SourceSecurity.com RSS - Expert Commentary SourceSecurity.com RSS - Expert Commentary from SourceSecurity.com http://www.sourcesecurity.com/news/industry-news.html Copyright (C) SourceSecurity.com 2017 Expert Commentary Mon, 26 Jun 2017 08:00:00 GMT Mon, 26 Jun 2017 08:00:00 GMT 5 key ways to ensure end-to-end perimeter protectionhttp://www.sourcesecurity.com/news/articles/5-key-components-solution-perimeter-protection-co-9756-ga.23283.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/5-key-components-solution-perimeter-protection-co-9756-ga.23283.htmlExpert CommentaryMon, 26 Jun 2017 08:00:00 GMT<p><strong>Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, </strong><strong>true end-to-end perimeter protection calls for the utilisation of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. </strong></p> <p>Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let&rsquo;s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter.</p> <p><span class="blue_bold">1. Threat recognition </span></p> <p>The first step in effectively defending against a threat is recognising that it&rsquo;s there. By combining state-of-the-art intrusion...Factors to consider when choosing a video storage systemhttp://www.sourcesecurity.com/news/articles/factors-choosing-video-storage-system-co-11453-ga.23282.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/factors-choosing-video-storage-system-co-11453-ga.23282.htmlExpert CommentaryFri, 23 Jun 2017 08:00:00 GMT<p><strong>What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department.</strong></p> <p>In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system&mdash;preferably, one designed for video applications.</p> <p>How do you know if one storage solution is better suited for video than another? What makes a file system ideal for video applications? There are several factors to think about.</p> <p><span class="blue_bold">Optimising for write operations<br /></span></p> <p>What type of work do you expect the storage system to perform? It&rsquo;s important to know because some systems are designed to handle certain...Drone terror: How to protect facilities and peoplehttp://www.sourcesecurity.com/news/articles/drone-proliferation-demands-regulations-security-solutions-co-9526-ga.23223.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/drone-proliferation-demands-regulations-security-solutions-co-9526-ga.23223.htmlExpert CommentaryWed, 14 Jun 2017 08:00:00 GMT<p><strong>The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. </strong></p> <p><span class="blue_bold">Drone security risks</span></p> <p>Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible.</p> <p>Security professionals and technologists are working furiously to address the gaps in drone defence. Currently, the most...Avoid damaging network breaches with reevaluated cybersecurityhttp://www.sourcesecurity.com/news/articles/enhancing-network-protection-updated-cybersecurity-co-1286-ga-co-3188-ga.23222.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/enhancing-network-protection-updated-cybersecurity-co-1286-ga-co-3188-ga.23222.htmlExpert CommentaryMon, 19 Jun 2017 08:00:00 GMT<p><strong>In today&rsquo;s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it&rsquo;s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer a breach at some point, introducing risks that can lead to business interruption, financial loss, reputational damage and more.</strong></p> <p><span class="blue_bold">How we view and evaluate cybersecurity</span></p> <p>In light of these realities and the potential fallout of network breaches, it is time to change the way we as an industry view and evaluate cybersecurity. Rather than seeing the technologies and practices for securing networks from a cost perspective, we must...Safety and security checklist for National Safety Monthhttp://www.sourcesecurity.com/news/articles/safety-security-checklist-national-safety-month-co-2900-ga.23201.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/safety-security-checklist-national-safety-month-co-2900-ga.23201.htmlExpert CommentaryFri, 09 Jun 2017 08:00:00 GMT<p><strong>According to the FBI&rsquo;s most recent data, there were almost eight million property crime offences in the United States in 2015,&nbsp;while the Occupational Health and Safety Administration (OSHA) estimates roughly two million employees per year are affected by some form of workplace violence</strong>.</p> <p>Don&rsquo;t let your business become part of these statistics. June is National Safety Month, so it&rsquo;s the perfect time to reassess your facility security measures and look for improved and efficient ways to help keep your staff, customers and assets safe and secure. Not sure where to start? Consider the following checklist with best practices to help protect your facility and staff.