security Competency model Are you competent in your security job or profession? How do you know? According to research carried out by the ASIS Foundation, security has begun to evolve beyond guarding doors, checking IDs and screening briefcases and purses. Today, something called Enterprise Security Risk Management (ESRM) is subsuming the...
Conley’s security officers must study for and acquire a Certified Protection Officer (CPO) certification After nearly 40 years of a sustained and concentrated effort to transition the security industry to the security profession, Tom Conley is still beating his “security profession drum” at full volume. He still hopes that the security industry-to-profession movement will one day be a reality. He sees himself as an eternal optimist embarking on a feat of...
Home security devices are evolving and expanding their offered features, providing new opportunities for the security industry Home security isn’t just home security anymore. These days cameras, door and window alarms are just pieces of the web–enabled “smart home.” And, the home is getting smarter, as service providers begin to merge home security systems with home automation. The added value of these additional features is now drawing more potential c...
The vision of a utopian urban future restsheavily on the success of Open Dataand a Cloud Computing paradigm Confronting urban challenges using technology requires the private sector to work in tandem with governments to enable "smart cities." In fact, one report predicts the number of safe cities worldwide will quadruple in the next decade. It’s a topic that is increasingly top-of-mind. For example, the Safe Cities Asia 2015 conference in Singapore in May brought to...
Problems caused by physical systems in terms of cyber-attack are quite extensive, damaging systems and assets Security experts of various disciplines agree that physical systems are increasingly being leveraged in attacks on organisational networks and supply chains. Many manufacturers maintain that security (including that of security systems) is the responsibility of the end user, which would be fine if they were only expected to maintain security and not create th...
The security industry’s continued migration to networked IP-based systems ensures that PoE will be integral in their design and installation Power over Ethernet (PoE) has without question become the de facto choice of security installers for delivering power to security and access control devices. This should come as no surprise given PoE’s ability to reduce labour and installation costs by delivering power and data over a single cable, thereby increasing overall t...
For high value individuals such as the Pope,agencies have access to unlimited publicresources in terms of money and people The Pope’s visit to the United States reminds us that protecting big-name executives, celebrities and dignitaries is a highly specialised security function. Public and private executive protection groups begin preparing for the visit of major world figures months ahead of time. “It is a task of massive proportions,” says Tom M. Con...
NVRs make it easy to benefit from HD solutions and integrations to access control, alarm systems, intercoms and other technologies Developments in the IP video camera market have a direct impact on the other components in a system. With the emergence of higher definition cameras – whether 4K cameras or 8K or even higher – the market now needs back-end devices that can perform the decoding work. Also, more intelligence is needed, including smart functions such as pe...
How do you get all of your various vendors, services, resources, manpower, and technology to integrate and work together? Creating an efficient operating environment in physical security is no small feat - especially when the organisation undertaking such an endeavour has a nationwide presence. How do you get all of your various vendors, services, resources, manpower, and technology to integrate and work together? How do you aggregate all of the data being recorded into in...
It’s dangerous to compromise on safety features in search of a low-cost security solution, as it can put employees at serious risk Driving quality in the private security industry is vital to the ongoing effectiveness of the products and services that the industry provides. Figures show that, post-recession, buyers are increasingly aware of the importance of quality when it comes to choosing security providers, with 20% citing quality over price as a crucial factor i...
Enterprise security strategies identifyliabilities & ways to mitigate risks, showinghow the cost of mitigation prevents largerliabillity costs The security profession continues to take on new risk management responsibilities. The big thing now is called Enterprise Security and Risk Management (ESRM). ASIS International has issued a standard on the subject: ANSI/ASIS/RIMS RA. 1-2015, and a couple of booths at the recent ASIS International 2015...
Browse expert commentaries
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera
Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download