Technology & Trends - CCTV cameras

How video storage ensures critical data isn’t lost

The fundamental value of data is widely apparent in modern society, and its loss may have significant consequences Video data is critical to today’s enterprise. The latest video storage systems must offer dependable operation that doesn’t risk loss of that critical data. DDN - When performance matters “Not only is bandwidth very important, but functionality cannot be lost when a storage system is having a bad day,” says Jeff Adams, director of sales,...

Mitigating risk and achieving compliance while reducing cost

“Better, Faster, Cheaper – choose any two” is the old adage for computerised systems.  When it comes to businesses subjected to federal or industry security regulations, the equivalent saying might be, “mitigate risk, achieve compliance, or reduce cost – choose any two.” So if there were a way to have all three that would get your attention. Complying with regulations More and more industries are subjected to some form of regulation....

Ethics and the security industry: Time to show leadership

Most of us have a basic instinct as to what is and is not ethical behaviour. But is instinct enough?  “Ethics and the security industry is a balancing act,” says Mike Hurst, vice chairman of the UK Chapter of ASIS International. “Most people will have an instinct as to what ethical behaviour is, but there’s an absence of hard and fast rules.” Examples often crop up in video surveillance situations, Hurst says. For instance, when and where i...

How SIP-enabled intercoms open up communication with security departments

The trend towards greater unification is facilitated by an all-encompassing shift to IP technologies As more organisations are looking for ways to maximise resources and increase operational efficiencies, unification of multiple security and business systems is gaining popularity. From the central command center, there is significant time lost when operators have to jump from video surveillance to access control systems to analyse an incident and take appropriate measures. Eve...

Convergence of VMS and access control

Michael Byrden, Sales Director of ACT, considers the convergence of facility management. He describes how ACT, the access control manufacturer, has acquired a VMS and analytics development house in order to unify security solutions and bring customers nearer to the goal of a truly intelligent building. Desire for open systems Major acquisitions have been dominating the news recently and, even if this lays me open to a charge of naivety, I genuinely believe that they aren’t predatory. As...

Security consultant promotes standards to protect schools

Timm typically walks through school buildings to assess vulnerabilities, and recommends systems and products As an independent school security consultant, Paul Timm of RETA Security conducts security assessments and provides technical assistance for numerous school districts throughout the United States and Canada. Timm typically walks through school buildings to assess vulnerabilities, and recommends systems and products, practices and policies, and other strategies to optimi...

Digitisation and the physical security industry

Since 2006, the LUSAX research program at Lund University in Sweden has investigated the effects of digitisation on the physical security industry. This article will look into the forces driving digitisation, and how those forces broadly translate and impacts the physical security industry. Historically, physical security systems have moved from purely mechanical systems into systems holding both mechanical and electronic low-voltage circuit-based components. Development was...

Technology contributes to holistic security approach at primary/secondary schools

Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting primary/secondary schools. Technology can contribute to a broader, holistic approach to security that is customised to meet the needs of each educational institution. Honeywell has helped many schools customise security systems to meet each school’s unique needs, says Bruce Montgomery,...

Physical security technology aiding Nepal earthquake response

The physical security community is contributing expertise and equipment of many kinds to the country As rescue teams and aid workers from around the world converge on Nepal after the country's 7.8-magnitude earthquake, the physical security community is contributing expertise and equipment of many kinds to a country whose government has described it as being “on a war footing.” At time of writing, conservative estimates of the fatalities are around 5,000, but many,...

Challenges to video analytics adoption

see bigger image Figure 5: Providing correct and useful results requires intersection of user intentions, VCA interpretation, and results provided by VCA tool The term Video Content Analysis (VCA) is often used to describe sophisticated video analytics technologies designed to assist analysts in classifying or detecting events of interest in videos. These events may include the appearance of a particular object, class of objects, or action. VCA technology employs a comple...

Security needs persist despite budget challenges of primary/secondary education market

Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades Limited financial resources are a common pain point for primary/secondary schools looking to implement cutting-edge security technology. But security needs persist despite scarce resources. All school administrators want to do everything in their power to secure their facilities against threats. More schools are recognising the benefits and, in some cases, requiremen...