</p> <p><span class="blue_bold">Train and refresh employees </span></p> <p>Just as your employees and staff are your number one business asset, they are also your first line of defence. Making sure your employees are aware of safety procedures and possible warning signs can...University bomb hoax highlights printer security vulnerabilitieshttp://www.sourcesecurity.com/news/articles/university-bomb-hoax-printer-security-vulnerabilities-co-823-ga.23200.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/university-bomb-hoax-printer-security-vulnerabilities-co-823-ga.23200.htmlExpert CommentaryFri, 09 Jun 2017 08:00:00 GMT<p><strong>Colleges and universities have been targeted in the last several weeks with a series of bomb threats received via campus printers and fax machines. Targeted institutions included Vanderbilt University, the University of Southern California, the University of Virginia and the University of Detroit Mercy, among others. </strong></p> <p>Businesses were also among the targets. Around 100 organisations in all received print-outs, faxes or emails demanding that a $25,000 ransom be paid to a Brazilian citizen to avoid detonation of explosives allegedly planted on the sites. The police determined that the &ldquo;form letter&rdquo; threats were part of a hoax and not credible.</p> <p>The situation highlights the need to proactively secure access to printers in today&rsquo;s networked world. <strong>SourceSecurity.com</strong> asked <strong>Ashish Malpani, Director, Embedded Solutions Product Marketing at HID Global</strong>, for insights from a technology perspective.</p>...2020 Vision: Guide to protecting schools from the threat of terrorismhttp://www.sourcesecurity.com/news/articles/2020-vision-protecting-schools-terrorism-co-3767-ga.23185.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/2020-vision-protecting-schools-terrorism-co-3767-ga.23185.htmlExpert CommentaryWed, 07 Jun 2017 08:00:00 GMT<p><strong>It seems schools still need to be alert when it comes to the risk of terrorism. Following a recent security threat, Bury College has set an example that schools across the UK need to be aware of the threat of terrorism. As reported by the </strong><strong>Manchester Evening News</strong><strong>, the incident at the Great Manchester college saw the facility being put in lockdown as a precaution before an evacuation took place. Hundreds of staff and students were caught up in the event.</strong></p> <p>Bury College released a statement following the threat: <em>&ldquo;Staff at Bury College reacted swiftly today in response to a potential threat. Working closely with exceptional support from the police, the college quickly instigated its well-rehearsed lockdown procedures. A safe evacuation of the college was taken as a precautionary measure.&rdquo;</em></p> <p><a class="orangebold" href="http://www.2020cctv.com/" target="_blank" rel="nofollow">2020 Vision</a> has...Not an afterthought: The significance of security control room aestheticshttp://www.sourcesecurity.com/news/articles/significance-aesthetics-security-control-rooms-co-14915-ga-co-1840-ga.23168.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/significance-aesthetics-security-control-rooms-co-14915-ga-co-1840-ga.23168.htmlExpert CommentaryFri, 02 Jun 2017 08:00:00 GMT<p><strong>Security control rooms should be functional and durable, and their aesthetics should incorporate matching colours that are conducive to a 24/7 operating environment&mdash;not too much contrast and easy on the eyes.</strong><br /> <br /> Another factor driving aesthetics is an enterprise&rsquo;s desire to create a &lsquo;showpiece&rsquo; to demonstrate a commitment to security for shareholders and other stakeholders. <em>&ldquo;Everyone wants to have a good-looking control room and a cost-effective design,&rdquo;</em> says Matko Papic, Chief Technology Officer of Evans Consoles.<br /> <br /> <span class="blue_bold">Role of lighting and aesthetics in control rooms</span><br /> <br /> <em>&ldquo;Lighting is a critical factor for operators,&rdquo;</em> adds Papic. Studies of control rooms have sought to address issues of circadian rhythms (physical, mental, and behavioural changes that a person undergoes over a 24-hour cycle, based on responses to light) and the impact of...Mobile communications make the public an additional sensor on the fieldhttp://www.sourcesecurity.com/news/articles/mobile-communications-public-additional-sensor-field-co-9744-ga.23162.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/mobile-communications-public-additional-sensor-field-co-9744-ga.23162.htmlExpert CommentaryFri, 02 Jun 2017 08:00:00 GMT<p><strong>Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful &lsquo;sensor&rsquo;, capable of providing accurate, verified, real-time multi-media incident information.</strong></p> <p>You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response.</p> <p><span class="blue_bold">The public as an additional security and safety...Technology evolution leads to changes in security control room furniturehttp://www.sourcesecurity.com/news/articles/technology-evolution-changes-control-rooms-co-14948-ga-co-14915-ga-co-1840-ga.23177.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/technology-evolution-changes-control-rooms-co-14948-ga-co-14915-ga-co-1840-ga.23177.htmlExpert CommentaryWed, 07 Jun 2017 08:00:00 GMT<p><strong>Technology is changing the look and function of today&rsquo;s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company&rsquo;s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. </strong></p> <p><span class="blue_bold">Need for integrated rack systems</span></p> <p>With the increase of IP-based systems comes the need for integrated rack systems that include advanced functionality such as cable management, adds Jim Coleman, National Sales Manager, AFC Industries. Server rooms are environmentally controlled by cooling systems and power systems monitored on the IP network. Low-profile flat screens allow centres to utilise space vertically, thus creating a smaller...Download: Do you know the weakest link of your access control system?http://www.sourcesecurity.com/news/articles/download-weakest-link-access-control-system-co-4108-ga.23184.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/download-weakest-link-access-control-system-co-4108-ga.23184.htmlExpert CommentaryWed, 07 Jun 2017 08:00:00 GMT<p style="text-align: center;"><strong><a title="Download Article" href="http://hubs.ly/H07KvLp0"></a></strong></p> <div class="col-md-7"> <div><strong>In end-to-end security, it&rsquo;s important to consider that the chain is only as strong as its weakest link. That is why it is essential that an access control system is always evaluated in its entirety, to discover where the weakest link can be found.</strong></div> <div>&nbsp;</div> <div>It is not uncommon for access control systems to be installed and then used for the longest time possible without any attention to updating the system&rsquo;s intrinsic security features. There are many systems in the field that are over 10-years old, based on technologies much older than this and with no or very low cyber security protection.&nbsp;</div> <div>&nbsp;</div> <div>Some...Consultants' Forum: The consultant-manufacturer relationship in the physical access control markethttp://www.sourcesecurity.com/news/articles/consultant-manufacturer-relationship-physical-access-control-co-12165-ga-co-14924-ga-co-14923-ga-co-823-ga.23176.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/consultant-manufacturer-relationship-physical-access-control-co-12165-ga-co-14924-ga-co-14923-ga-co-823-ga.23176.htmlExpert CommentaryTue, 06 Jun 2017 08:00:00 GMT<p><strong>Manufacturers depend on consultants to get their technologies specified in customer projects. Consultants often depend on manufacturers to provide them current information about the technologies that are the building blocks of their projects. It&rsquo;s a symbiotic relationship, but not always a perfect one. We recently gathered three consultants to discuss what they want from manufacturers, and a representative of HID Global to add a manufacturer&rsquo;s perspective.</strong></p> <p>Manufacturers also look to consultants to provide insights into trends they see among clients, and our consultant forum was outspoken on those points, too.</p> <p>Participating were Chris Grniet of Guidepost Solutions, Brandon Frazier of Elert &amp; Associates, Terry Harless of Burns &amp; McDonnell, and Harm Radstaak, HID Global&rsquo;s Vice President and Managing Director, Physical Access Control.</p> <p><span class="blue_bold">SourceSecurity.com: What do you look for in a relationship...Building advanced connected solutions for modern security threatshttp://www.sourcesecurity.com/news/articles/advanced-connected-solutions-modern-security-threats-co-8268-ga.23129.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/advanced-connected-solutions-modern-security-threats-co-8268-ga.23129.htmlExpert CommentaryTue, 30 May 2017 08:00:00 GMT<p><strong>Did you hear the one about the bear that nearly caused a nuclear catastrophe?&nbsp;</strong><strong>It was around midnight on October 25 1962, in the midst of the Cuban Missile Crisis. A guard at Volk US Air Force Base &ndash; home to a number of armed nuclear bombers &ndash; spotted a shadowy figure apparently attempting to scale the fence. </strong></p> <p>The supposed Soviet saboteur tripped the alarm, which was fatefully miswired. As a result, the klaxon was accidentally sounded, triggering a manoeuvre to scramble US interceptor jets to shoot down incoming enemy nuclear bombers. The pilots weren&rsquo;t informed that more American armed nuclear bombers were already in the air nearby &ndash; the scene was set for a friendly fire incident of nuclear proportions.