Mobile surveillance - Expert commentary

Small business owners reduce losses with smart video surveillance

Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. Th...

Government institutions should utilise VSaaS for an integrated video surveillance system

Video surveillance as a service (VSaaS) is not just for commercial organisations. Federal, state and local governments can also realise benefits from the technology—and use it to deliver an integrated video surveillance system that addresses some of their unique security needs. Video Surveillance as a Service (VSaaS) What is VSaaS? Simply stated, it’s a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending...

Drawbacks of PenTests and ethical hacking for the security industry

PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisat...

Facial recognition technology to enhance travel and banking in 2018

2018 will start to see facial recognition and other biometrics used in a combination of ways, but I’d like to look even further into the future. I believe that facial recognition will be utilised on a large scale and that it will be very hard to enjoy the enhanced speed and simplicity of travel and financial transactions of the future without relying on biometrics. Biometric ticket and passport For example, when you travel to another country your face will be your ticket and passport.&n...

Mobile communications make the public an additional sensor on the field

Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need...

Future of mobile security hardware for enhanced situational decision making

In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...

Robotics: Redefining crime prevention, public safety and security

Robots such as those designed by SMP Robotics can handle a variety of tasks ranging from perimeter fence monitoring to snow removal Robots come in all shapes and sizes from small tracked vehicles to large upright cylinders and cart-like devices on wheels. They fly through the air and glide underwater. They’re becoming familiar sights and will become more so. The future of robots in the military, public safety and security is expanding for some very good reasons. The new...

Disaster simulation tests effectiveness of London’s emergency response services and security technologies

The disaster training exercise took place at four sites, with the primary locationbeing a disused power station in Kent (Image credit: London Fire Brigade) Europe's biggest-ever disaster simulation provided a test to evaluate London’s ability to "detect, prevent and if necessary to withstand, handle and recover from disruptive challenges." Exercise Unified Response replicated the aftermath of a tower block falling into Waterloo Station, a transport hub on the south bank...

Mobile & biometric access control to build in 2016 with increased need for perimeter security

While the access control market typically moves at a near glacial pace, 2015 brought quite a bit of news to the marketplace, including the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. For Vanderbilt, 2015 was a big year as we brought the Siemens Security Products business into the fold, building our global brand and awareness of our award-winning solutions that have been...

SourceSecurity.com 2015 Review and 2016 Forecast

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.   Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...

How latest NVR technologies adapt to storage challenges and other developments in the current security market

NVRs make it easy to benefit from HD solutions and integrations to access control, alarm systems, intercoms and other technologies Developments in the IP video camera market have a direct impact on the other components in a system. With the emergence of higher definition cameras – whether 4K cameras or 8K or even higher – the market now needs back-end devices that can perform the decoding work. Also, more intelligence is needed, including smart functions such as pe...

Mobile access control and smart phones proving convenient in hoteling world

More and more commercial buildings today are replacing mechanical keyed locks with card access systems. The basic reason is familiar to security professionals: card systems, once installed, cost less to manage and maintain. “When people are let go, if you don’t get their keys back, you have to rekey the locks and give everyone new keys,” says Brett St. Pierre, director, education solutions with Austin, Texas-based HID Global. “With a card system, all y...

Honeywell, Twitter integration for situational awareness and emergency communications

Honeywell, Twitter integration brings security communication to its life safety products Honeywell, Northford, Conn., is leveraging the Twitter social media platform to bring higher levels of situational awareness and emergency communications to its life safety products. This move focuses to improve emergency response by monitoring various security, safety or building systems and providing information to identify potential threats. Gamewell-FCI’s Focal4 Now, Gamewe...

Day one at IFSEC 2015: Security and beyond

Security beyond its traditional boundaries is a big theme at IFSEC 2015 The security landscape is changing. Touring exhibitors on the first day of IFSEC International in London, it seems an increasing number of vendors are offering products that go beyond what may be termed "security," offering solutions for applications such as health and safety and data collection. They are also offering more smart technology with mobile phones and tablets, and are selling smarter by tailori...

Cannabis and Security: Technology solutions provide protection for emerging legalised marijuana industry

The growing market for legal marijuana (now available in some form in 24 states) has also generated a demand for security products and service to protect the industry from illegal activities. “For the most part, companies are looking for what we call the traditional surveillance systems whereby you have visible deterrence,” says Monty Henry, president of DPL-Surveillance-Equipment.com LLC in Ventura, Calif. Many companies are seeking more sophisticated systems t...

Credentials on mobile devices to accelerate in 2015

Credential form factors include mobile devices that provide a better way to open doors HID Global 2014/2015 Review and Forecast: High-profile credit card breaches during 2014 raised the profile of low-security solutions while highlighting the need for more secure smart cards. There were no real surprises, as the industry steadily continued its large-scale transition to access control platforms based on open standards. This transition sets the stage for unprecedented innovatio...

Remote video monitoring – the smarter way to enhance business security efforts

Remote monitoring offers a multiplying effect on security efforts The growth of IP-based networks has made it possible for security professionals to easily monitor surveillance activity from any internet-enabled PC, smartphone, or tablet anytime, anyplace. More and more, businesses are realising that remote monitoring can have a significant impact on their bottom line. Whether you’re a retail outlet, bank or hotel, remote monitoring offers a multiplying effect on securit...

SourceSecurity.com Technology Report highlights remote business management platform

A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others, the OnVu360 management platform has applications in remote business management and secur...