SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

SourceSecurity.com's top 10 expert panel roundtable discussions in 2016

SourceSecurity.com's top 10 expert panel roundtable discussions in 2016
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Top Roundtable 2016 topic: choosing between cloud-based and server-based security systems.
  • Expert discussions highlight challenges in edge-based video storage and security system commoditisation.
  • Customers often make mistakes buying/installing security systems, missing crucial service opportunities.

SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions.

The very most-clicked-on Roundtable discussion in 2016 was about how to choose between a cloud-based system and a server-based system. Other hot topics that made the Top-10 list of Roundtable discussions included edge-based video storage, the challenges of commoditisation, and mistakes customers make when buying and installing security systems.

Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2016 at SourceSecurity.com, along with a “sound bite” from each discussion, and links back to the full articles.

Thanks to everyone who contributed to Expert Panel Roundtable in 2016, including the quotable panelists named below!

1. What factors should a customer consider when choosing between a cloud-based system and a server-based security system?

"Invariably the choices will be driven by security processes in place within the corporate environment and by ensuring the remote system is as impenetrable as the corporate network. Both options potentially leave the corporate network vulnerable to a determined cyber attacker, so the systems and access points to the network need to be sufficiently hardened to deter or prevent attacks.” [John Davies]

2. What is the most unusual application of surveillance cameras you have seen recently?

"The most unusual application I’ve seen is the use of 360-degree fisheye cameras mounted on mobile poles for security along a marathon route. The poles were mounted on mobile units that contained power and communications infrastructure. Multiple mobile units were driven and placed along the route so that the entire route was constantly under surveillance. " [Jumbi Edulbehram]

3. What is the biggest mistake you see your customers make when it comes to buying or installing security or surveillance systems?

"Too many businesses fail to take full advantage of the breadth of services available for maximising tools like remote diagnostic services, for example, which allow customer service teams to regularly and proactively check equipment quality and make repairs remotely." [Joe Oliveri]

A number of major security companies are offering cloud video surveillance solutions apart from the traditional server-based systems, but which is best for the customer?
A number of major security companies are offering cloud video surveillance solutions apart from the traditional server-based systems, but which is best for the customer?

4. How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense?

"The industry commonly holds that 20 pixels/foot is enough for general surveillance, 40 pixels/foot is the minimum for facial recognition and licence plate identification, and 80 pixels/foot is used for higher detail like reading logos, names embroidered on a shirt, etc. " [Jason Spielfogel]

5. What is the value of edge-based storage and in what specific applications?

"Recording at the edge frees up network bandwidth and PC processing power, allowing users to view and manage video feeds and store applicable images for later use or transfer to the network when necessary. " [Dave Poulin]

6. How can security integrators replace revenue in the age of commoditisation?

"The integrator community needs to learn to embrace what hundreds of other contractor businesses have. They need to improve their predictable cash flow and margin by offering contracted services. Call it what you like – RMR, managed services, monitoring – the description makes no difference. The integrator community simply needs to get off their butt and make it happen. " [Bill Bozeman]

7. How successful was ISC West 2016? Did it meet your expectations?

"It was unanimous that 2016 ISC West was the best show we have participated in Arecont Vision history! Activity on the first two days was especially strong with Systems Integrators, Dealers, Distributors, End Users, and A&E/Consultants. These people all came to see our new product line and were especially interested to see the product performance improvements and ease of installation and setup." [Scott Schafer]

More of us are depending on social media smart phone apps as a source of information, providing new levels of immediacy that dovetail well into security, specifically in areas of emergency notification
More of us are depending on social media smart phone apps as a source of information, providing new levels of immediacy that dovetail well into security, specifically in areas of emergency notification

8. What are the physical security challenges of "safe cities" applications, and how is the market meeting those challenges?

"One of the challenges is, of course, to make systems from different manufacturers work together. Interoperability is important not only from an operator’s point of view, but also in how cities and their internal divisions should respond to incidents reported by the security systems. " [Per Björkdahl]

9. How should integrators/installers differentiate themselves or make themselves stand out in today’s market?

"In today's market, it's all about customer service. Almost every integrator has good product – and most of these products do a lot of the same things – but what sets integrators/installers apart is the level of value-added support they are providing to their accounts. Increased support through training, follow-up, open communication and keeping them informed on emerging technologies can really speak to the needs that end users have and why they will remain loyal.” [Mitchell Kane]

10. What role can social media play in the security marketplace and/or as a tool to promote better security in general?

"Social media has weaved its way into our daily lives and is an integral part of our interaction with customers in the marketplace. Social media outlets bring the human element to interfacing with our communities and customers. This humanization allows us to address sensitive topics like the recent events in Orlando and how to take preventative measures in the future." [Melissa Stenger]

See the full coverage of 2016/2017 Review and Forecast articles hereSave

Save

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Security management
  • Building security
  • Security training
  • Security software
  • City Surveillance
  • Home automation
  • 4K
  • Cloud security
  • Related links
  • ACT Access control systems & kits
  • AV Costar CCTV software
  • ISONAS Access control systems & kits
  • Oncam CCTV software
  • Oncam CCTV cameras
  • Pelco Digital video recorders (DVRs)
  • Pelco CCTV cameras
  • Pelco CCTV software
  • TDSi CCTV cameras
  • TDSi CCTV software
  • TDSi Access control systems & kits
  • AV Costar IP cameras
  • Oncam IP cameras
  • Pelco IP cameras
  • TDSi IP cameras
  • AV Costar Network video recorders (NVRs)
  • AV Costar IP Dome cameras
  • Oncam IP Dome cameras
  • Pelco Network video recorders (NVRs)
  • Pelco IP Dome cameras
  • TDSi IP Dome cameras
  • TDSi Network video recorders (NVRs)
  • Oncam Dome cameras
  • Pelco Dome cameras
  • Articles by Larry Anderson
  • 2016 security trends
  • Related categories
  • Digital video recorders (DVRs)
  • CCTV software
  • Access control systems & kits
  • Intruder alarm system control panels & accessories
  • CCTV cameras
  • VCRs
  • IP cameras
  • Network video recorders (NVRs)
  • IP Dome cameras
  • Storage
  • Dome cameras
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Expert commentary
About this page

Discover top security insights from experts; covering AI's role, cyber hygiene, and the future of threat intelligence in this comprehensive roundtable discussion.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec