Education security applications - Round table discussions
Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...
The retired police officer who takes a cushy job as a security director is almost a cultural cliché. Like any cliché, the idea has roots in the real world, where police departments have often been a rich source of the security industry’s leadership talent. Former military personnel often find their way to the security industry, too, and realise that the familiar elements of discipline and command structure translate well. We wondered about the impact of this historic trend an...
There’s a cloud hanging over the security market. Or rather, The Cloud is portending great change for our market (and other markets, too). But with all the talk about cloud-based systems, limitations still linger along the path to optimum implementation in the security market. We asked our panelists to reflect on those limitations and look ahead five years to how the situation is likely to change. From bandwidth and connectivity challenges, to geographic limitations and even a need to chan...
You can expect to pass through tight security checks in environments, such as airports and government buildings, which are greater targets for terrorist attacks or other forms of violence. You don't expect to pass through the same level of security checks in neighbourhood shops and schools. It's a simple rule that there will be more security systems in places where there's a greater need for them. Generally speaking, there isn't such a high need for very high end securi...
Maintaining a high level of customer service can be a challenging experience when an acquisition takes place.This issue is of particular relevance to the security industry, where merger and acquisition activity continues to rise. We asked some of our Expert Panellists to share their thoughts on how both the acquired company as well as the company making the acquisition can retain the focus on their customers throughout the integration process. Here’s what they had to say.
With economic ups and downs, the global population finds itself responding and adapting in different ways to these changes. There is no doubt that changes in the economy will lead to changes in buying practices across all industries, and the security industry is by no means an exception to this. In times of economic growth, individuals and organisations will be more inclined to "splash the extra cash" on the best of the best. Whether it be deploying several new surveillance cameras in an e...
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download