SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How do hardware improvements drive better physical security?

14 Aug 2020

How do hardware improvements drive better physical security?
Larry Anderson
Larry Anderson
14 Aug 2020

Editor Introduction

New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?


Card image cap
Kyle Smith Razberi Technologies

Hardware improvements precipitate software advances. As processing power rises, we are better able to reach a key goal of using hardware in physical security and technology as an effective force multiplier. Advanced cameras are able to interpret visual data in real-time and provide alerts with actionable information to the security department. Edge and cloud analytics can filter and allow quick incident searches on large amounts of forensic video using multiple search parameters with object classification. Correlation of transaction data and video analytics allows for fraudulent ATM activity to be detected in real-time, enabling immediate intervention, like a virtual guard watching each transaction. Security systems will soon be able to identify behavioural anomalies in groups and open spaces to alert humans to potential threats. As the total number of security sensors climbs, we rely on those systems to tell us when something actionable is happening.

Card image cap
John Davies TDSi

Moore's Law states that the number of transistors on a microchip doubles about every two years, whilst continually becoming cheaper. This increase in power for reduced costs is a key benefit to the evolution and improvement of physical security systems. This has borne fruit in systems that employ greater machine learning at the edge of the network and increased remote monitoring, which continues to improve on already impressive performance. Systems will inevitably continue to become more powerful, but for less cost, as they continue to evolve. Another important benefit is reliability. More powerful systems have greater redundancy to deal with problems or faults and to ensure security systems are less likely to fail. This also ensures that systems last longer, provider better ROI as well as greater of peace of mind. In turn, this increases the scope and possibilities of the technology.

Card image cap
Jon Marsh Oncam

The ability of hardware to provide clear video data is paramount for today's modern enterprises. In the case of camera technology, hardware improvements drive the ability to create better images and video data used to enhance situational awareness. 360-degree and wide-angle video, for example, produce very high-resolution images. While this is required to process them for streaming and analytics, some capabilities of the cameras are very much limited by the hardware they are built on. As a manufacturer, we work very closely with our hardware vendors on their roadmaps and their latest offerings and spend an incredible amount of time choosing the right components for our cameras: extremely high-quality fisheye lenses, high-speed light-sensitive sensors, and powerful CPUs that will allow us to process video efficiently and run features like low-light enhancement, improved HDR capabilities, compression technologies and analytics algorithms smoothly and at much higher framerates than seen before.

 

Card image cap
Sean Foley Interface Systems LLC

Hardware improvements are essential to bringing better physical security solutions to the end user. Better cameras mean higher resolutions and more efficient investigations. Better alarm detection devices mean safer people and assets. At Interface, we spent years researching the right audio hardware for our interactive “Virtual Security Guard” monitoring solution. The service combines live video surveillance with two-way audio from our trained monitoring professionals. The audio hardware was mission-critical. It had to be fast, clear and easy for our operators to project audio over different speakers in different areas of our customers’ stores. When a customer employee needs help, we must be able to react quickly, and audio is how they know we are engaged. We partnered with a supplier to develop a custom VoIP intercom system that turned out to be our best audio system ever. It was a true game-changer for securing our customers and their employees.

Card image cap
Ashesh Acharya Aiphone Corp.

Physical security is more of a priority than ever, and the hardware deployed for security is being pushed to its limits. Software developers are working to develop solutions that would utilise old hardware and running into roadblocks, due to the limitations of cheap or outdated devices. Hardware improvements are as important as the physical security devices in a building. If the hardware is not efficient or durable, then the whole security solution is in jeopardy. Improving the hardware around physical security increases the performance and reliability of the install, and it ensures they are less vulnerable to failure and downtime. Simple improvements to your hardware are the cornerstone of any security system. Hardware is the origin of everything – from a simple sensor, switch or keypad. If your hardware is old, so is your solution.

Card image cap
Jeff Bransfield RS2 Technologies, LLC

The bottom line: Better hardware means better data, which strengthens the intelligence that software provides. In the case of access control readers and credentials, the various improvements made for ease-of-use, mobility and security make the data being collected more reliable and easier to incorporate into an overall software-based access management system. This improved data means businesses have the ability to convert data into real-time intelligence, such as the ability to collect occupancy levels within a facility, gauge the use of various rooms or parts of a building, or, when incorporated with AI-driven video, the ability to decipher whether tailgating or door tampering has occurred. All of this is made possible through hardware improvements to deliver more reliable data.

Card image cap
Julie Brown Johnson Controls, Inc.

Security is more critical than ever – especially in healthcare facilities to enable visibility into who is accessing the building around the clock. The recent COVID-19 crisis has not only shifted risks, but it has increased the pace at which security is being challenged. Hardware improvements can pave the way for more modern physical security strategies such as AI and machine learning capabilities. For example, consider a hospital with outdated surveillance cameras. In the event of a security incident, this may lead to unclear footage, which hinders identification efforts and results in time lost due to manual reviewing of footage. To lay the foundation for a smarter security strategy, cameras and monitors should be updated to both improve the visibility of the resulting footage and enable the layering in of other components, such as data analytics, necessary for the implementation of technologies like AI and machine learning.

Card image cap
Adam Wynne Azena

There are several hardware improvements that enable better physical security, primarily the increase in processing power and memory on devices. These advancements make it possible to have forensic-level capabilities available in real time instead of after the fact, such as instantly identifying all the red cars in multiple parking lots, with a higher level of accuracy. Modern analytics algorithms, for example, are able to identify objects and events of interest more quickly. Additionally, many IP cameras are now equipped with powerful neural network accelerators, which enable AI and machine learning technologies to analyse more quickly and with more accuracy. Finally, network connectivity – meaning more network devices in your space all connected together – can detect breaches in physical security more quickly. This is all made possible through the integration and automation of devices with more processing power. Going forward, image sensors may also become smarter through the use of integrated AI.

Card image cap
Aaron Saks Hanwha Vision America

For video cameras, there are many instances where hardware improvements advance physical security in ways that software alone cannot. Cybersecurity enhancements are an important example of hardware improvements that protect corporate networks from attack. Since threats continuously evolve, designing hardware that creates a firewall between accessing a camera’s features and the camera’s operating system itself makes it difficult for hackers to gain access and exploit the network. Hardware improvements, such as Hanwha Techwin’s continuously evolving Wisenet SoC technology, deliver clearer, forensic-level image quality in all lighting conditions. Hardware improvements can also enable more powerful software to run on the edge, such as advanced algorithms that perform face mask detection or occupancy monitoring with no server required. These hardware improvements keep costs lower and drive better physical security outcomes for everyone without sacrificing quality. Likewise, these same hardware advancements benefit servers and appliances like DVR and NVRs in the same way.


Editor Summary

Better hardware empowers better software functionality, whether by providing greater processing power or more memory on devices. The latest in hardware provides more and better sensors and edge devices and more powerful systems overall. Hardware selection is especially important because hardware components may be prone to failure and cannot be updated as easily as software. Finally, hardware helps to enhance cybersecurity, which is critical to the latest connected systems.

  • Related links
  • Johnson Controls Limited Access control controllers
  • Johnson Controls Limited Access control systems & kits
  • Oncam CCTV cameras
  • Oncam CCTV software
  • TDSi Access control controllers
  • TDSi CCTV cameras
  • TDSi CCTV software
  • TDSi Access control systems & kits
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control controllers
  • Access control systems & kits
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Explore hardware advancements driving physical security industry, including improved biometrics, camera technology, and access control, for enhanced safety solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec