Facility security - Expert commentary
Part 2 of our Security in Healthcare series The future is digital, and analogue systems are a thing of the past – or are they? The fact is, in the healthcare vertical at least, we may still have a way to go before the full potential of IP-based systems is realised. Obstacles include a lack of funding and the challenge of sharing IP bandwidth with other healthcare technologies. Bandwidth competition While many hospitals have invested significantly in IP syst...
IPVideo Corporation, Bay Shore, New York, recently announced a new OEM agreement with Milestone Systems Inc., Beaverton, Oregon, in an effort to provide deeper and wider options in its portfolio of video management solutions. According to Steve Rice, Director of Business Development, the partnership will allow the company to reach a broader number of enterprise customers and provide them with distinct choices – and two completely different video management system (VMS) offerings. On the t...
Stringent security policies are necessary in an organisation to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...
Access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organisation’s overall physical sec...
Portable crash barriers & traffic access control systems allow security integrators to expand their deployments for municipal surveillance and critical infrastructure The Pope does it. The Democratic and Republican National Conventions do it. Leading universities and police departments do it. Just what does this diverse list of people and organisations have in common? They have all used high-security portable barriers at their events with good success. According to manufa...
Accurately confirming a person’s identity is one key to improving security forour workplaces, communities, and our nation Perhaps I’m sensitised to the term, but it seems to me that I’m hearing the word “identity” a lot lately. Identity comes up in current news stories about Syrian refugees, for example. Candidates for the U.S. presidency debate how long it should take to confirm the identity of immigrants before allowing them to ent...
The disaster training exercise took place at four sites, with the primary locationbeing a disused power station in Kent (Image credit: London Fire Brigade) Europe's biggest-ever disaster simulation provided a test to evaluate London’s ability to "detect, prevent and if necessary to withstand, handle and recover from disruptive challenges." Exercise Unified Response replicated the aftermath of a tower block falling into Waterloo Station, a transport hub on the south bank...
Barriers certified by the US Department of State can be trusted to withstand specified weights and speeds This time of year, in the early spring, there pops up a plethora of trade shows in which security vendors can present their newest marvels to potential customers. Not to be outdone are the barriers manufacturers. Their products will range from a large metal planter to be placed in an area where no traffic is allowed to movable barriers which lower to let a car drive over...
Organisations need to protect their properties and people by securing entranceswith security systems and policies Most criminals gain access to a business or organisation the same way honest people do – they walk through a door. That door may be left unlocked. It may be propped open. Poor locks may be easily defeated or the door may be inadequately constructed and offer little resistance when attacked. Focus on multiple-layered security It seems obvious the path to...
It can be taken as proven that the trends in urbanisation, the mobility of the population and the demographics, have had and will continue to have tremendous impact on our daily lives. These impacts were and are supported by disruptive technology changes (such as the evolution of the internet and mobile communication) and result in higher dependencies of almost all economic and social processes. Compared with former generations, we are spending most of our time in buildings or closed mobile con...
A biometrics-embedded tablet can tag a guard upon entering the building & feed videoof what’s happening beyond secure doors as he/she moves through the facility The best way to make the case for biometrics is to consider a physical and logical access control scenario, according to biometrics vendor SRI Identity, a program from SRI International, one biometrics company. With advances in security technology, access control systems have come to play a bigger role in org...
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Secur...
Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally known public safety consultant, studies this premise in his 2013 book: Mass Shootings: Six Steps to Survival. “To survive, you have to be mentally prepared,” Matthews says. “You have to know what to do the minute the first shots ring out.” For his book, Matthews researched 60 mass shootings that occurred between 1980 and...
Key control technology and guard tour systems provide a ready-made solution for healthcare organisations to enhance their security & asset management protocols Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key control systems, asset lockers and guard tour systems. The shift from manpower resources to technology as a main line of defence is having a significant impact on...
As the security industry continues to grow, recruiting must have more sophisticatedscreening and hiring processes, and a commitment to hiring quality personnel The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator correspondent, in an exclusive Q&A with Brent O’Bryan, Vice President of Training and Development for AlliedBarton Security Services, discuss the challenges that secur...
Overall, 2015 has yielded positive results across the professional security industry due to the global demand for enhanced and expanded security in response to greater risks and threats. Over the past year, Altronix has participated in the industry’s growth with new technology offerings and an expanded reseller channel. The need to effectively respond to system trouble and remotely manage devices has become increasingly important to maintain security around the clock. More large technolo...
A lower bitrate reduces bandwidth andstorage requirements High definition and megapixel cameras provide more detailed images with more useful information, but this can come at a cost. The volume of data being transported and stored rises significantly. The bandwidth demand that this places on the network and the increase in required storage capacity adds significantly to the total IP system costs. The best place to reduce these costs is at the source – in the camera &nda...
The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...
Security cameras provide live, real-time videoto assist security personnel in spottingpotential or real problems Efficient security systems for parking structures deter criminal activities and anti-social elements from destroying property. Over the years, security companies have responded to this need and developed a range of security systems for parking facilities, such as audio intercoms, access cards and video analytic solutions. Systems integrators who want to add new ser...
The pre-seminar will also offer educational sessions on cutting-edge subjects It is that time of the year again, when security industry stalwarts gather together at ASIS to showcase the latest in physical security systems and other technological innovations. The event will focus on domestic threats as well as intelligence gathering tools to protect organisations against social media threats. The organisers of the ASIS International 61st Annual Seminar and Exhibits — ASI...
Michael Byrden, Sales Director of ACT, considers the convergence of facility management. He describes how ACT, the access control manufacturer, has acquired a VMS and analytics development house in order to unify security solutions and bring customers nearer to the goal of a truly intelligent building. Desire for open systems Major acquisitions have been dominating the news recently and, even if this lays me open to a charge of naivety, I genuinely believe that they aren’t predatory. As...
It used to be that the word “lockdown” was only ever used in reference to an emergency protocol to restrict movement in a prison environment. Today however, the term is in common usage in educational and other environments to describe measures taken under certain conditions of threat. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, explains that lockdowns, along with building evacuation and sheltering procedures, are an integral part of a...
Video surveillance systems can be used in a variety of ways within the mining industry The development of specialised, integrated video security systems for specific environments has vastly increased the benefits they deliver to users. However, the mining industry has considerable scope for exploiting the more sophisticated functions provided by integrated systems with data mining techniques which have added significant value in other business environments. In this article Jan de Be...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download