SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Climax unveils Hybrid Security System

    Climax unveils Hybrid Security System

    Dahua Panoramic PTZ WizMind Network Camera

    Dahua Panoramic PTZ WizMind Network Camera

    Hikvision DeepinView: The Dedicated Subseries

    Hikvision DeepinView: The Dedicated Subseries

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Motorola provides VB400 body-worn video solutions to the frontline workers at London Ambulance Service to respond to threats
    • Matrix Telecom Solutions supports Domino's Pizza food chain with seamless and efficient communication systems
    • Anviz releases AI-based biometric facial recognition terminals to facilitate safe return to offices post COVID-19 lockdown
    • Armis and Viakoo announce a partnership to bring together IoT device discovery and remediation
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • Remote Monitoring technology: Tackling South Africa’s cable theft problem
    • What are the positive and negative effects of COVID-19 to security?
    • Maximising supermarket safety with real-time surveillance solutions
    • The intrinsic role of lighting for video surveillance clarity and performance
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Oliver Law Security installs Vanderbilt ACT365 security system to protect one of Doncaster’s largest gyms, The Fitness Village

    Oliver Law Security installs Vanderbilt ACT365 security system to protect one of Doncaster’s largest gyms, The Fitness Village

    Hikvision IP CCTV systems protect visitors and stores at Somerset Mall in South Africa

    Hikvision IP CCTV systems protect visitors and stores at Somerset Mall in South Africa

    CLIQ® access control solution from ASSA ABLOY helps secure museums, shopping and indoor leisure sites

    CLIQ® access control solution from ASSA ABLOY helps secure museums, shopping and indoor leisure sites

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Shifting trends in operation centers and control rooms for 2021

    Shifting trends in operation centers and control rooms for 2021

    Capture new opportunities with computer vision and video analytics

    Capture new opportunities with computer vision and video analytics

    How Open Supervised Device Protocol (OSDP) is revolutionising access control systems

    How Open Supervised Device Protocol (OSDP) is revolutionising access control systems

    The World of Access Control Webinar - Part 2

    The World of Access Control Webinar - Part 2

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY
    • Security & Safety Things
    • Hanwha Techwin America
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Solve access control challenges in the healthcare sector

    Solve access control challenges in the healthcare sector

    The role of access control in a safe return to the workplace

    The role of access control in a safe return to the workplace

    10 step guide to staying ahead of emerging security threats

    10 step guide to staying ahead of emerging security threats

    2021 Trends in Video Surveillance

    2021 Trends in Video Surveillance

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Counter Terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
Counter Terror

How does terrorism impact the security market?

21 May 2019

How does terrorism impact the security market?
Larry Anderson
Larry Anderson
21 May 2019
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook

Editor Introduction

Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?


Card image cap
Jason David G4S Corporate Risk Services

The rise of international and domestic terrorism is forcing global organisations to become increasingly cognizant at leveraging emerging technologies that draw upon robust artificial intelligence to help enhance traditional physical security programs. This extends beyond the scope of smart cameras or facial recognition software. Many organisations are now protecting their assets and mitigating against potential risks by harnessing situational intelligence alerting software tools that can dissect and analyse structured and unstructured data derived from news, social media and government sources spanning multiple languages from around the world. Many security leaders are also taking it a step further by ensuring that raw intelligence data collected from these sophisticated tools are augmented by teams of highly skilled intelligence and security analysts. They perform daily threat analysis, identify intelligence and security gaps and provide critical forecasting on global emerging threats and trends that focus on the overall impact to their respective organisations.

Card image cap
Jamie Barnfield IDIS

Historically, terrorism has undoubtedly driven developments in the sector, with investments in tougher defences triggered by sustained periods of threat. A clear example is London, which today is one of the most watched cities in the world as a result of past attacks. Yet the security sector today has innovation hard-wired into its DNA, and investments continue regardless of specific incidents – because it is now recognised that the next potential terrorist is always just around the corner. So risk assessments are more sophisticated and less reactive. Technology vendors continually collaborate with customers to find smarter and more cost-effective measures. And big investments in R&D (46% of employee effort, in the case of IDIS) drive new products and technologies – for example, AI/deep learning and biometrics – as well as opening opportunities for new market entrants and innovations such as cloud-based communications and safety apps.

Card image cap
John Davies TDSi

The increase in terrorist related-incidents (such as the brutal attacks in Sri Lanka) and in parts of the globe often considered to be immune from terrorist attention (such as New Zealand), continues to raise awareness within the general public of security risks, and thus drives demand for mitigation measures in the physical security space. It is a sad ongoing fact of the times that we live in. We must all be continually aware of the threat and take the required precautions, but in a way that doesn’t impact the way we go about conducting our daily lives. Security must protect people and property, but also be easy to use. Nobody wants to feel constantly under surveillance, so security needs to be subtle yet prominent enough to make people feel safe and to deter criminals in the first place. As the old saying goes, ‘prevention is better than cure’.

Card image cap
Alan Stoddard Verint Systems

A terrorism attack has the ability to bring a business enterprise to a standstill. Aside from carrying the potential for considerable and irreparable damage to people and property, brand reputation and business assets are also at risk. And as today's organisations continue to leverage the convenience of the Internet of Things (IoT) and connected devices, we're seeing an increase in vulnerabilities that can be exploited by intelligent and sophisticated terrorist groups. The physical security market is therefore impacted by the need to ensure collaboration with IT and cybersecurit’y departments to develop a holistic, comprehensive approach to risk mitigation. This requires a high level of convergence among all stakeholders to break down traditional silos and facilitate intelligence gathering across the enterprise. Additionally, by making vigilance and the continuous improvement of security practices top priorities, businesses can establish a proactive and efficient security strategy to combat the risk of terrorism.


Editor Summary

Terrorism is a grim reality – and a sign of the times. The ongoing (if unlikely) possibility of a terrorist attack can be a factor in security decision-making. Hardware and software tools provide new avenues of response and prevention, and their thoughtful implementation can provide part of the solution. Awareness and constant vigilance are also needed; and if we waver, there is always a new tragedy on the horizon to remind us what is at stake.

  • Related links
  • Biometric Access control software
  • Face Recognition Software Access control software
  • IDIS CCTV cameras
  • TDSi Access control software
  • TDSi CCTV cameras
  • Related categories
  • CCTV cameras
  • Access control software
Featured white papers
Access control & intelligent vehicle screening

Access control & intelligent vehicle screening

Download
Related articles
Physical and cyber security precautions when travelling

Physical and cyber security precautions when travelling

Mass security screening technology for large events

Mass security screening technology for large events

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service

Follow us

Sections CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos May 2019 news RSS
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
About this page

Security experts from G4S Corporate Risk Services, IDIS, TDSi, Verint Systems discuss "How does terrorism impact the security market?"

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec