Round table discussions

What career opportunities await the next generation in security?

A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?

Who should provide security solutions – the manufacturer or the integrator?

Assembling security solutions has long been considered the role of the integrator, whose role is to pick and choose the best technology tools and then to assemble the complete system. However, more manufacturers are offering pre-integrated end-to-end solutions that include multiple elements from the same manufacturer, designed to work seamlessly together. At the end of the day, end users want to know: Whose role is it to provide security ‘solutions’ – the manufacturer or the in...

What are the new developments in facial recognition?

Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?

What are new trends in residential security?

Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the...

How soon will access control cards become extinct and why?

Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why? 

How can the security industry provide affordable and cost-effective solutions?

Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical securi...

What is the potential of deep learning in physical security and surveillance?

“Deep learning” is recently among the more prevalent jargon in the physical security industry, and for good reason. The potential benefits of this subset of artificial intelligence (AI) are vast, and those benefits are only now beginning to be understood and realised. But how can we separate the marketing hype from reality? How can we differentiate between future potential and the current state of the art? To clarify the latest on this new technology, we asked this week’s Exper...

How successful is security in reducing crime rates?

Crime prevention is a basic goal of security, even if a security system merely convinces a criminal to seek out a different target. However, many of today’s security technologies are most useful after the fact, to provide forensic information about a crime that has already taken place. Solving a crime presents a whole new level of challenge. Surely, prevention is the best approach. We asked this week’s Expert Panel Roundtable: How successful is the security industry in crime preventi...

What are the misconceptions about AI in security?

Artificial intelligence (AI) is simultaneously an emerging technology, a common term in popular culture, and a buzzword in the security industry. But these aspects of the term can lead to misunderstanding in the marketplace. AI technology is continuing to emerge, but what is the reality today? How do depictions of AI in popular culture impact how it is understood in the real world of security? As a buzzword, at what point does marketing hype garble our understanding of reality? We asked this wee...

Which security markets are embracing touchless and contactless systems?

The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why? 

What is the impact of privacy concerns on physical security?

Adoption of General Data Protection Regulation (GDPR) by the European Union in 2016 set a new standard for data privacy. But adherence to GDPR is only one element, among many privacy concerns sweeping the global security community and leaving almost no product category untouched, from access control to video to biometrics. Because privacy concerns are more prevalent than ever, we asked this week’s Expert Panel Roundtable: What is the impact on the physical security market?

What are the security challenges of protecting critical infrastructure?

Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this we...