SourceSecurity.com RSS - Expert Commentary SourceSecurity.com RSS - Expert Commentary from SourceSecurity.com http://www.sourcesecurity.com/news/industry-news.html Copyright (C) SourceSecurity.com 2017 Expert Commentary Wed, 16 Aug 2017 08:00:00 GMT Wed, 16 Aug 2017 08:00:00 GMT How intelligent IP cameras enhance predictive analyticshttp://www.sourcesecurity.com/news/articles/intelligent-ip-cameras-enhance-predictive-analytics-co-1286-ga.23569.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/intelligent-ip-cameras-enhance-predictive-analytics-co-1286-ga.23569.htmlExpert CommentaryWed, 16 Aug 2017 08:00:00 GMT<p><strong>For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today&rsquo;s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts &ndash; an important component of predictive analysis. </strong></p> <p><span class="blue_bold">What is predictive analysis?</span></p> <p>With this greater number and variety of data points available to security professionals, the trend toward integrated solutions is fuelling growth in the evolving science of predictive analysis. Differing from standard alert triggers, predictive analysis uses information gathered from a wide range of data sources including surveillance, access control, visitor management, incident management...Mechatronic access control: Superior security for hazardous siteshttp://www.sourcesecurity.com/news/articles/mechatronic-access-control-superior-security-hazardous-co-14143-ga.23561.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/mechatronic-access-control-superior-security-hazardous-co-14143-ga.23561.htmlExpert CommentaryMon, 14 Aug 2017 08:00:00 GMT<p><strong>Securing potentially hazardous sites, which contain gas or oil storage facilities, is becoming increasingly important to UK industry. While other businesses are investing in enhanced access control solutions, such as electronic key-centric access management, many sites containing hazardous materials are left stuck in the dark ages, with basic and impractical mechanical locking systems. </strong><strong>This is due to the potential risks associated with using an electronic device, which could cause a spark, in close proximity to hazardous materials. </strong></p> <p><span class="blue_bold">Reliable access control technology</span></p> <p>New technology is helping to pave the way for the future of access control and enhanced security solutions. Magnetic induction combines the reliability of a traditional mechanical locking system with the flexibility of electronic technology, to provide an advanced access control solution.</p> <p>There are two notable advantages of this...Download: Future-proof IP surveillance for harsh environmentshttp://www.sourcesecurity.com/news/articles/download-future-proof-ip-surveillance-harsh-environments-co-9756-ga.23411.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/download-future-proof-ip-surveillance-harsh-environments-co-9756-ga.23411.htmlExpert CommentaryMon, 24 Jul 2017 08:00:00 GMT<p style="text-align: center;"><a href="http://hubs.ly/H087NmB0"><strong></strong></a></p> <div class="col-md-7"> <div> <p><strong>Sea ports have a long tradition of handling important cargo, including equipment for oil and gas fields. These critical sites require complex security to protect vulnerable areas such as storage locations and unloading areas, as well as monitoring the surrounding waterways for emergency situations.</strong></p> <p>Often, upgrading these sites with a future-proof security system can prove challenging, as there are likely to be expansive legacy systems in place. New systems may also need to be integrated with security and surveillance systems in the surrounding area.</p> <p>This study from&nbsp;<strong>FLIR Systems</strong>&nbsp;explores how the right VMS, coupled with an appropriate range of hardware components, can meet the challenge of providing a...How to choose a security entrance that fulfills customer security goalshttp://www.sourcesecurity.com/news/articles/types-security-entrance-solutions-fulfill-security-goals-co-286-ga.23525.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/types-security-entrance-solutions-fulfill-security-goals-co-286-ga.23525.htmlExpert CommentaryFri, 11 Aug 2017 08:00:00 GMT<p><strong>Security</strong><strong> and systems integrators across the nation are recommending and providing long-term security solutions to their customers. But when it comes to physical security entrances, integrators can easily fall into the trap of simply fulfilling an end user&rsquo;s exact request without much pushback. Why? We believe the complexity and variety of entrances available makes it difficult to consult on the best solution, but also because there are a lot of assumptions at play.</strong></p> <h2>Determining the correct security entrance solution</h2> <p>There is confusion in the security industry on the meaning of the word, &ldquo;turnstile.&rdquo; End users, when requesting a solution, tend to use the word &ldquo;turnstile&rdquo; to describe anything from an old fashioned, 3-arm turnstile to a high-tech optical turnstile to a security revolving door.