SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Intrusion detection

Intrusion detection - Security beat

The Security Event 2019: a new security event to reconnect UK commercial security industry
The Security Event 2019: a new security event to reconnect UK commercial security industry

There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numer...

Is the physical security industry doing enough to prevent school shootings?
Is the physical security industry doing enough to prevent school shootings?

School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimise the death toll)?  In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective ar...

Why regional? Inside ADT's mergers and acquisitions of US security integrators
Why regional? Inside ADT's mergers and acquisitions of US security integrators

ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so.  Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commerc...

Dispatches from GSX 2018: a smaller but successful show for visitors
Dispatches from GSX 2018: a smaller but successful show for visitors

The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at...

IFSEC International 2018 highlights solutions approach and open systems
IFSEC International 2018 highlights solutions approach and open systems

IFSEC International 2018 kicked off last week at London’s ExCel Centre. Visitors were lucky enough to experience a rare three days of British sunshine as they came together to discuss the latest trends and technologies in the physical security industry. Many exhibitors commented on how the show seemed smaller than previous years, with stands more spread out, and fewer ‘double-decker’ offerings than earlier shows. Although exhibitors represented all aspects of physical security...

Milestone's Mike Taylor: New technologies changing the role of security sales
Milestone's Mike Taylor: New technologies changing the role of security sales

Mike Taylor has been involved in security industry sales for more than 20 years, on the front line of industry changes and watching how they impact customers. Among the changes is a shift in the nature of the sales function itself. As Director of Sales, Americas, for Milestone Systems, Mike Taylor currently oversees a team that brings to market the full suite of Milestone open platform solutions. We sat down at Milestone Community Days (MIPS) earlier this year to discuss the technologies and tr...

CES 2018: Security technologies influencing the consumer electronics market
CES 2018: Security technologies influencing the consumer electronics market

Security is more-than-ever linked to consumer electronics, especially in the residential/smart home market. CES 2018 in Las Vegas is therefore brimming with news that will have a direct impact on the security market, today and especially looking into the future. Products for the future of security   CES is a giant trade show for consumer electronics with 2.75 million net square feet of exhibitor space and featuring more than 3,900 exhibitors, including 900 startups - in cont...

How UL helps security manufacturers comply to cybersecurity standards
How UL helps security manufacturers comply to cybersecurity standards

Cybersecurity is a growing concern for manufacturers of life safety and security products, and Underwriters Laboratories (UL) wants to help solve the problem. Specifically, UL seeks to work with manufacturers to up their game on cybersecurity and to certify compliance to a minimum level of cybersecurity “hygiene.” UL cybersecurity certification UL is a familiar brand in consumer goods and in the security and life safety markets. UL certification is sought by manufacturers in a ran...

ASIS 2017 Day 1: Surveillance companies moving beyond integration
ASIS 2017 Day 1: Surveillance companies moving beyond integration

ASIS 2017 was off to a strong start on Tuesday, presenting a new wave of innovation to the U.S. security end user community. Many attendees to the Dallas show are well-placed in their companies to influence or direct the purchase of security products and equipment, and exhibitors sought to impress them with a range of new and enhanced options. Moving from integration to unification In general, the ASIS show has a quieter, less frantic feel than the spring ISC West show in Las Vegas. Conversat...

Can you beat the SourceSecurity.com Best of the Year Quiz?
Can you beat the SourceSecurity.com Best of the Year Quiz?

In 2017, SourceSecurity.com covered topics from all corners of the physical security industry - from video surveillance to access control to intrusion detection and beyond. But just how much have you been paying attention to the industry this past year? Does your knowledge of the cloud soar high above your colleagues and security friends? Can you recall your facts faster than 60-fps? Are you hooked into the mainframe with your expertise in cybersecurity? Now you can find out. We...

How NERC/CIP compliance is boosting US power grid security
How NERC/CIP compliance is boosting US power grid security

Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. Much of the current concern about securing electrical substations in the United States originated in response to a 2013 sniper attack, us...

Axis Communications reimagines showrooms with innovative UK Experience Centre
Axis Communications reimagines showrooms with innovative UK Experience Centre

Axis Communications, the global provider of intelligent surveillance technology, yesterday held the official launch of the new Axis Experience Centre in Luton. The event was a chance for Axis’ partners to meet with the senior management team and explore how the new centre operates, all the while celebrating the company’s 20th anniversary over a glass of champagne. The centre was officially opened by Axis Communications co-founder Martin Gren, along with Bodil Sonesson, the comp...

ARA’s asymmetric sensor approach adds focus to perimeter security
ARA’s asymmetric sensor approach adds focus to perimeter security

Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...

Audio analytics: an underused security tool
Audio analytics: an underused security tool

Audio has been slower to catch on in the security market because of lingering concerns about privacy laws related to audio surveillance. But audio analytics capabilities are increasing right alongside the more commonly used video analytics. Integrators who ignore audio are missing an opportunity to create better systems.  Privacy is generally not a concern. U.S. law is clear that audio monitoring is legal as long as there is no expectation of privacy among those being monitored. Public si...

Uncertainty over Brexit’s security implications spills into IFSEC 2016
Uncertainty over Brexit’s security implications spills into IFSEC 2016

Amid all the discussion of security integration and end-to-end solutions on the first day of IFSEC 2016 was an undercurrent of uncertainty. The international trade show opened at ExCel London just days before the historic "Brexit" vote, when Britons will decide whether to remain a part of the European union or to exit the politico-economic fusion of 28 member states. With the Brexit referendum this week, the polls are neck-and-neck, so the vote could go either way, hence the uncertainty. If "le...

Security industry speculates as Honeywell-UTC deal falls through
Security industry speculates as Honeywell-UTC deal falls through

In a year of mega-deals impacting the security marketplace, one of the big news stories recently was a deal that did not happen – between giants Honeywell and United Technologies (UTC). Financial news pages have been full of the back-and-forth between these two companies. It seems Honeywell wanted to merge with UTC, but UTC declined because of “insurmountable regulatory obstacles and strong customer opposition.” So the deal is off, at least for now. Impact on the security mark...

School crisis management times reduced by Sielox Lockdown Status System
School crisis management times reduced by Sielox Lockdown Status System

In a school security lockdown, teachers typically display red or green cards on the doors or in the windows of their classrooms. The manual procedure uses red cards to alert to a crisis condition; green cards designate that everything is safe inside the classroom or office. Colour-coded crisis management system Physical security company Sielox has adapted the idea of using a colour scheme to characterise an emergency situation into its electronic security system. CLASS [Crisis Lockdown Alert S...

Physical Security Information Management (PSIM) - the death of an acronym?
Physical Security Information Management (PSIM) - the death of an acronym?

Time flies, and I’m sure it’s been 10 or 15 years since the term PSIM (meaning physical security information management) came into favour in our market. It was a variation on the term SIM (security information management), which in the realm of information security refers to a collection of data into a central repository for trend analysis. The idea was to apply the same concept to physical security equipment in the form of an over-arching software system that takes information from...

Vanderbilt preparing to finalise acquisition from Siemens
Vanderbilt preparing to finalise acquisition from Siemens

The sale of Siemens’ Security Products to Vanderbilt is expected to close by the end of March, and already the owner-to-be is making good progress to form a new stand-alone company. Notably, the pending transaction is not a sale of company shares but rather a sale of assets, in this case product lines in the access control, CCTV and intrusion categories. In effect, a company is being created to manage those assets, and Vanderbilt has been working for the last several months to create the...

NFPA’s security standards to be revised: Any suggestions?
NFPA’s security standards to be revised: Any suggestions?

January 5, 2015 is the deadline to suggest changes to the National Fire Protection Association’s (a US trade association) two documents that serve the security marketplace. Anyone can provide public input into the standards through the NFPA website. NFPA 731: Standard for the Installation of Electronic Premises Security Systems provides guidance on how to install, test and maintain electronic premise security systems and their components. Its specific requirements are written so that...

Vanderbilt's acquisition of Siemen's Security Products business in Europe creates new global player
Vanderbilt's acquisition of Siemen's Security Products business in Europe creates new global player

There’s a new international company in the security market this week with the acquisition of Siemens’ Security Products business in Europe by Vanderbilt Industries, a new U.S. company that rebranded the Schlage Security Management Systems (SMS) product line after acquiring it from Ingersoll Rand in August 2012. The European arm of the new global player will be called Vanderbilt International, based out of Germany and led by Managing Director Joseph Grillo, who many remember from his...

Extending perimeter protection beyond the fence line with SpotterRF
Extending perimeter protection beyond the fence line with SpotterRF

In a layered approach to security, the outermost layer increasingly might refer to an area outside a fence line. The sooner a facility is alerted to a possible threat, the better, and when a threat reaches inside a facility’s fence, it may be too late to mitigate it. Security directors need situational awareness that extends outside the facility and provides the ability to intercept intruders before they become a threat. Zones of interest, or buffer zones, outside a facility’s fence...

Providing technical support in the home systems environment
Providing technical support in the home systems environment

A pessimist might see the coming “Internet of Things” as the “Internet of Things that Could Go Wrong.” Clearly the networking of more machines in the home, including video and security systems, suggests that somebody (or something) needs to be available to make sure that the resulting home automation system is working as intended. If you need technical support for home automation, who do you call? It’s not just a theoretical question, given the accelerating trend...

Drone attacks at U.S. prisons present new category of risk
Drone attacks at U.S. prisons present new category of risk

If you had a super power, would you use it for good or evil? The question might typically be the subject of vigorous debate among third graders, but it’s also a question that comes up when you consider technology. Sometimes the benefits of technology are almost like super powers. As much as we seek to apply the powers of technology to security, there is also a criminal element that stands ready to use them with evil intent. Such is the case with drones. We have previously mentioned the po...

How sensors can complement video systems
How sensors can complement video systems

The security market it clearly sold on the value of video, but customers shouldn’t depend solely on video to protect their premises. Rather, they should implement a combination of video systems and other sensors for a more effective approach overall. That’s a message I heard when I visited the Optex booth at the IFSEC show. The supplier of many different types of sensors says a “deeper and wider” integration of video with sensors provides a higher level of security requi...

Needed: Attention-grabbing technology in an emergency
Needed: Attention-grabbing technology in an emergency

“A wealth of information creates a poverty of attention.” So said Herbert A. Simon, American Political Scientist, Economist, Sociologist, Psychologist, and Professor. I heard that quote at the Avigilon presentation at IFSEC, repeated by Ian Povey, Avigilon’s director of product marketing and product management. He used the quote to support the need for more (accurate) video analytics. In other words, without analytics, there is so much video information that the operator&rsquo...

Announcements and food for thought at the first day of IFSEC
Announcements and food for thought at the first day of IFSEC

It took a crowded ride during rush hour on the London “Tube” to get me there, including multiple transfers, but the first day of IFSEC at its new venue, the ExCel in London, yielded a couple of newsy announcements and busy traffic at many of the stands. The industry is still reeling from bombshell news last week of the acquisition of Milestone by Canon. The ink may be barely dry, but the agreement was celebrated at IFSEC with a press event and big photo opportunity involving Rokus v...

ADT bringing "Voice of the Customer" to the Z-Wave board
ADT bringing "Voice of the Customer" to the Z-Wave board

ADT is looking to "bring the voice of the customer" into the continuing development and expansion of Z-Wave, the radio frequency (RF) communication and product-level interoperability technology that enables wireless networking of battery-powered devices in the home. ADT is the newest Principal Member of the Z-Wave Alliance consortium. Z-Wave is one of the enabling technologies of ADT’s Pulse security and home automation system, which enables a home's electronics to communicate with each o...

Security system applications: Success stories of security products & the industry
Security system applications: Success stories of security products & the industry

Every security system has a storyOur industry’s technology solutions are at work almost everywhere, if you think about it. You might see Kelvin Hughes high-resolution radar pictures providing protection for Maryland’s oyster beds. At the 2014 Oscars, Axis pan-tilt-zoom (PTZ) cameras kept watch around the Dolby Theatre in Los Angeles. At The Marque, an exclusive membership club in Houston, Texas, MorphoTrak 3D facial recognition technology secures access and enables the club to be &ld...

  • «
  • 1
  • 2
  • »
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. Security beat
About this page

See an extensive list of insightful blog posts on Intrusion detection, providing in-depth opinions and analysis on product, technology and industry trends on Intrusion detection by editor Larry Anderson

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec