Larry Anderson's Security Beat
In 2017, SourceSecurity.com covered topics from all corners of the physical security industry - from video surveillance to access control to intrusion detection and beyond. But just how much have you been paying attention to the industry this past year? Does your knowledge of the cloud soar high above your colleagues and security friends? Can you recall your facts faster than 60-fps? Are you hooked into the mainframe with your expertise in cybersecurity? Now you can find out. We...
Despite the increasing popularity of body-worn cameras, the technology has its detractors. For example, this month Big Brother Watch, a British civil liberties and privacy organisation, is raising new questions about the effectiveness of body-worn cameras. Specifically, Big Brother Watch found that 32 of the 45 police forces that have adopted body-cams in the United Kingdom were “unable to say” how often the footage was used in courts. To be clear, being “unable to say” d...
Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. Much of the current concern about securing electrical substations in the United States originated in response to a 2013 sniper attack, us...
Working together to develop an intelligent body-worn camera for public safety users, Motorola Solutions and artificial intelligence (AI) company Neurala are demonstrating how AI can be added to everyday devices such as smart phones using existing hardware platforms. AI software, working at the “edge,” provides the capability to add AI functionality to existing cameras, such as Motorola’s Si500 body-worn camera. An agreement to develop the products follows Motorola&rsquo...
The European Union has spelled out specific requirements and safeguards for handling and protecting personal data. In the General Data Protection Regulation (GDPR), the EU makes clear exactly what is expected of those who control and process data. (The United Kingdom has committed to follow the regulation despite the Brexit vote.) Everyone is facing a deadline on May 25th 2018 to comply with the GDPR. What are the exact implications for the physical security market? What do customers need to do...
An expanding outreach and programming targeted especially to international visitors are among the ways ASIS International is seeking to attract more global attendance than ever to its 63rd Annual Seminar and Exhibits, which will take place between 25-28 September in Dallas, Texas. In addition to returning, long-time international visitors, ASIS International is looking to expand global attendance. One initiative is the International Buyer Program (IBP), a joint government/industry effort, whic...
Cloud-based video systems are becoming more common in the market, growing faster than on-site recording systems. One of the largest companies in the cloud video sector, Eagle Eye Networks is aggressively expanding its offerings to the fast-growing market, and its geographic reach, with acquisition of Panasonic’s cloud-based video business, including the CameraManager and NuboCam brands. Expanding Eagle Eye Networks' coverage in Europe The acquisition will expand Eagle Eye Networks’...
With global events putting security at the forefront of everyone’s minds, IFSEC International 2017 was a chance for the industry to come out in force. Over 600 exhibitors and numerous seminars kept visitors informed on the latest innovations in security products, solutions and best practice. Despite the challenging heatwave, exhibitors were raring to go for the three mercifully air-conditioned days of the exhibition. SourceSecurity.com took to the show floor to check out what exhibitors we...
A growing emphasis on the impact of data – storing it, analysing it, and getting more value from it – was a common theme at this year’s IFSEC. Throughout the three days of the show at London’s ExCeL exhibition centre last week, there were many conversations about the growing benefits of the data generated by today’s physical security systems. Industry embraces deep learning & artificial intelligence Video analytics increasingly critical Access control provi...
Exhibitors at this year’s IFSEC are thinking outside the box in terms of how they communicate their value proposition and how they interface with customers. In the process, some are rethinking how big trade shows like IFSEC fit with their goals. Panasonic's approach to the 'race to the bottom' Thomas Lausten, MOBOTIX new CEO How Gallagher benefits from IFSEC without exhibiting Panasonic Systems Communications Europe Panasonic Systems Communications Europe is one of several compani...
Has there ever been a better time for a security trade show in Europe? Shifting threats such as terrorism and a volatile political climate serve as reminders every day of the importance of security in our lives, and even the role of technology. IFSEC opened in London on Tuesday at the ExCeL centre, covering every aspect of security, from access control and video surveillance to home automation and perimeter security. Amid sweltering heat, attendees came to find the latest-and-greatest innovatio...
How do you make a 63-year-old organisation even better? That’s the challenge for ASIS International as it continues an effort to be more transparent and inclusive, and to adapt to 21st century work environments. Transforming the focus of ASIS International “ASIS International is undergoing a tremendous amount of transition and reexamination, creating a lot of opportunities,” says Amy Fischer, Vice President of Marketing and Communications. There’s a new CEO and there h...
A technology poised to transform the physical security market is deep learning, which is a neural network approach to machine learning, differentiated by an ability to train using large data sets for greater accuracy. In effect, the system “learns” by looking at lots of data to achieve artificial intelligence (AI). Phases of deep learning I heard a lot about AI, including how it can transform the physical security marketplace, when I attended NVIDIA’s GPU Technology Conferenc...
Project registration programmes are a benefit manufacturers provide to systems integrators and security dealers who are bidding on an upcoming installation project. In effect, the integrator registers a project he or she is bidding on with a manufacturer, which offers pricing discounts to that integrator for that specific project. Such a programme seeks to encourage an integrator to specify a manufacturer's products, while making it more difficult for a competing integrator to bid lower on a pro...
Axis Communications, the global provider of intelligent surveillance technology, yesterday held the official launch of the new Axis Experience Centre in Luton. The event was a chance for Axis’ partners to meet with the senior management team and explore how the new centre operates, all the while celebrating the company’s 20th anniversary over a glass of champagne. The centre was officially opened by Axis Communications co-founder Martin Gren, along with Bodil Sonesson, the comp...
The ASIS International 63rd Annual Seminar and Exhibits, held between September 25th-28th in Dallas, will see several changes in 2017. The ASIS Board of Directors has directed ASIS staff members to look for new ways that the yearly show can provide more value, while continuing a 63-year tradition and demonstrated ability to serve the market. Under the general leadership of the Board, ASIS staff members have evaluated feedback from members, exhibitors and attendees to guide them as they seek to r...
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and informat...
The enthusiasm of ISC West 2017 continued through to the final hours of Friday, reflective of a show jam-packed with new technologies to address industry trends. Exhibitors seemed happy enough with booth traffic, which held up even on the final day. Security industry trends Industry trends drove much of the technology. For example, cameras are getting less expensive, which means it’s more cost-effective to specify systems with higher camera counts. Also, cameras are providing more data...
For all its value in the security market, one has to wonder: How much captured video is actually used for security? Among hours and hours of video, only brief segments here or there are ever actually viewed or used for security applications, such as to review an incident or to provide evidence in court. But what about all that other video, much of it stored for 30 or 90 or 120 days or longer? Does it have to be merely a costly consequence of providing the security benefits of video? Not necess...
ISC West in Las Vegas kicked off Wednesday with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of “the security industry.” Qognify QBlock and Cloudscann “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the...
The attack on Parliament in London is another reminder that a facility's security is only as strong as its weakest point. In this case, it was a frequently used gate in New Palace Yard that was left unlocked. Known as Carriage Gates, the entrance is generally monitored by police officers. Could the weakness have led to the attack? Could the attack have been prevented (or minimised) if the gate had been bolted shut? Planned ‘complete security overhaul’ Finger pointing in the wake of...
Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual devices and controls In effect, a s...
Artificial intelligence and deep learning are poised to transform how video images are used and managed. In today’s surveillance systems, video from more and more cameras leave operators at risk of drowning in data, requiring hours of manual effort to track assets or persons of interest. They need more intelligent systems. Among the new tools is use of neural networks to create video analytics systems that are trained, not programmed. In effect, the systems have the ability to “lear...
Several of the hot trends in the physical security industry – robots, drones, video analytics – have one thing in common: The need for greater intelligence. More complex physical security systems that incorporate artificial intelligence, deep learning, speech recognition and other sophisticated functions depend on a higher-than-ever level of computing power inside embedded devices at the edge. Graphics processing unit Graphics processing unit (GPU) manufacturer NVIDIA is empowering...
A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. “For responders, the police department doesn’t have to manage cameras, but has the instant availability of a camera feed,” says Kathleen Grigg...
Are the glory days of IP video behind us? Not by a long shot, if you listen to the upbeat message at ‘Milestone Community Days’ in San Antonio this month. Pledging to ‘Make the World See,’ the community of technology partners, distributors, integrators and customers joined in a celebration of past successes, with an emphasis on future possibilities, at the yearly gathering hosted by the video management system (VMS) vendor. Milestone software integrations "The industry...
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large,...
Veracity, the Scottish company specialising in IP video transmission, storage and display, has made a small but significant acquisition that has the potential to impact its business profoundly, according to the company. Known for its COLDSTORE surveillance storage system and other video products, Veracity is expanding its scope with the acquisition of I-Comply Ltd. (icomply), a provider of command-and-control software whose UK customer base includes universities, hospitals, cities and power and...
Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they want their smart home systems to perform. We have heard the Internet of Things (IoT) buzzword in our market, and it is also a major force in the changing consumer electronics arena. Because consumer electronics are increasingly tied in with security, many in our industry keep a close eye on developments at the huge Consumer Electronics Show...
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Expert commentary
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download