</p> <p>We encourage security integrators to ask questions to discover how their clients want to mitigate the...5 reasons to choose a commercial grade monitor for surveillancehttp://www.sourcesecurity.com/news/articles/5-reasons-commercial-grade-monitor-surveillance-co-14952-ga.23513.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/5-reasons-commercial-grade-monitor-surveillance-co-14952-ga.23513.htmlExpert CommentaryTue, 08 Aug 2017 08:00:00 GMT<p><strong>In the security industry today we see many installers and integrators using standard consumer grade monitors for video surveillance. This is primarily due to budget constraints, but can end up costing significantly more over the life of the install. This is because most installs are now using HDMI connections primarily.</strong></p> <p>A consumer monitor has HDMI input, so why isn&rsquo;t it good enough? Well, consider the average cost of a 19.5&rdquo; consumer monitor. The retail price is around $80-100 compared to the MRRP of a commercial grade monitor of around $150-200. Yes, it&rsquo;s a premium of 50-100%, but there are a few important criteria that differentiate the products.*</p> <p><span class="blue_bold">1. A consumer grade monitor isn&rsquo;t designed to run 24/7</span></p> <p>If you look at most consumer grade monitor user manuals they will explicitly state that they should only be used continuously for up to 14-16 hours per day due to using lower quality...Key practical steps to an effective business security culturehttp://www.sourcesecurity.com/news/articles/implementing-basic-business-security-practices-co-1645-ga.23437.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/implementing-basic-business-security-practices-co-1645-ga.23437.htmlExpert CommentaryFri, 28 Jul 2017 08:00:00 GMT<p><strong>There has never been closer integration between physical and logical security systems, so there has also never been greater importance when it comes to defining and maintaining the security culture within an organisation. </strong></p> <p>Unfortunately, with increasingly complex security protocols required on a daily basis (and used by every employee), a security regime can easily become lax through apathy &ndash; which offers the perfect opportunity for potential intruders to take advantage. Whilst security technology is rapidly evolving, it is essential that the team it protects do so as well.</p> <p>It is vital that you maintain an effective security culture within a business or organisation. Naturally the details will vary between organisations, but the common goal for all is to impress upon the team just how important security is. This will safeguard their jobs, the security of fellow workers and clients, and even in some cases, their personal safety.</p> <p><span...Intelligent Fire detection: Releasing the potential of remote monitoringhttp://www.sourcesecurity.com/news/articles/digital-challenges-remote-monitoring-predictive-maintenance-co-11156-ga.23436.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/digital-challenges-remote-monitoring-predictive-maintenance-co-11156-ga.23436.htmlExpert CommentaryThu, 03 Aug 2017 08:00:00 GMT<p><strong>A new study reveals that intelligent fire detection systems have the potential to unlock more than 30 percent cost-savings on routine maintenance checks through real-time, data-driven remote monitoring. Kevin Mears, Product Manager for Kentec Electronics, describes how remote monitoring and predictive maintenance can meet the competitive challenges of the digital age.</strong></p> <p>Leading economists have identified the convergence and synergies delivered by The Internet of Things &ndash; the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data &ndash; as a powerful force to create entirely new business models for system developers and integrators, by releasing the potential of remote interrogation.</p> <p><span class="blue_bold">Remote diagnostics: A cost-efficient approach</span></p> <p>For the fire systems sector the definition of remote diagnostics is instructive: &ldquo;<em>Improving the...From counter-terror to retail: Gaining actionable data from videoshttp://www.sourcesecurity.com/news/articles/counter-terror-retail-actionable-data-videos-co-4559-ga.23523.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/counter-terror-retail-actionable-data-videos-co-4559-ga.23523.htmlExpert CommentaryFri, 11 Aug 2017 08:00:00 GMT<p><strong>Nowadays, there is a lot of hype around data and its utility for almost any industry &ndash; from security and law enforcement to business operations and retail. While we are inundated with information about data and its significance to business success, technological development and fulfilling the promise of the Internet of Things, we don&rsquo;t always get practical feedback as to <em>how</em> to obtain this valuable data from the resources available to us. </strong></p> <p>Security teams feel this challenge acutely. As an industry that depends on accurate intelligence and real-time information, data is vital for preventing breaches, reacting to threats, and maintaining public safety.</p> <h2>Obstacles in video surveillance monitoring</h2> <p>One of the primary resources at the disposal of security teams is video, yet extracting insights from this medium has never been particularly efficient. Monitoring video feeds takes time and &ndash; even if security teams have...Why your business needs a holistic approach to managing critical eventshttp://www.sourcesecurity.com/news/articles/critical-event-management-protect-employees-threats-co-14206-ga.23491.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/critical-event-management-protect-employees-threats-co-14206-ga.23491.htmlExpert CommentaryThu, 03 Aug 2017 08:00:00 GMT<p><strong>In today&rsquo;s world, businesses face a growing threat landscape. Looking back on just the past few months, there have been increased incidents of workplace violence (the recent New York city hospital shooting), terrorist activities (London Bridge attack, Manchester attack), and cyberattacks </strong><strong>(Petya and WannaCry). While critical events have become more frequent, more complex, and costly to businesses, organisations&rsquo; emergency communications systems, plans and processes have remained surprisingly siloed and constrained by an inability to holistically manage the lifecycle of a critical event&mdash;from assessment, to communication, to analysis.</strong></p> <p>The reality is that organisations today find themselves tasked with maintaining multiple, separate emergency, security, and IT command centres that each require 24x7 availability and utilise a different set of siloed tools and processes to monitor and triage threats.</p> <h2>Situational...How to predict events with intelligent fire and security systemshttp://www.sourcesecurity.com/news/articles/security-fire-detection-reactive-preventative-security-co-14821-ga.23489.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/security-fire-detection-reactive-preventative-security-co-14821-ga.23489.htmlExpert CommentaryThu, 03 Aug 2017 08:00:00 GMT<p><strong>The security industry as we all understand it today is due for a much-needed paradigm shift. The solutions that security dealers and integrators are installing and deploying today have advanced considerably and for many, those systems do an excellent job safeguarding the homes and small businesses of their customers. However, all of those installed solutions have one inherent flaw: traditional fire alarms and security systems are only <em>reactive</em> in nature.</strong></p> <p>By reactive, we mean that although today&rsquo;s fire alarm and security systems are excellent at informing customers of a harmful or damaging event, such as a fire or perhaps a flood that is in progress, they are very poor at predicting when trouble is about to strike.</p> <h2>Analytics predict damaging or fatal events</h2> <p>Knowledge that an event such as a flood is currently taking place within a small business or a home is an incredibly powerful and valuable piece of information. In the...How the cloud reduces physical security system costshttp://www.sourcesecurity.com/news/articles/security-benefits-investing-cloud-security-co-12058-ga.23439.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/security-benefits-investing-cloud-security-co-12058-ga.23439.htmlExpert CommentaryWed, 26 Jul 2017 08:00:00 GMT<p><strong>The corporate mantra &ldquo;Utilise TCO instead of purchase price when making purchasing decisions&rdquo; means evaluating a project&rsquo;s <em>Total-Cost-of-Ownership</em> over its lifetime period as the primary cost factor. It requires the corporate buyer to scrutinise the entirety of the investment as opposed to just the upfront purchase price.</strong></p> <p>Like an iceberg, where the majority of the ice is below the surface, the total cost of ownership of a security system is typically much larger than the upfront purchase price. More often than not in today&rsquo;s security purchases, the decision rests mainly on the purchase price, however, the intelligent and savvy buyer looks at TCO.</p> <p>When purchasing a cloud based security system, TCO analysis is needed because the purchasing and expense comparison are quite different between a traditional on-site solution and a cloud based solution. You do not, however, need to examine every last item in the TCO to do...21 ways to prevent workplace violence in your organisationhttp://www.sourcesecurity.com/news/articles/safeguard-organisation-workplace-violence-programme-co-15028-ga.23488.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/safeguard-organisation-workplace-violence-programme-co-15028-ga.23488.htmlExpert CommentaryThu, 03 Aug 2017 08:00:00 GMT<p><strong>Workplace violence (WPV) cannot be 100% prevented. However, we know from experience that well-placed preparedness and prevention measures can significantly diminish the probability and severity of potential workplace violence.</strong></p> <p>A prime example comes as an outgrowth of the multiple &ldquo;going Postal&rdquo; shootings at the U.S. Postal Service (USPS) by employees or ex-employees (mostly in the 1990s). Out of necessity, USPS implemented a comprehensive workplace violence programme throughout their organisation. As a result, with approximately 750,000 employees at the time, USPS went over eight (8) years without an employee or ex-employee shooting by utilising a workplace violence programme like the programme outlined herein. This author contributed to the development and implementation of the USPS programme in the 1990s.</p> <h2>Formal people management training</h2> <p>One noteworthy component that was implemented appeared to be a major contributor to...Robot revolution: Uncovering the real value of security robotshttp://www.sourcesecurity.com/news/articles/real-security-value-robots-artificial-intelligence-co-14733-ga.23441.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/real-security-value-robots-artificial-intelligence-co-14733-ga.23441.htmlExpert CommentaryWed, 26 Jul 2017 08:00:00 GMT<p><strong>Robots have been in the spotlight lately, as tycoons like Elon Musk discuss the perils of automation and artificial intelligence (AI), and roving robots meet their watery demise. These recent events have unmasked a particularly interesting topic: The value of robots in the broader sense, especially as a security tool.</strong></p> <p>The emergence of robotics, automation and AI is not new, but the ongoing discussion about how best to use these continues to fuel critics and supporters alike. Seattle-Tacoma International Airport announced in early July that it is piloting a programme that utilises robots at the busy transportation hub to provide tips for getting through security faster; such as telling passengers to remove their scarves, jackets and belts before going through the screening process. Other robots being used in airports perform tasks such as providing passengers with directions to gates, escorting passengers to their destination or cleaning the floors.</p>...Lean Six Sigma tactics lead to increased airport efficiency and reduced flyer wait timeshttp://www.sourcesecurity.com/news/articles/lean-sigma-tactics-increased-airport-efficiency-co-15014-ga.23401.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/lean-sigma-tactics-increased-airport-efficiency-co-15014-ga.23401.htmlExpert CommentaryWed, 19 Jul 2017 08:00:00 GMT<p><strong>For many frequent flyers, the relationship between flyers and the Transportation Security Administration (TSA) has been at times, turbulent. For the better part of the last two decades, going through airport security has been met with groans over long wait times as flyers are encouraged to get to the airport earlier and earlier. </strong></p> <p><span class="blue_bold">TSA Lean Six Sigma tactics reduce wait time</span></p> <p>However, the tide may be turning a bit, as recent reports have shown a decline in TSA&rsquo;s wait times, which can be attributed to the agency deploying Lean Six Sigma tactics for increased efficiency. Lean Six Sigma tactics are techniques that rely on collaborative team efforts to improve processes. Safety is the top priority, but, through lean tactics, TSA can speed things up while keeping everyone safe.</p> <p>In <a class="orangebold"...Body worn cameras: Overcoming the challenges of live video streaminghttp://www.sourcesecurity.com/news/articles/body-worn-cameras-overcoming-challenges-live-video-co-7121-ga.23399.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/body-worn-cameras-overcoming-challenges-live-video-co-7121-ga.23399.htmlExpert CommentaryWed, 19 Jul 2017 08:00:00 GMT<p><strong>Can you imagine what it would be like if you could only look at your CCTV cameras eight hours after an incident, when your security team finish their shift? That is what 99% of current body cameras offer. Most body cameras can only record video, which limits them to settling arguments after the fact &ndash; who said what first in an altercation with the police? What sparked an incident with the door security team at a nightclub?</strong></p> <p>This leads to a curious asymmetry of video and immediacy between members of the public and body camera users such as police officers. Whilst they are dealing with an incident, dutifully recording their work, everyone around them is streaming live video and audio direct to services such as Facebook and Periscope.</p> <p><span class="blue_bold">Challenges of streaming live video</span></p> <p>So why don&rsquo;t most body cameras stream? Mostly because it is very challenging to move video reliably over cellular which may seem...Four ways the cloud improves your cyber security posturehttp://www.sourcesecurity.com/news/articles/ways-cloud-improves-cyber-security-posture-co-2566-ga.23370.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/ways-cloud-improves-cyber-security-posture-co-2566-ga.23370.htmlExpert CommentaryWed, 12 Jul 2017 08:00:00 GMT<p><strong>Adoption of the cloud is not slowing down. In fact, what&rsquo;s happening is quite the opposite. <a href="http://www.salesforce.com/assets/pdf/misc/IDC-salesforce-economy-study-2016.pdf">According to IDC</a>, worldwide spending on cloud computing is expected to reach $162 billion USD in 2020, growing at a compound annual rate of 19%. This isn&rsquo;t surprising when you consider that more organisations are looking outside their own environment for solutions that will help them become more agile, maximise resources and save money. Yet, while this study and countless others show that more companies are embracing the cloud and its benefits, many are still hesitant to make the move. One of the biggest reasons why is security. </strong></p> <p>Particularly in the physical security industry, there is a common misconception that on-premises systems on closed networks are more secure. Many still believe that connecting to a cloud-based application becomes a source of...ONVIF Profile A to drive interoperability for access control solutionshttp://www.sourcesecurity.com/news/articles/onvif-profile-drive-interoperability-access-control-co-3101-ga-co-8173-ga-co-1508-ga.23349.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/onvif-profile-drive-interoperability-access-control-co-3101-ga-co-8173-ga-co-1508-ga.23349.htmlExpert CommentaryFri, 07 Jul 2017 08:00:00 GMT<p><strong>The need for interoperability, which is making different types of devices or technologies communicate with one another, is certainly nothing new in our industry. At Anixter, we have been testing interoperability in our Infrastructure Solutions Lab for many years, connecting devices and clients from different suppliers to our test server site to ensure that integrations and multi-supplier solutions are going to work correctly for our customers in real-world scenarios.</strong></p> <p><span class="blue_bold">Open standards in access control</span></p> <p>Due to the proprietary way that access control security components have historically been designed and manufactured, achieving interoperability between different manufacturers&rsquo; products hasn&rsquo;t always been easy. It sometimes has involved developing specific device drivers or creating workarounds to get readers, panels and other peripherals to share information and communicate with a common access control...Drone terror: How to protect facilities and peoplehttp://www.sourcesecurity.com/news/articles/drone-proliferation-demands-regulations-security-solutions-co-9526-ga.23223.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/drone-proliferation-demands-regulations-security-solutions-co-9526-ga.23223.htmlExpert CommentaryWed, 14 Jun 2017 08:00:00 GMT<p><strong>The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. </strong></p> <p><span class="blue_bold">Drone security risks</span></p> <p>Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible.</p> <p>Security professionals and technologists are working furiously to address the gaps in drone defence. Currently, the most...2020 Vision: Guide to protecting schools from the threat of terrorismhttp://www.sourcesecurity.com/news/articles/2020-vision-protecting-schools-terrorism-co-3767-ga.23185.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/2020-vision-protecting-schools-terrorism-co-3767-ga.23185.htmlExpert CommentaryWed, 07 Jun 2017 08:00:00 GMT<p><strong>It seems schools still need to be alert when it comes to the risk of terrorism. Following a recent security threat, Bury College has set an example that schools across the UK need to be aware of the threat of terrorism. As reported by the </strong><strong>Manchester Evening News</strong><strong>, the incident at the Great Manchester college saw the facility being put in lockdown as a precaution before an evacuation took place. Hundreds of staff and students were caught up in the event.</strong></p> <p>Bury College released a statement following the threat: <em>&ldquo;Staff at Bury College reacted swiftly today in response to a potential threat. Working closely with exceptional support from the police, the college quickly instigated its well-rehearsed lockdown procedures. A safe evacuation of the college was taken as a precautionary measure.&rdquo;</em></p> <p><a class="orangebold" href="http://www.2020cctv.com/" target="_blank" rel="nofollow noopener">2020 Vision</a>...How to get bottom-line business benefits with video surveillance datahttp://www.sourcesecurity.com/news/articles/bottom-line-benefits-video-surveillance-data-co-7870-ga.23369.html?utm_source=News - Expert Commentary&utm_medium=Feed&utm_campaign=RSS Feedshttp://www.sourcesecurity.com/news/articles/bottom-line-benefits-video-surveillance-data-co-7870-ga.23369.htmlExpert CommentaryWed, 12 Jul 2017 08:00:00 GMT<p><strong>With 60 percent of all of the world&rsquo;s data expected to be created and managed by enterprises by 2025 <a href="http://www.seagate.com/www-content/our-story/trends/files/Seagate-WP-DataAge2025-March-2017.pdf">according to IDC</a>, it&rsquo;s not surprising to learn that enterprise players have moved swiftly to help their customers and organisations maximise the opportunity around this massive data growth. </strong></p> <p>However, when it comes to one of the most significant drivers of this growth in information&mdash;surveillance data&mdash; many enterprises struggle to understand how they can apply it to do more for their business. In an age when data is fast becoming the lifeblood of the business world, these players are intuitively aware of the great potential surveillance data holds for them, but they lack an understanding of exactly how to tap into that potential.</p> <p>Part of the reason for this is that the nature of video surveillance has changed in recent...