</p> <p>Just before the jets took off, the command centre, having realised that the wrong klaxon had sounded, sent a truck racing to the tarmac with orders to stand down. Crisis averted &ndash; just. Oh &ndash;...Cyber security’s balancing act between utility and protectionhttp://www.sourcesecurity.com/news/articles/cyber-security-iot-balance-availability-protection-co-8173-ga-co-1286-ga.23033.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/cyber-security-iot-balance-availability-protection-co-8173-ga-co-1286-ga.23033.htmlExpert CommentaryFri, 12 May 2017 08:00:00 GMT<p><strong>Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis. Every second of every day, sensors are digitising the real world, creating information and transporting it across multiple networks and interfaces to a broadening audience. While there is obvious utility being gleaned from this process, from our vantage point here in the physical security space, information sharing and transmission raises issues we have to consider: what happens to this information inside those organisations, and what risks are presented by increasing the communication in and out of these organisations, in the name of utility?</strong></p> <p><span class="blue_bold">Information revolution</span></p> <p>In a world where convenience and anytime availability can make or break a business, information availability and always-on connectivity are here to stay. Much as the Industrial...Cyber criminals are ready to attack your business: Are you ready to defend it?http://www.sourcesecurity.com/news/articles/cyber-criminals-business-prevention-malware-co-5961-ga-co-10787-ga.22974.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/cyber-criminals-business-prevention-malware-co-5961-ga-co-10787-ga.22974.htmlExpert CommentaryWed, 03 May 2017 08:00:00 GMT<table style="width: 100%; margin-left: auto; margin-right: auto;" cellspacing="8"> <tbody> <tr style="height: 263px;"> <td style="text-align: center; height: 263px;"></td> </tr> <tr style="height: 14px;"> <td style="height: 14px; text-align: center;"><strong><span class="smalltxt">Adware may also include spyware, code that tracks a user's personal information and passes it on to third parties without the user's authorisation or knowledge</span></strong></td> </tr> </tbody> </table> <p><strong>Just when you think you have seen the worst that cyber criminals have to throw at you, they are back with more sophisticated, and in some cases, more severe threats. Understanding emerging and evolving cyber threats is the first step in helping to protect your...Consultants' Forum: The future of mobile access, location services and BIMhttp://www.sourcesecurity.com/news/articles/future-mobile-access-location-services-bim-consultants-forum-co-12165-ga-co-14924-ga-co-14923-ga-co-823-ga.23156.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/future-mobile-access-location-services-bim-consultants-forum-co-12165-ga-co-14924-ga-co-14923-ga-co-823-ga.23156.htmlExpert CommentaryThu, 01 Jun 2017 08:00:00 GMT<p><strong>Mobile access is probably the largest emerging trend in the security marketplace, but it is only one of several that are changing the face of the access control market. Another factor showing potential to change the market is the emergence of location systems and positioning systems, as reflected by HID Global&rsquo;s recent acquisition of Bluvision, a provider of real-time location tracking system for assets and employees, and building information modeling (BIM) is impacting how consultants do their jobs. We gathered together several consultants, and a representative of HID Global, to discuss these topics.</strong></p> <p>Participants were Chris Grniet of Guidepost Solutions, Brandon Frazier of Elert &amp; Associates, Terry Harless of Burns &amp; McDonnell, and Harm Radstaak, HID Global&rsquo;s Vice President and Managing Director, Physical Access Control.</p> <p><span class="blue_bold">Future of mobile access technology</span></p> <p><strong>SourceSecurity.com: How...Download: Surveillance Beyond Security - Intelligent storagehttp://www.sourcesecurity.com/news/articles/quantum-white-paper-surveillance-beyond-security-co-11453-ga.23134.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/quantum-white-paper-surveillance-beyond-security-co-11453-ga.23134.htmlExpert CommentaryTue, 30 May 2017 08:00:00 GMT<p style="text-align: center;"><strong><a href="http://hubs.ly/H07CP2x0"></a></strong></p> <p><strong>The role of storage in video surveillance systems has&nbsp; evolved, from a means of preserving evidence to an evidence search tool, and soon as the main data repository for predictive analytics. Old analogue systems are now being replaced with massive multi-camera IT systems.