Round table contributions
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
High-quality products are the building blocks of successful physical security systems. How they are packaged may sometimes be seen as an unimportant detail or an afterthought. But should it be? Effective packaging can serve many functions, from creating a favorable customer impression to ensuring the product isn’t damaged in transit. Packaging can also contribute to ease of installation. On the negative side, excess packaging can be an environmental concern, especially for customers who are sensitive to green factors or to minimising waste. We asked this week’s Expert Panel Roundtable: Is packaging of products important in the commercial security market? Why or why not?
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What role can social media play in security?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
The manufacturers behind today’s security technologies are a varied bunch. There are large manufacturers with deep pockets and plenty of resources. And there are smaller manufacturers who are nimble, can react faster to changing market conditions and to whom each customer represents a hard-fought win. There are also plenty of manufacturers in the middle ground. But what impact does the size of a company have on the quality of its products? We took the question to this week’s Expert Panel Roundtable: Is there a correlation between the size of a manufacturer and the quality of its products – for better or worse?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?
Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?
The new year presents new opportunities for the physical security marketplace. In many ways, 2018 will undoubtedly see further development of trends we saw in 2017. In fact, some of the trends determining the future of the physical security industry have been in place for many years. However, not every event in 2018 can be foreseen or easily predicted. To be sure, it is sometimes the surprises that keep life interesting! We asked this week Expert Panel Roundtable: What will be the security market’s biggest surprise in 2018?
The end of the year is a great time to take stock of one’s accomplishments during the year, and to reflect on successes and failures, where we are and where we’re going. 2017 brought a lot of change to the physical security market, but were the changes positive or negative? Our Expert Panelists tend to be a thoughtful and reflective group, so we wanted to get their thoughts and insights at year-end about 2017 in the security market. We asked this week’s Expert Panel Roundtable: Was 2017 a good year or bad year for the physical security industry -and why?
In recent years, information technology (IT) departments at end user companies have often been seen as adversaries of traditional security departments – or, at least, as a thorn in their side. One of the issues is territorial: As physical security products have migrated to use of Internet protocols and the network infrastructure, the IT and security departments have clashed – erm… make that interacted – more and more often. New realities such as cybersecurity have made it critical that the two entities work in harmony, and IT professionals often provide useful insights into product selection, among other issues. We asked this week’s Expert Panel Roundtable: What is the influence of the IT department on security purchases at an end user company?
It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most commonly the use of forensic video. Isn’t there more our industry can do before such events occur? We put the question to this week’s Expert Panel Roundtable: How can security systems be used to predict bad things before they happen?
We have been hearing about smart buildings for more than a decade, but the increasing profile of the Internet of Things (IoT) expands the possibilities for intelligent building systems and makes them even more attainable. Security is often among the “smart” functions of a building, and the capabilities of many physical security systems can contribute in new ways to building intelligence. We asked this week’s Expert Panel Roundtable: What is the impact of “smart buildings” on the physical security marketplace?
As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security challenges for schools and colleges?
Even the most effective technologies usually require some level of human involvement. What new technologies do, generally speaking, is change the nature of a human’s role. Most jobs in today’s world are vastly different than 50 years ago, in many cases because of the changing role of technology. In the physical security world, what specific impact does technology have on the human element of systems? We asked this week’s Expert Panel Roundtable: Have recent developments in security systems made manpower more, or less, important to the equation? Explain.
ISONAS Inc., a Pure IP access control system manufacturer and part of the Allegion family of brands, announces that the company will be showcasing its full line of Pure IP access control hardware and software in the Allegion booth (#3715) on Sept. 25–27 during the Global Security Exchange (GSX) exhibition at the Las Vegas Convention Center. GSX, formerly known as the ASIS Annual Seminar and Exhibits, presents a growing focus on an international audience coming together to share ideas, explore options and invest in security solutions. GSX will be the first display of ISONAS as part of the Allegion family after the acquisition in early July. With their prominent technologies in tow, Allegion and ISONAS will provide the industry a view into the power of retaining the four major technologies driving growth in the market. These solutions include wireless locks, Pure IP, open architecture reader-controllers, access control as a service (ACaaS) and mobile credentials. Access control hardware ISONAS hardware integration with software partner Genetec, will be released in the fourth quarter of this year and a sneak peek will be available in the Allegion booth The technologies provide customers the opportunity to protect even more of their facility for less with wired or wireless solutions all controlled from a single, head end software through partners like Open Options or Genetec. The ISONAS hardware integration with software partner Genetec, will be released in the fourth quarter of this year and a sneak peek will be available in the Allegion booth and in the Genetec booth (#2951). This new technology integration allows customers to choose the best-of-breed software and pair it with the next evolution in access control hardware, the RC-04. The ISONAS RC-04 family revolutionises the ease of install, significantly reduces costs and the powerful addition of Bluetooth(R) Low Energy(BLE) makes access control hassle-free by allowing the use of a smart phone as a user's credential. In addition, ISONAS’s leading cloud-based access control software, Pure Access, along with their network-based edge device, the RC-04 reader-controller, will be on display in the Allegion booth (#3715). Revolutionise the industry Over the years, ISONAS has made a strong impact on migrating the access control market to Pure IP hardware powered by the network and continues to revolutionise the industry. “We are excited to be part of Allegion and showcase our line of access control software and hardware at their prestigious booth this year,” said Melissa Stenger, VP of Product Management & Marketing at ISONAS. “We look forward to the launch of our integration with Genetec and sharing this powerful solution with attendees at this year’s GSX show.” ISONAS has been revolutionising access control with one simple solution and is today manufacturer of Pure IP Access Control hardware Since 1999, ISONAS has been revolutionising access control with one simple solution and is today manufacturer of Pure IP Access Control hardware. When paired with their industry-leading cloud hosted software solutions or third-party full-featured access control software, a complete access control platform is formed. Providing product solution An ISONAS system provides an ideal product solution for securing facilities while reducing costs and providing all of the advantages that Pure IP technology brings to the door. ISONAS is based in the global technology hub of Boulder, Colo., and has one goal: to change the global access control market by providing a product solution that is secure, reliable, trusted, and more technologically advanced than anything before. Today, the company is realising that vision with the ISONAS solution installed globally in over 30 countries in a wide variety of vertical markets. ISONAS has been recognised as one of Boulder County’s fastest growing companies as well as by industry partners such as Milestone Systems, year after year for its powerful video and access control integration.
SourceSecurity.com’s Expert Panel covered a lot of ground in 2017 about a variety of topics resonating in the security market. The most-read Roundtable discussion in 2017 was about a familiar and ongoing debate: What is an open system? Other hot topics that made the Top-10 list of Roundtable discussions included smartphones, buzzwords, standards and product life cycles. Here is a listing of our Top 10 Expert Panel Roundtable discussions posted in 2017, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2017 (including the quotable panelists named below). 1. What is an open system? Is there a consensus in the marketplace on the definition of “open?” "Being truly ‘open’ means going above and beyond when designing your product line, keeping in mind the ability for end-users to easily interface your product with other open-platform solutions. That's why offering an open-platform design must be coupled with the ability to provide exceptional support through training, follow-up and innovation as they are brought to market.” [Mitchell Kane] 2. How are smartphones impacting the physical security market? "The security protocols on phones (such as fingerprint readers and encryption) have become some of the strongest available to consumers and are regularly used to access essential services such as banking. With this level of trust and user convenience from mobile device security, it makes sense to produce physical security systems that also take advantage of it." [John Davies] TDSi's John Davies says it makes sense to produce physical security systems that take advantage of trust and user convenience on mobile devices 3. What is the biggest missed opportunity of security systems integration? "Integrators need to be more savvy on how they can meet their customers’ IT and surveillance goals, from both a technology and services perspective. Being knowledgeable about new innovations can help integrators sell infrastructure, keeping that piece of business rather than losing server sales to a customer’s internal IT department. Integrators are tasked with ensuring surveillance customers can benefit from best practices, and solutions proven in the world of IT offer significant benefit." [Brandon Reich] 4. What are the security industry’s newest buzzwords? "End-to-End Security is a buzzword reflecting how cyber threats are increasing and the importance of ‘the security of security systems,’ especially for companies operating in the critical national infrastructure. Convergence has been a ‘hot topic’ for years, but has it really happened? In order to create true end-to-end security solutions, IT and physical security best practices need to be combined." [Arjan Bouter] End-to-End Security is a buzzword reflecting how cyber threats are increasing, says Arjan Bouter 5. What technology will have the greatest impact in the second half of 2017? "Cloud-hosted access control is poised to have the biggest impact in the second half of 2017. Organisations are looking to decentralise IT management and eliminate the need for overhead costs in hardware infrastructure and ongoing maintenance costs. This decentralisation is driving them to migrate their day-to-day systems to the cloud, and access control is no exception." [Melissa Stenger] 6. Are mergers and acquisitions good or bad for the security industry? “On the ‘pro’ side, consolidation is good for pulling together a fractured market, as vendors try to gain market share by acquiring solutions they may not otherwise have in their portfolio. On the ‘con’ side, however, consolidation restricts or limits innovation as the merged vendors strive to develop end-to-end solutions that reduce customer choices" [Reinier Tuinzing] 7. What new standards are needed in the security marketplace? "Do we need that many new standards, or do we need the industry to embrace the standards that are already in place? I believe that current standards like ONVIF and OSDP are sufficient in what they offer the industry. Members of the security industry just need to start thinking outside the box and realise that it is with standards in place that real industry growth can occur." [Per Björkdahl] 8. What will be the big news at ISC West 2017? "Security solutions that capture greater data and utilise analytics to transform the data into useful information, or business intelligence, will be the talk of the industry at ISC West this year. It’s not just about surveillance or access control anymore, but about who can best assess the end user’s interests and deliver an end-to-end solution that provides a value beyond the technology and a service beyond security.” [Richard Brent] When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality, says Oncam's Jumbi Edulbehram 9. Why should a customer continue to buy “premium” surveillance cameras? "When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality (requiring costly site visits and replacements), susceptibility to cyber-attacks, or lower quality of integrations with video management systems. Customers should certainly be prudent buyers and make sure that they’re paying for actual reliability/features/functionality rather than simply paying a premium for a brand-name product. When functionality and reliability are important, it always makes sense to ‘buy nice, not twice.’ [Jumbi Edulbehram] 10. What is an acceptable life cycle for a physical security system? "The answer to this question clearly depends on the seat you sit in. Manufacturers, integrators, distributors, consultants and engineers all have extremely different perspectives on this question. As a manufacturer, we design systems to have a lifecycle between 5 and 7 years." [Robert Lydic]
SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions. The very most-clicked-on Roundtable discussion in 2016 was about how to choose between a cloud-based system and a server-based system. Other hot topics that made the Top-10 list of Roundtable discussions included edge-based video storage, the challenges of commoditisation, and mistakes customers make when buying and installing security systems. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2016 at SourceSecurity.com, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2016, including the quotable panelists named below! 1. What factors should a customer consider when choosing between a cloud-based system and a server-based security system? "Invariably the choices will be driven by security processes in place within the corporate environment and by ensuring the remote system is as impenetrable as the corporate network. Both options potentially leave the corporate network vulnerable to a determined cyber attacker, so the systems and access points to the network need to be sufficiently hardened to deter or prevent attacks.” [John Davies] 2. What is the most unusual application of surveillance cameras you have seen recently? "The most unusual application I’ve seen is the use of 360-degree fisheye cameras mounted on mobile poles for security along a marathon route. The poles were mounted on mobile units that contained power and communications infrastructure. Multiple mobile units were driven and placed along the route so that the entire route was constantly under surveillance. " [Jumbi Edulbehram] 3. What is the biggest mistake you see your customers make when it comes to buying or installing security or surveillance systems? "Too many businesses fail to take full advantage of the breadth of services available for maximising tools like remote diagnostic services, for example, which allow customer service teams to regularly and proactively check equipment quality and make repairs remotely." [Joe Oliveri] A number of major security companies are offering cloud video surveillance solutions apart from the traditional server-based systems, but which is best for the customer? 4. How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense? "The industry commonly holds that 20 pixels/foot is enough for general surveillance, 40 pixels/foot is the minimum for facial recognition and licence plate identification, and 80 pixels/foot is used for higher detail like reading logos, names embroidered on a shirt, etc. " [Jason Spielfogel] 5. What is the value of edge-based storage and in what specific applications? "Recording at the edge frees up network bandwidth and PC processing power, allowing users to view and manage video feeds and store applicable images for later use or transfer to the network when necessary. " [Dave Poulin] 6. How can security integrators replace revenue in the age of commoditisation? "The integrator community needs to learn to embrace what hundreds of other contractor businesses have. They need to improve their predictable cash flow and margin by offering contracted services. Call it what you like – RMR, managed services, monitoring – the description makes no difference. The integrator community simply needs to get off their butt and make it happen. " [Bill Bozeman] 7. How successful was ISC West 2016? Did it meet your expectations? "It was unanimous that 2016 ISC West was the best show we have participated in Arecont Vision history! Activity on the first two days was especially strong with Systems Integrators, Dealers, Distributors, End Users, and A&E/Consultants. These people all came to see our new product line and were especially interested to see the product performance improvements and ease of installation and setup." [Scott Schafer] More of us are depending on social media smart phone apps as a source of information, providing new levels of immediacy that dovetail well into security, specifically in areas of emergency notification 8. What are the physical security challenges of "safe cities" applications, and how is the market meeting those challenges? "One of the challenges is, of course, to make systems from different manufacturers work together. Interoperability is important not only from an operator’s point of view, but also in how cities and their internal divisions should respond to incidents reported by the security systems. " [Per Björkdahl] 9. How should integrators/installers differentiate themselves or make themselves stand out in today’s market? "In today's market, it's all about customer service. Almost every integrator has good product – and most of these products do a lot of the same things – but what sets integrators/installers apart is the level of value-added support they are providing to their accounts. Increased support through training, follow-up, open communication and keeping them informed on emerging technologies can really speak to the needs that end users have and why they will remain loyal.” [Mitchell Kane] 10. What role can social media play in the security marketplace and/or as a tool to promote better security in general? "Social media has weaved its way into our daily lives and is an integral part of our interaction with customers in the marketplace. Social media outlets bring the human element to interfacing with our communities and customers. This humanization allows us to address sensitive topics like the recent events in Orlando and how to take preventative measures in the future." [Melissa Stenger] See the full coverage of 2016/2017 Review and Forecast articles hereSave Save
3 reasons to migrate to a new access control systemDownload
Schooling the market on education securityDownload
Lawrence, Massachusetts deploys FLIR video system for safetyDownload