Airports & ports security applications - Expert commentary
Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...
Applications that reside in the cloud offer enterprises previously unavailable levels of agility, productivity and vital flexibility – all at a crucially lower cost than ever before. However, with many enterprise cloud deployments now successfully up and running, plus the integration of the Bring-Your-Own-Device (BYOD) culture into the workplace, the complex issue of data security and access control have leapt to the fore. Ian Lowe, Senior Product Marketing Manager...
Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from a company’s...
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...
Comprehensive and robust security programmes and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device. Fur...
Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles. These principles of physical security, many of which can be drawn from proven principles of IT security, su...
High definition (HD) megapixel cameras can help in the surveillance of larger areas with fewer cameras while delivering superior detail and improving overall security operations. This translates into lower infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video systems with megapixel cameras and achieve better performance and functionality. In this article, Scott Schafer, Executive Vice President of Arecont Vision ex...
Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for system integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced c...
Thermal video analytics identify intruders despite background water movement or glare off the water Ports represent a major point of vulnerability that could have potentially devastating effects on a nation’s economy. Securing a nation's ports is essential, and port perimeter security is the first line of defence against disruption to global commerce. In this article, SightLogix CEO, John Romanowich, explains how thermal cameras with embedded video analytics have bec...
For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...
The idea that homeland security starts with hometown security cannot be overemphasised Public security and safety is the responsibility of all people, as much as it is of the police and security officers. Ordinary people can contribute to the timely detection and prevention of any serious security threat by staying alert, recognising suspicious activity and reporting it to relevant law enforcement authorities. In this article, George Anderson, Vice President, Operations for th...
IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world,...
Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of nuisance alarms. In this article, John Romanowich, CEO of SightLogix, lists some of the typical challenges with outdoor surveillance as well as...
The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services. In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...
Security integrators prefer to standardizetheir choices of system components such as power supplies using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight; however, they play a critical role in the effective functioning of security solutions. Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In...
The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge proven technology. In this article, Stephen Malia - Vice President of Engineering Services and Marketing at North A...
Fibre optics enhances the operation and business bottom line of surveillance solutions Designers and end users of security systems, integrators and installers must consider and balance the functionality required of a video surveillance camera with its methods of transmission. This is the first of a 3-part examination by Mark Wilson, Marketing Vice President of Infinova, of how chief security officers (CSOs), directors and managers can understand the benefits of and...
Acquiring a true open platform surveillance software requires an informed decision Research reports pertaining to the IP video surveillance market repeatedly talk up the trend of "Open Platform". Keeping with that trend, it seems that every manufacturer is claiming its offerings to be IP-based and Open Platform. In the security industry these days, it has become almost embarrassing for a company to admit having a proprietary (single vendor) solution - there seems to be a...
SourceSecurity.com took the time to catch up with the CEO and President of the company that invented the network camera more than 10 years ago, Axis Communications, to ask him whether the era of IP-based surveillance had arrived and what obstacles remain in the way of more widespread adoption. SourceSecurity.com: Do you think IP-Surveillance has finally come of age? Ray Mauritsson: Yes and it is not just Axis saying this. You only need to look at the growth of sales of the network...
In his previous article, Matt Gilmartin of Concept Smoke Screen introduced the... well... concept... of artificial smoke as a defence against burglars. Here he explores the practicalities of the technology and introduces us to a few of its many applications. Originally, security fog systems were exclusively a means of preventing loss through burglary, and were utilised only in the manner described in my previous article. But advancements in technology (partly fuelled by ever-growin...
In the first of two articles, Matt Gilmartin of Concept Smoke Screen introduces the idea of using artificial smoke as a final - and telling - barrier against burglary, and explains the basics behind this wildly under-reported technology. Around twenty years ago, a dramatic increase in the amount of smash-and-grab and "ram-raid" style burglaries made it apparent that for a lot of premises, the three layers of "conventional" security measures were no longer enough: Physical security...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download