</strong></p> <p>Necessary storage volumes keep growing as video resolutions increase. 1K, 4K, and 8K megapixel cameras require such gigantic storage space that network video recorders (NVRs) can hardly handle more than a handful of them simultaneously.</p> <p>This Quantum white paper explains how you can efficiently circumvent this situation, showing a progressive migration path from current state-of-the-art IP video solutions, up to tomorrow&rsquo;s storage-centric architectures.</p> <p><span...Simplifying control room design for end users and system integratorshttp://www.sourcesecurity.com/news/articles/simplifying-control-room-design-end-users-integrators-co-14948-ga-co-14915-ga-co-1840-ga.23128.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/simplifying-control-room-design-end-users-integrators-co-14948-ga-co-14915-ga-co-1840-ga.23128.htmlExpert CommentaryThu, 25 May 2017 08:00:00 GMT<p><strong>Some end users and integrators are daunted by the idea of designing control rooms, but they shouldn&rsquo;t be. </strong></p> <p><em>&ldquo;It&rsquo;s not difficult to design because we will help,&rdquo;</em> says Randy Smith, President of Winsted. <em>&ldquo;We will walk you through the entire process.&rdquo;</em> Some control rooms still need storage areas for consoles underneath the workspace; however, when hardware is relocated to a server room, Winsted has modern, streamlined and simplified designs with no doors or storage under the work area.</p> <p>The request for a new control room can come from a consulting engineer, an integrator, or even from an end user. All Winsted sales go through the company&rsquo;s integrator channel, although larger jobs tend to be specified by security engineers or consultants, who put the job out to bid with integrators. <em>&ldquo;The most important thing is for engineers to understand we are a partner for them and will walk through...Consultants’ Forum: Smart buildings and the importance of green technologyhttp://www.sourcesecurity.com/news/articles/consultants-forum-smart-buildings-green-co-9380-ga-co-12165-ga-co-14924-ga-co-14923-ga-co-823-ga.23064.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/consultants-forum-smart-buildings-green-co-9380-ga-co-12165-ga-co-14924-ga-co-14923-ga-co-823-ga.23064.htmlExpert CommentaryTue, 16 May 2017 08:00:00 GMT<p><strong>Security consultants are on the front lines of trends such as &ldquo;smart buildings&rdquo; and the increasing demand for green technologies. We recently gathered together several consultants to reflect on what&rsquo;s new in these areas, joined by a representative of HID Global. </strong></p> <p>Participants were Chris Grniet of Guidepost Solutions, Brandon Frazier of Elert &amp; Associates, Terry Harless of Burns &amp; McDonnell, and Harm Radstaak, HID Global&rsquo;s Vice President and Managing Director, Physical Access Control.</p> <p><span class="blue_bold">SourceSecurity.com: What are your thoughts on the emergence of &ldquo;smart buildings&rdquo;? How do you see the concept expanding? How does making a building &ldquo;smart&rdquo; add value to it as an asset?</span></p> <p><strong>Brandon Frazier:</strong> The term smart building has been a moving target beginning in the late 1800s with the electric thermostat. As I see things now becoming networked, becoming...Leveraging IP network technology in the security intercom markethttp://www.sourcesecurity.com/news/articles/analogue-digital-convergence-intercoms-security-industry-co-10746-ga-co-96-ga-co-227-ga-co-2704-ga-co-3411-ga.22985.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/analogue-digital-convergence-intercoms-security-industry-co-10746-ga-co-96-ga-co-227-ga-co-2704-ga-co-3411-ga.22985.htmlExpert CommentaryMon, 08 May 2017 08:00:00 GMT<p><strong>The transition from analogue to IP technologies has had a large impact on the ways intercoms are used in the security industry. The analogue-to-IP transition has generated a lot of attention in the camera market, and the transition is also taking place for intercoms. Twenty years ago, Axis Communications (2N&rsquo;s parent company) led the industry in converting from analogue cameras and video to IP.<br /> <br /> </strong><span class="blue_bold">Integrated IP system</span><br /> <br /> The conversion took 15 years to achieve, but the same conversion in intercoms is happening today. This conversion will take place over the next five years as integrators, end users, IT departments and building systems are now ready for networked IP devices, according to 2N.<em><br /> <br /> &ldquo;The benefits of an IP system are too great to ignore,&rdquo;</em> says Craig Szmania, CEO, 2N USA. Programmability, interoperability, mobile needs, video and audio quality, costs and system wide...