SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique environments
Biography
Larry Anderson
Specialist areas

Larry Anderson

Editor, SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com US Edition's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals. Larry also commissions Expert Commentary / Thought Leadership features, providing a platform for the industry's top executives to comment on the dynamic security marketplace.

From 1996 to 2008, Larry was editor of "Access Control & Security Systems" magazine and its affiliated website. He has written numerous articles for and about some of the largest companies in the security industry. He earned a Bachelor of Arts from Georgia State University with a minor in marketing.

Round Table contributions by Larry Anderson

How can IP networked systems adapt to lost connectivity?
How can IP networked systems adapt to lost connectivity?

Comment: Assuming localised power, networked video and security edge devices continue to operate in the case of a network outage. Cameras continue to...

What if a customer expects more than a security system can deliver?
What if a customer expects more than a security system can deliver?

Comment: Depending on the customer and the system provider, any number of things could happen, none of them pleasant. If a system doesn't deliver on the...

What security applications are best suited to smartphone apps?
What security applications are best suited to smartphone apps?

Comment: Almost any security application is suited to a smartphone app – and many (if not most) of them are moving in that direction. Increasingly,...

What is the value of edge-based video storage for IP surveillance systems?
What is the value of edge-based video storage for IP surveillance systems?

Comment: Storage at the edge is part of a trend toward “distributed” rather than centralised systems. Capturing images at the edge can be...

Articles by Larry Anderson

Milestone pledges to 'Make the World See' at upbeat MIPS 2017Milestone pledges to 'Make the World See' at upbeat MIPS 2017
Are the glory days of IP video behind us? Not by a long shot, if you listen to the upbeat message at ‘Milestone Community Days ’ in San Antonio this month. Pledging to...
Smartphones offer many advantages over cards and fobs for access controlSmartphones offer many advantages over cards and fobs for access control
Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious...
Physical, cyber and network security enable Recovery Point’s business continuity servicesPhysical, cyber and network security enable Recovery Point’s business continuity services
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a...
Veracity expands scope with acquisition of software provider icomplyVeracity expands scope with acquisition of software provider icomply
Veracity, the Scottish company specialising in IP video transmission, storage and display, has made a small but significant acquisition that has the potential to impact its business profoundly,...
CES 2017: Will consumer electronics transform the physical security industry?CES 2017: Will consumer electronics transform the physical security industry?
Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they want their smart home systems to...

Show all

Related articles
SourceSecurity.com’s top 10 Expert Panel Roundtable discussions in 2015SourceSecurity.com’s top 10 Expert Panel Roundtable discussions in 2015
SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions. Not surprisingly, the discussion...
Huge China Public Security Expo (CPSE) reflects China’s growing security marketHuge China Public Security Expo (CPSE) reflects China’s growing security market
There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The...
Video storage system cost considerationsVideo storage system cost considerations
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic...
Rethinking physical access control to operate in an IT-centric environmentRethinking physical access control to operate in an IT-centric environment
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time...
What's next for Vicon? We asked the new CEOWhat's next for Vicon? We asked the new CEO
The merger of Vicon and IQinVision has been one of the more interesting business developments in the security and video surveillance markets in 2014. Wondering how the merger is working out, I...

Show all

Bookmark and Share

See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition