SourceSecurity.com RSS - Expert Commentary SourceSecurity.com RSS - Expert Commentary from SourceSecurity.com http://www.sourcesecurity.com/news/industry-news.html Copyright (C) SourceSecurity.com 2017 Expert Commentary Mon, 18 Dec 2017 08:00:00 GMT Mon, 18 Dec 2017 08:00:00 GMT How drone detection will protect cyber security in 2018http://www.sourcesecurity.com/news/articles/dedrone-detection-prevents-cyber-hacking-2018-prediction-co-14377-ga.24186.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/dedrone-detection-prevents-cyber-hacking-2018-prediction-co-14377-ga.24186.htmlExpert CommentaryMon, 18 Dec 2017 08:00:00 GMT<p><strong>Over the past year, there was an unprecedented rise in drone incidents. Drones were unwelcome at and threatening the physical and cybersecurity of defence organisations, stadiums, corporations, and data centres, among organisations with critical infrastructure. Legislation is only just emerging now, and laws protecting airspace are hard to enforce, especially if a pilot is unaware of the risks of their flight or is flying with malicious intent. Laws can be circumvented, but detection technology cannot. </strong></p> <h2>Cybersecurity, cyberterrorism and hacking</h2> <p>Dedrone is watching closely incidents related to cybersecurity, cyberterrorism, and hacking. In 2018, cybersecurity threats will advance and become more prevalent due to drones using hacking software, and their ability to swiftly infiltrate sensitive airspace. They are small, quiet, and capable of carrying heavy payloads over fences and right next to structures&mdash;including devices to sniff networks,...Connected, cyber-secure solutions will lead the security market in 2018http://www.sourcesecurity.com/news/articles/interactive-services-cloud-computing-network-solutions-co-11474-ga.24185.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/interactive-services-cloud-computing-network-solutions-co-11474-ga.24185.htmlExpert CommentaryMon, 18 Dec 2017 08:00:00 GMT<p><strong>2017 was quite an interesting and eventful year for the physical security industry. The economy has been robust and technology has become progressively sophisticated&mdash;with interactive services, cloud computing and network-based solutions taking charge to provide new insights to installers and their end-user customers. The Internet of Things is creating increasingly integrated solutions, with a heightened emphasis on total connectivity. </strong></p> <h2>Changing security expectations</h2> <p>World events have also put the spotlight on the need for comprehensive security at public events, tourist attractions and schools and campuses. Security is an expectation and systems integrators are becoming trusted advisors to their customers, who are looking to them to solve problems or issues. Residential systems are more robust and now, are migrating to the commercial side of the business. There&rsquo;s a blurring of the lines of technology&mdash;many of the products that...2018 will leverage IoT to integrate security and other sensor-based technologyhttp://www.sourcesecurity.com/news/articles/2018-trends-iot-security-smart-system-integrations-ipvideo-co-7622-ga.24183.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/2018-trends-iot-security-smart-system-integrations-ipvideo-co-7622-ga.24183.htmlExpert CommentaryMon, 18 Dec 2017 08:00:00 GMT<p><strong>2017 was a very interesting year within the security industry. Although the overall economy seems to be in a stable and growing state, security spending seems to have become more &ldquo;thought-out&rdquo; and strategic as opposed to some of the impulsive spending on the latest pieces of technology to hit the marketplace. Many end users and integrators are thinking more long-term and some of the biggest concerns have been scalability and interoperability.</strong></p> <h2>Unified management platforms</h2> <p>One of the strongest trends have leaned closer towards unified management platforms that provide interoperability between video surveillance, access control, fire &amp; burglar, and mass communication systems. The ability to scale to systems that provide a fully integrated security picture has impacted many decisions on purchasing security projects, even when doing so in stages.</p> <p>As the Internet of Things (IoT) is becoming more and more understood and...Surveillance data and artificial intelligence to drive video analytics in 2018http://www.sourcesecurity.com/news/articles/2018-security-trends-ai-deep-learning-analytics-co-2900-ga.24172.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/2018-security-trends-ai-deep-learning-analytics-co-2900-ga.24172.htmlExpert CommentaryMon, 18 Dec 2017 08:00:00 GMT<p><strong>The security industry remains interested in capturing actionable data from video analytics and this year we saw increasing interest from non-security industries.</strong></p> <p>While still a relatively young industry for our market&mdash;think of where Google was with collecting metadata 10 years ago&mdash;video security works with similar algorithms for capturing various scenarios. The data this provides is becoming more valuable not only for security purposes, but also for business operations, such as determining staffing needs in retail and healthcare settings or managing lines at various events. Video&rsquo;s tie-in with other systems, such as access control, will continue to provide critical information for managing situations as they unfold.</p> <h2>Video analytics predictions</h2> <p>In the year ahead, a resurgence in analytics is expected, especially in AI and deep learning, extending to security robot and drone technology. The next step in video analytics is...Top practical strategies for biometric adoptionhttp://www.sourcesecurity.com/news/articles/top-practical-strategies-biometric-adoption-co-7994-ga.24171.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/top-practical-strategies-biometric-adoption-co-7994-ga.24171.htmlExpert CommentaryThu, 14 Dec 2017 08:00:00 GMT<p><strong>Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change.</strong></p> <h2>New York MTA case study</h2> <p>But does that mean that organisations need to hold off on implementing biometric solutions? Or do they need to &lsquo;force&rsquo; it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organisation to reap the benefits.</p> <p>In 1953, New York Metro Transit Authority (MTA), one of the world&rsquo;s largest mass transit systems, began using tokens as payment for subway rides &ndash; a solution...Facial recognition technology to enhance travel and banking in 2018http://www.sourcesecurity.com/news/articles/facial-recognition-biometrics-utilised-large-scale-finance-travel-co-7121-ga.24162.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/facial-recognition-biometrics-utilised-large-scale-finance-travel-co-7121-ga.24162.htmlExpert CommentaryMon, 11 Dec 2017 08:00:00 GMT<p><strong>2018 will start to see facial recognition and other biometrics used in a combination of ways, but I&rsquo;d like to look even further into the future. I believe that facial recognition will be utilised on a large scale and that it will be very hard to enjoy the enhanced speed and simplicity of travel and financial transactions of the future without relying on biometrics. </strong></p> <h2>Biometric ticket and passport</h2> <p>For example, when you travel to another country your face will be your ticket and passport.&nbsp;The ability to link ticketing systems with your facial identity will mean that the airport can identify you seamlessly. As well as this, when you want to complete a financial transaction a connected till will read that your mobile phone is in range and you will simply look at the terminal and smile to confirm the transaction.&nbsp;This two part authentication process will significantly reduce the likelihood of fraud.&nbsp;</p> <h2>Tackling crime</h2>...Video security market forecast 2018: Data security and IoT key for end usershttp://www.sourcesecurity.com/news/articles/data-security-measures-central-video-system-sales-2018-co-289-ga.24161.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/data-security-measures-central-video-system-sales-2018-co-289-ga.24161.htmlExpert CommentaryMon, 11 Dec 2017 08:00:00 GMT<p><strong>An increase in spending on security, more focus on data security, higher demand for integrated solutions, and steady progress to move beyond the pixel race were key trends in 2017. As we look forward to 2018, we will continue to see development in these areas as well as greater impact of the Internet of Things (IoT) on the video security market. </strong></p> <h2>Potential of video security data</h2> <p>More and more, users are realising that the real issues in video security are not about pixel counts. Managing increased amounts of data and making this data relevant and valuable for security and non-security applications are becoming increasingly important. The logical next step for security, and one we will see progress in throughout 2018, is to enable users to interpret the video data and repurpose it to improve levels of security and provide business advantages that go beyond security. This is achieved by adding intelligence to video with analytics.</p> <p>As users...Security software trends: Operational resiliency and privacy protection key in 2018http://www.sourcesecurity.com/news/articles/operational-resiliency-security-intelligence-software-lead-2018-co-2566-ga.24160.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/operational-resiliency-security-intelligence-software-lead-2018-co-2566-ga.24160.htmlExpert CommentaryMon, 11 Dec 2017 08:00:00 GMT<p><strong>Last year, Genetec predicted that cybersecurity would be taken much more seriously as the Internet of Things (IoT) opened more doors for hacking and network take overs. </strong></p> <p>We also predicted that that there would be an increase in the adoption of Software as a Service (SaaS), expanding choice and convenience from new ownership models via hybrid (on-premises and Cloud) and Cloud-only models.</p> <h2>Cyber Accountability awareness</h2> <p>2017 was also a year of awareness about &lsquo;Cyber Accountability&rsquo;. Rising cyber-crime and the increasing threats saw organisations taking direct action to mitigate their risks. There was a greater demand for cybersecurity/cyber-incompetence malpractice insurance in the physical security space.</p> <p>The physical security industry is continuing to grow at a rate that most other industries would envy. However, the &ldquo;race to the bottom&rdquo; and the rise of ultra-low-cost surveillance sensor equipment is...Successful security companies will leverage the cloud to offer more RMR in 2018http://www.sourcesecurity.com/news/articles/successful-security-companies-cloud-new-business-revenue-opportunities-co-12491-ga.24159.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/successful-security-companies-cloud-new-business-revenue-opportunities-co-12491-ga.24159.htmlExpert CommentaryMon, 11 Dec 2017 08:00:00 GMT<p><strong>As the economy improved during 2017, the security industry also experienced an increase in new projects and upgrades for existing customers. Security dealers have been busy adapting to the new services that customers are now demanding and trying to stay competitive within their market.</strong></p> <p>Many have changed their strategies&mdash;offering not only professionally installed systems but assisting with DIY and self-install products. Overall, the goal of forward-thinking security dealers has been to elevate the level of service all around to the customer so they become indispensable and the technologies they offering are wanted, needed and used daily by their clients.</p> <h2>Cloud as a critical enabling technology</h2> <p>The cloud and cloud services have become a critical enabling technology. Cloud services and security management systems via the cloud have been increasing dramatically since the beginning of 2017. End users are more confident in the safety and...Cloud systems, cybersecurity and mobile credentials to drive security market in 2018http://www.sourcesecurity.com/news/articles/cloud-systems-cybersecurity-mobile-credentials-continue-co-268-ga.24157.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/cloud-systems-cybersecurity-mobile-credentials-continue-co-268-ga.24157.htmlExpert CommentaryTue, 12 Dec 2017 08:00:00 GMT<p><strong>Overall, it&rsquo;s been quite a year for the industry and Vanderbilt. <a href="/news/articles/access-control-moves-siloed-security-solution-integrated-approach-co-38-ga-co-268-ga.22169.html%20" class="orangebold"><u>Last year</u></a>, we predicted that the security industry would see a rise in cloud-based systems in 2017, and based on the developments and trends we've seen over the last 12 months, that forecast has come true.</strong></p> <h2>ACT365 access control and VMS</h2> <p>Vanderbilt introduced the ACT365 cloud-based access control and video management solution to its portfolio, and it has plans to educate the marketplace on the technological and economic advances with this platform in 2018. Cloud-based applications and mobile credentials continue to drive discussions and debates, and will ultimately gain acceptance as their numerous advantages are realised.</p> <h2>New projects in 2017</h2> <p>From an industry perspective, 2017 was successful and productive...Perimeters, entrances and lobbies to see increased security in 2018http://www.sourcesecurity.com/news/articles/2018-interest-hardening-perimeters-entrances-lobbies-active-shooter-co-286-ga.24156.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/2018-interest-hardening-perimeters-entrances-lobbies-active-shooter-co-286-ga.24156.htmlExpert CommentaryMon, 11 Dec 2017 08:00:00 GMT<p><strong>During 2017, we&rsquo;ve enjoyed stable economic growth for a number of years now; we&rsquo;re not running into as much resistance for security entrances as we did, say, seven to nine years ago.</strong></p> <h2>Hardening perimeters against active shooters</h2> <p>Compared to other security products such as cameras and card readers, security entrances are a big investment and considered somewhat of a luxury: during downturns we&rsquo;re among the first to hit the &ldquo;cutting room floor.&rdquo; Now, however, fueled by much greater C-suite awareness of the risks from unauthorised entry and tailgating, there is more buy-in to the added security and risk mitigation provided by security entrances and we&rsquo;re experiencing strong growth.</p> <p>Going forward, we continue to see greater integration in our space and expanded capabilities to pull useable data from our entrance products and related access control systems. There is now a much greater emphasis on the danger...2017 security trends: Lone wolf terror encourages vehicle access control system installationshttp://www.sourcesecurity.com/news/articles/lone-wolf-terrorism-vehicle-access-control-barricades-co-10263-ga.24153.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/lone-wolf-terrorism-vehicle-access-control-barricades-co-10263-ga.24153.htmlExpert CommentaryMon, 11 Dec 2017 08:00:00 GMT<p><strong>With the changing &ldquo;lone wolf&rdquo; style of terrorism, there will be a trend toward many more installations of vehicle access control systems and smaller numbers of units. Where a university, military base or airport might have 20-plus systems scattered among its grounds, there will be a growing number of smaller applications needing one, two or three systems. </strong></p> <p>These will include customers such as primary and secondary education facilities; pedestrian locations such as shopping centres, concert grounds and fairs; hospitals and other venues where pedestrians come together both daily or temporarily.</p> <h2>Defending against vehicle attack</h2> <p>The Middle East is a particular hotbed for increased security measures for explosive-laden vehicles. Many soft targets in the Middle East have also been adding anti-terrorist, crash-resistant barriers, barricades and bollards. This has been also true in Europe while Southeast Asia is coming on strong.</p>...Security market 2018 predictions: consolidation, acquisitions and partnershipshttp://www.sourcesecurity.com/news/articles/2018-security-consolidation-acquisitions-partnerships-hanwha-co-9381-ga.24152.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/2018-security-consolidation-acquisitions-partnerships-hanwha-co-9381-ga.24152.htmlExpert CommentaryTue, 12 Dec 2017 08:00:00 GMT<p><strong>While the security industry continues to grow, increased commoditisation and the rise of low-cost cameras </strong><strong>that are vulnerable to cyber-attacks has forced our industry to take a harder look at cybersecurity. Systems integrators and customers are increasingly aware of the dangers posed by these devices, and demand more accountability from manufacturers.</strong></p> <p>This is good news for innovative manufacturers like Hanwha who have always put cybersecurity at the core of their product development. Because we develop most of the components of our products ourselves, from the camera optics to our own chipsets, we are not as reliant on off-the-shelf, potentially vulnerable parts and technology, compared to competing vendors.</p> <h2>2018 security market</h2> <p>We expect 2018 will see more consolidation, acquisitions and partnerships between organisations. The &lsquo;winners&rsquo; will be companies that are best positioned to address security concerns,...Why live video streaming is critical for safer and smarter citieshttp://www.sourcesecurity.com/news/articles/live-video-streaming-critical-safer-smarter-cities-co-7121-ga.24151.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/live-video-streaming-critical-safer-smarter-cities-co-7121-ga.24151.htmlExpert CommentaryThu, 07 Dec 2017 08:00:00 GMT<p><strong>The term &ldquo;smart city&rdquo; gets thrown around a lot nowadays, but as different technologies that strive to be defined in this way are adopted by different countries globally, the meaning of this phrase gets lost in translation.</strong></p> <p>The simplest way to define a &ldquo;smart city&rdquo; is that it is an urban area that uses different types of data collecting sensors to manage assets and resources efficiently. One of the most obvious types of &ldquo;data collecting sensor&rdquo; is the video camera, whether that camera is part of a city&rsquo;s existing CCTV infrastructure, a camera in a shopping centre or even a police car&rsquo;s dash camera.</p> <p>The information gathered by video cameras can be used with two purposes in mind, firstly: making people&rsquo;s lives more efficient, for example by managing traffic, and secondly (and arguably more importantly): making people&rsquo;s lives safer.</p> <h2>Live streaming video all the time, everywhere</h2>...Surge protection for security installations: 2017 saw increased investmenthttp://www.sourcesecurity.com/news/articles/2017-changed-enterprise-views-surge-protection-security-systems-co-2681-ga.24146.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/2017-changed-enterprise-views-surge-protection-security-systems-co-2681-ga.24146.htmlExpert CommentaryTue, 12 Dec 2017 08:00:00 GMT<p><strong>In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility&rsquo;s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. </strong></p> <h2>Proactive approach to risk mitigation</h2> <p>Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations.</p> <p>Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach....Video surveillance in 2017: Deep learning and cloud-based analytics broke throughhttp://www.sourcesecurity.com/news/articles/deep-learning-cloud-based-analytics-break-co-2214-ga.24145.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/deep-learning-cloud-based-analytics-break-co-2214-ga.24145.htmlExpert CommentaryThu, 07 Dec 2017 08:00:00 GMT<p><strong>2017 witnessed a continued decline in the cost of cameras. While this creates a challenge for camera companies, it creates two clear opportunities: (1) Product differentiation now relies more heavily on software rather than camera parameters, which drives more focus and rapid innovation on the software side, and (2) cameras have become more affordable which encourages an increase in the adoption rate and size of surveillance projects. &nbsp;</strong></p> <h2>Artificial Intelligence surveillance applications</h2> <p>Additionally, 2017 has been the breakout year for real-world implementations of Artificial Intelligence (AI). The surveillance industry was not left behind with almost weekly announcements of various new products claiming to employ AI, to some extent. New and incumbent video analytics vendors are talking about employing deep learning to provide features and accuracy not previously attainable.</p> <p>While there has been a lot of hype, few companies actually...Five key steps for global security companies to become GDPR-complianthttp://www.sourcesecurity.com/news/articles/key-steps-security-companies-gdpr-compliant-north-america-co-2566-ga.24144.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/key-steps-security-companies-gdpr-compliant-north-america-co-2566-ga.24144.htmlExpert CommentaryThu, 07 Dec 2017 08:00:00 GMT<p><strong>News of cyberattacks seems constant these days. Recently, Equifax, a US-based consumer credit reporting agency, announced that a private customer data breach impacted 143 million people. Earlier this year, 1.5 million connected cameras around the world were hijacked in an unprecedented DDoS attack. </strong></p> <p>As cyber-attacks become more rampant, it&rsquo;s hardly surprising that governments are stepping in to hold organisations more accountable. One of the most recent examples of this is the European Union&rsquo;s General Data Protection Regulation (GDPR) which is set to come into effect on May 25, 2018.</p> <h2>New GDPR legislation mandates</h2> <p>Essentially, the GDPR mandates that businesses adhere to specific governance and accountability standards in the processing and protection of data. A big focus of this new legislation is that individuals have greater control over their personal data. Contrary to legislations in the United States, the personal data...Video surveillance 2018 forecast: AI, deep learning and video analytics will see widespread adoptionhttp://www.sourcesecurity.com/news/articles/ai-video-analytics-inherent-digital-surveillance-increasingly-connected-world-co-3126-ga.24142.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/ai-video-analytics-inherent-digital-surveillance-increasingly-connected-world-co-3126-ga.24142.htmlExpert CommentaryThu, 07 Dec 2017 08:00:00 GMT<p><strong>Today&rsquo;s security industry </strong><strong>has reached a critical mass in the volume of collected data and the limits of human attention to effectively search through that data. As such, the demand for video analytics is increasing globally and we believe that all video surveillance systems will eventually feature video analytics.</strong></p> <h2>Artificial Intelligence solutions</h2> <p>Through the power of artificial intelligence (AI), Avigilon&trade; is developing technologies and products that dramatically increase the effectiveness of security systems by focusing human attention on what matters most. As AI solutions become adopted, this technology provides scalable solutions that can be deployed across a range of verticals and applications to better address security challenges.</p> <h2>GPU technology increases in value</h2> <p>As the world becomes increasingly connected, the way we think about and interact with our security systems will continue to evolve...Security industry must adapt to terror and cyber-crime in 2018http://www.sourcesecurity.com/news/articles/adaptation-innovation-key-risks-continue-evolve-2018-co-177-ga.24141.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/adaptation-innovation-key-risks-continue-evolve-2018-co-177-ga.24141.htmlExpert CommentaryWed, 13 Dec 2017 08:00:00 GMT<p><strong>ASIS International continues to adapt, innovate, and grow at the high speed of the industry and profession. If 2016 represented a year for new CEO Peter J. O&rsquo;Neil and his senior management team and volunteer leadership to explore, review, and assess, 2017 was the year when many new initiatives took wing.</strong></p> <h2>Career Pathing initiative</h2> <p>For one, the Society is working on a new model that includes corporate membership. A Career Pathing initiative is under way, in which the knowledge, skills, and abilities for various career trajectories will be identified, with ASIS charting the course with tailored educational opportunities, certificate programmes, certifications, and knowledge resources. A new content management framework will result in more strategic development and distribution of our information resources. IT security and ESRM have prominent new futures at ASIS.</p> <p>The CSO Center is adopting executive coaching and will be holding...Download: How to catch shoplifters with thermal imaginghttp://www.sourcesecurity.com/news/articles/download-catch-shoplifters-thermal-imaging-retail-flir-co-9756-ga.24138.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/download-catch-shoplifters-thermal-imaging-retail-flir-co-9756-ga.24138.htmlExpert CommentaryWed, 06 Dec 2017 08:00:00 GMT<p><strong>As a grocery store or supermarket owner, it is very hard to fight theft. Shoplifting and retail theft may not seem like a major deal, but to the small business fighting for survival, it has a big impact on the bottom line.</strong></p> <p>A disadvantage of traditional tools for fighting shoplifting is that they&nbsp;are most effective when the&nbsp;shoplifter is caught red-handed. Once the shoplifter has concealed the stolen product in his or her clothing or bag, it is very hard to see whether something has been stolen.</p> <p>This paper explores how thermal imaging technology from&nbsp;<strong>FLIR</strong>&nbsp;and&nbsp;<strong>Nexo Group</strong>&nbsp;can&nbsp;detect stolen goods that are hidden under clothing, reducing losses up to 60%.</p> <p><strong>Find out more about:</strong></p> <ul> <li>Disadvantages of traditional security methods</li> <li>How heat catches thieves</li> <li>Reducing losses up to 60%</li> <li>Radiometric camera technology<br /><br...