Video surveillance trends driving increasing storage needs

End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also, small- and medium-sized enterprises (SMEs) are turning to networked video surveillance in larger numbers. And video is now finding many uses outside the security market, including business intelligence and customer service applications, among others. These familiar trends are directly impacting the choice of video storage solutions being used i...

Integrity matters for business success, not gender, says Chicago-based integrator

Wong was the first Asian woman to obtain the Alarm Contractor License Mun C. Wong, PSP and president of VinTech Systems Inc. in Chicago, is a successful entrepreneur who has brought new technologies and a knack for superior service to her integration business.  In fact, at the age of 29, she was the first Asian woman to obtain the Alarm Contractor License from the State of Illinois and its Department of Financial and Professional Regulation. But she doesn't focus on gend...

Battling the $36 billion U.S. problem of retail shrinkage losses

Employees are the front line of defence — as well as the most economical defence — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...

Integrators should foster relationships to increase primary/secondary education sales

Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (primary/secondary) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience...

School security: Communication and controlling access

Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...

Sounds of security: convenience stores adding audio to reduce crime

Audio systems can enhance liability protection. Recently, a large regional convenience store chain with units across the Midwest and South supplemented its video surveillance security system with an audio monitoring system. Retail stores with Louroe audio system: The technology has been installed in more than 700 of the convenience retailer’s locations. The Louroe Electronics systems feature omni-directional capability and sensitivity and pick up sound within a 15-foot...

Networking basics for security professionals: What do layers really mean?

Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...

Education-centric PSA-TEC 2015 show to focus on integrators and installers

It’s that time of year: show season! And for systems integrators and security installers, PSA-TEC is one of the quintessential annual conferences, offering hundreds of hours of education and training during the May 4-8 show (exhibits are May 6). Hotel registration at the Westin in Westminster, Colo., is due on or before April 16. PSA Security Network was established in 1974 as the Professional Security Alliance, Inc. dba PSA Security Network and is now the world’s largest electronic...

Convergence of IT networks and physical security

Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...

Technology advancement requires well-educated, well-paid security officers

The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control centre. The post of security officer was a minimum wage job requiring little more than a high school diploma, if that. Educated and experienced security officers a prerequisite No more. “Today, when we read our requests for proposal (RFPs), we’re...

The Internet of Things presents new cyber-vulnerabilities

Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...

Deploying a high-performance computing environment to minimise processing costs

Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...

Impact of school shootings on demand for security systems

School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (primary/secondary) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase in de...

Networking basics for security professionals: Considering 4k’s impact on networks

Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HDTV, which in some cases was defined in terms of its resolution of 1920 hor...

Networking basics for security professionals: Do you believe in specifications?

Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...

Addressing the unique security challenges of primary/secondary schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

SIA responds to BBC report alleging fraudulent licencing

A BBC report Monday alleges instances when Security Industry Authority (SIA) licences were fraudulently obtained, prompting questions about licencing processes and whether unqualified candidates are being "fast-tracked" and provided SIA cards without taking the required hours of training and passing exams. Following is a statement provided to SourceSecurity.com by Robert Buxton, head of communications, Security Industry Authority, about the matter: SIA assures investigation over...

Lower costs by getting security assessments right

A comprehensive security assessment will tell how to plan and manage security in the facility A comprehensive security assessment will tell you how to plan and manage security in your facility. Without an assessment, you can only guess about security. For facilities with existing security programs, an assessment can also reveal whether the pieces of the system are working as they should. As a security director, can you do the assessment yourself? Sure, although a large school...

Sports security: Ensuring safety at sports venues a continuing challenge

Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across several countries during a week when UBM announced that Protection & Management 2015 (which includes the IFSEC International trade fair) will feature Karren Brady (Baroness Brady), a career soccer executive, as one of its inspirational keynote speakers. As I type, inquests are being held into the deaths of some of the 96 people who were kill...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems