Banking & finance security applications - Expert commentary

Redefining access control with NFC-enabled smartphones

Comprehensive and robust security programmes and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Fur...

Security by design or designed for security?

Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles.  These principles of physical security, many of which can be drawn from proven principles of IT security, su...

Panoramic megapixel cameras boost wide area surveillance

High definition (HD) megapixel cameras can help in the surveillance of larger areas with fewer cameras while delivering superior detail and improving overall security operations. This translates into lower infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video systems with megapixel cameras and achieve better performance and functionality. In this article, Scott Schafer, Executive Vice President of Arecont Vision ex...

A long-lasting alliance between system integrators and customers promises to be favourable for both

Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for system integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced c...

Unifying identity management and access control

For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...

IP network requirements for video surveillance/physical security

IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world,...

Security guard company selection - a checklist

The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services.  In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...

Power supplies: critical component of security solution effectiveness

Security integrators prefer to standardizetheir choices of system components such as power supplies using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight; however, they play a critical role in the effective functioning of security solutions.  Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In...

Security system implementation: "bleeding edge" versus leading edge security technologies

The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge proven technology. In this article, Stephen Malia - Vice President of Engineering Services and Marketing at North A...

Lighting challenges in video surveillance in retail, financial and hospitality sectors

Ambient lighting in hospitality environments pose major challenges for video surveillance Variable lighting conditions pose a persistent challenge in video surveillance applications such as large retail locations, banks and financial institutions, and hospitality environments.Challenges to lighting quality Typically, retail locations, banks and hospitality venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the ima...

Intelligent security components pave the second wave of convergence

   Network-enabled "intelligent" security components increasingly have better computational and memory capacity The use of Internet Protocol (IP), or networking, is commonly associated with convergence. In this article, Markus Lahtinen of Lund University's LUSAX project, contends that the shift to network-enabled "intelligent" security components which increasingly have better computational and memory capacity has a significant impact on the present and future dy...

Fibre optic transmission in security and surveillance solutions

  Fibre optics enhances the operation and business bottom line of surveillance solutions Designers and end users of security systems, integrators and installers must consider and balance the functionality required of a video surveillance camera with its methods of transmission. This is the first of a 3-part examination by Mark Wilson, Marketing Vice President of Infinova, of how chief security officers (CSOs), directors and managers can understand the benefits of and...

True open platform IP video: the distinguishing characteristics

  Acquiring a true open platform surveillance software requires an informed decision Research reports pertaining to the IP video surveillance market repeatedly talk up the trend of "Open Platform". Keeping with that trend, it seems that every manufacturer is claiming its offerings to be IP-based and Open Platform. In the security industry these days, it has become almost embarrassing for a company to admit having a proprietary (single vendor) solution - there seems to be a...

Protecting financial organisations from emerging security risks with integrated solutions

  Globalisation and new technologies have led to increased threats for financial organisations The banking and financial sector needs to be constantly prepared to manage an increasing range of security risks, from fraud and anti-social behaviour to data mismanagement. Organisations must anticipate such potential risks and have well-established plans in place to address them.  Honeywell, with more than 50 years of experience in the security industry, is helpin...

Financial focus for security

When it comes to the application of sophisticated security techniques in the banking environment - to keep assets, staff and customers safe and secure - financial institutions are looking carefully at how they can seamlessly integrate advances, such as High Definition CCTV and the monitoring of their cash machines, into their existing infrastructure.  Pauline Norstrom, Director of Worldwide Marketing at Dedicated Micros, discusses the challenges. A key issue for banks is to ensure that the...

Axis Communications considers the future for the security industry

SourceSecurity.com took the time to catch up with the CEO and President of the company that invented the network camera more than 10 years ago, Axis Communications, to ask him whether the era of IP-based surveillance had arrived and what obstacles remain in the way of more widespread adoption. SourceSecurity.com: Do you think IP-Surveillance has finally come of age? Ray Mauritsson: Yes and it is not just Axis saying this.  You only need to look at the growth of sales of the network...

Where there's smoke and wire, thieves perspire: applications of artificial smoke systems

In his previous article, Matt Gilmartin of Concept Smoke Screen introduced the... well... concept... of artificial smoke as a defence against burglars.  Here he explores the practicalities of the technology and introduces us to a few of its many applications. Originally, security fog systems were exclusively a means of preventing loss through burglary, and were utilised only in the manner described in my previous article.  But advancements in technology (partly fuelled by ever-growin...

Security Smoke Systems

In the first of two articles, Matt Gilmartin of Concept Smoke Screen introduces the idea of using artificial smoke as a final - and telling - barrier against burglary, and explains the basics behind this wildly under-reported technology. Around twenty years ago, a dramatic increase in the amount of smash-and-grab and "ram-raid" style burglaries made it apparent that for a lot of premises, the three layers of "conventional" security measures were no longer enough: Physical security...